SlideShare a Scribd company logo
1 of 35
Download to read offline
February 2024: Top
10 Read Articles in
Computer Networks
& Communications
International Journal of Computer
Networks& Communications (IJCNC)
http://airccse.org/journal/ijcnc.html
(Scopus, ERA Listed, WJCI Indexed)
Scopus Cite Score 2022—1.8
ISSN 0974 - 9322 (Online); 0975 - 2293 (Print)
Citations, h-index, i10-index
REAL TIME WIRELESS HEALTH MONITORING APPLICATION
USING MOBILE DEVICES
Amna Abdullah, Asma Ismael, Aisha Rashid, Ali Abou-ElNour, and Mohammed Tarique
Department of Electrical Engineering, Ajman University of Science and Technology, P.O. Box
2202, Fujairah, United Arab Emirates
ABSTRACT
In the last decade the healthcare monitoring systems have drawn considerable attentions of the
researchers. The prime goal was to develop a reliable patient monitoring system so that the
healthcare professionals can monitor their patients, who are either hospitalized or executing their
normal daily life activities. In this work we present a mobile device based wireless healthcare
monitoring system that can provide real time online information about physiological conditions of
a patient. Our proposed system is designed to measure and monitor important physiological data
of a patient in order to accurately describe the status of her/his health and fitness. In additionthe
proposed system is able to send alarming message about the patient’s critical health data by text
messages or by email reports. By using the information contained in the text or e-mail message the
healthcare professional can provide necessary medical advising. The system mainly consists of
sensors, the data acquisition unit, microcontroller (i.e., Arduino), and software (i.e., LabVIEW).
The patient’s temperature, heart beat rate, muscles, blood pressure, blood glucose level, and ECG
data are monitored, displayed, and stored by our system. To ensure reliabilityand accuracy the
proposed system has been field tested. The test results show that our system is able to measure the
patient’s physiological data with a very high accuracy.
KEYWORDS
ZigBee, remote healthcare, mobile device, patient monitoring, LabView
For More Details: https://airccse.org/journal/cnc/7315cnc02.pdf
Volume Link: https://airccse.org/journal/ijc2015.html
REFERENCES
[1] Global Challenges for Humanity available at
http://www.millenniumproject.org/millennium/challenges.html
[2] A Right to Health available at http://www.who.int/mediacentre/factsheets
[3] FRANCIS S. COLLINS, “MOBILE TECHNOLOGY AND HEALTHCARE”,
AVAILABLE at http://www.nlm.nih.gov/medlineplus/magazine/issues/winter11
[4] How the Smartphone Can Revolutionize Healthcare available at http://www.mdtmag.com/
[5] mHealth App Developer Economics(2014) available at
http://mhealtheconomics.com/mhealthdeveloper-economics-report/
[6] Bourouis, A., Feham, M., and Bouchachia, A.(2011), “ Ubiquitous Mobile Health Monitoring
System for Elderly (UMHMSE)”, International Journal of Computer Science and Information
Technology, Vol.2, No. 3, June, pp. 74-82
[7] Lee, Y.D. and Chung, W.Y. (2009) “Wireless Sensor Network Based Wearable Smart Shirt
for Ubiquitous Health and Activity Monitoring”, Sensors and Actuators B: Chameical, Vol. 140,
No. 2, July, pp. 390-395
[8] Orlando R. E. P., Caldeira, M. L. P. Lei S., and Rodrigues, J.P.C (2014), “An Efficient and
Low Cost Windows Mobile BSN Monitoring SystemBased on TinyOS”, Journal of
Telecommunication Systems, Vol. 54, No. 1, pp. 1-9
[9] Yuce, M. R.(2010)” Implementation of wireless body area networks for healthcare systems”,
Sensor and Actuators A:Physical, Vol. 162, No. 1, July, pp. 116-129
[10] Lei Clifton, David A. Clifton, Marco A. F. Pimentel, Peter J. Watkinson, and Lionel
Tarassenko (2014),” Predictive Monitoring of Mobile Patients by Combining Clinical
Observations with Data From Wearable Sensors”, IEEE Journal of Biomedical and Health
Informatics, Vol. 18, No. 3, May , pp. 722-730
[11] Parane, K.A., Patil, N.C. ; Poojara, S.R. ; Kamble, T.S(2014) “Cloud based Intelligent
Healthcare Monitoring System”, In the proceedings of International Conference on Issues and
Challenges in Intelligent Computing Techniques (ICICT), February 7-8, Ghaziabad, Indian, pp.
697-701
[12] Xiaoliang Wang ; Qiong Gui ; Bingwei Liu ; Zhanpeng Jin et al (2014), “Enabling Smart
Personalized Healthcare: A Hybrid Mobile-Cloud Approach for ECG Telemonitoring”, IEEE
Journal of Biomedical and Health Informatics, Vol. 18, No. 3, May, pp. 739 – 745
[13] Dunsmuir, D., Payne, B. ; Cloete, G. ; Petersen, C.(2014), “Development of m-Health
Applications for Pre-eclampsia Triage”, IEEE Journal of Biomedical and Health Informatics, Vol.
PP, No. 99, January , pp. 2168-2194
[14] Tello, J.P. ; Manjarres, O. ; Quijano, M. ; Blanco, A. et al(2013) , “ Remote Monitoring
System of ECG and Human Body Temperature Signals”, IEEE Latin American Transaction,
Vol. 11, No. 1, February, pp. 314-318
[15] Moreira, H. ; Oliveira, R. ; Flores, N.(2013), “STAlz: Remotely supporting the diagnosis,
tracking and rehabilitation of patients with Alzheimer's”, In the Proceedings of the 15th IEEE
Conference on E-health Networking, Applications, and Services, October 9-12, Lisbob, pp. 580-
584
[16] Touati, F. ; Tabish, R. ; and Ben Mnaouer, A.(2013), “Towards u-health: An indoor
6LoWPAN based platform for real-time healthcare monitoring”, In the proceedings of the IFIP
International Conference on Wireless and Mobile Networking, April 20-23, 2013,Dubai, pp. 1-4
[17] Strisland, F. ; Sintef,; Svagard, I. ; Seeberg, T.M.(2013) “ESUMS: A mobile system for
continuous home monitoring of rehabilitation patient”, In the proceedings of the 35th IEEE Annual
International Conference on Engineering in Medicine and Biology Society, July 3-7, 2013, Osaka,
pp. 4670-4673
[18] Yun-Hong Noh ; Jiunn Huei Yap ; and Do-Un Jeong(2013) “Implementation of the
Abnormal ECG Monitoring System Using Heartbeat Check Map Technique”, In the proceedings
of International Conference on IT Convergence and Security, December 16-18, 2013, Macao, pp.
1-4
[19] Triantafyllidis, A.K. ; Koutkias, V.G. ; Chouvarda, I. ; Maglaveras, N.(2013) “A Pervasive
Health System Integrating Patient Monitoring, Status Logging, and Social Sharing”, IEEE Journal
on Biomedical and Health Informatics, Vol. 17, No. 1, January , pp. 30-37
[20] Bin Yu ; Lisheng Xu ; Yongxu Li(2012) “Bluetooth Low Energy (BLE) based mobile
electrocardiogram monitoring system”, In the proceedings of International Conference on
Information and Automation, June 6-8, 2012, Shenyang, pp. 763-767
[21] Mitra, P. ; Poellabauer, C.(2012) ,” Emergency response in smartphone-based Mobile Ad-
Hoc Networks”, In the proceedings of IEEE International Conference on Communication, June
10-15, Ottawa, pp. 6091 - 6095
[22] Ospino, M.R. ; Ariza, L.C. ; Rojas, J.G., (2012), ”Mobile system for monitoring
measurements in hypertensive patients”, In the proceedings of the IEEE Colombian
Communication conference, May 16-18, CA, pp. 1-6
[23] Ruipeng Gao ; Liqiong Yang ; Xinyu Wu ; and Tao Wang, (2012) “A phone-based e-health
system for OSAS and its energy issue”, In the proceedings of the International Symposium on
Information Technology in Medicine and Education, August 3-5, 2012, Hokodate, Hokkaido, pp.
682-696
[24] https://www.zigbee.org/
[25] The IEEE 802.15.4 standard available at
http://standards.ieee.org/getieee802/download/802.15.4d2009.pdf
Bluetooth Developer Portal available at
https://developer.bluetooth.org/TechnologyOverview/Pages/Compare.aspx
DYNAMIC ROUTING OF IP TRAFFIC BASED ON QOS PARAMETERS
Martin Kriška1 , Jozef Janitor2 and Peter Fecilak3
1Computer Networks Laboratory, Technical University of Kosice, Slovakia 2 Institute of
Computer Technology, Technical University of Kosice, Slovakia 3Department of Computers and
Informatics, Technical University of Kosice, Slovakia
ABSTRACT
The article looks into the current state of the art of dynamic routing protocols with respect to
their possibilities to react to changes in the Quality of Service when selecting the best route towards
a destination network. New options that could leverage information about the ever changing QoS
parameters for data communication are analysed and a Cisco Performance Routing solution is
described more in detail. The practical part of this work focuses on a design and implementation
of a test bed that provides a scalable laboratory architecture to manipulate QoS parameters of
different data communications flowing through it. The test bed is used in various use cases that
were used to evaluate Cisco Performance Routing optimization capabilitiesin different scenarios.
KEYWORDS
Performance Routing, PfR, Quality of Service, QoS, Optimized Edge Routing
For More Details: https://airccse.org/journal/cnc/6414cnc02.pdf
Volume Link: https://airccse.org/journal/ijc2014.html
REFERENCES
[1] Information Sciences Institute, University of Southern California. RFC 791 INTERNET
PROTOCOL - DARPA INTERNET PROGRAM, PROTOCOL SPECIFICATION. s.l. : Internet
Engineering Task Force, 1981.
[2] Cisco Systems, Inc. Route Selection in Cisco Routers. Cisco. [Online] 2008. [Date: 25th of
October 2013.] http://www.cisco.com/image/gif/paws/8651/21.pdf.
[3] D. Savage, et. al.: Enhanced Interior Gateway Routing Protocol. IETF. [Online] 2013 [Date:
25th of October 2013.] http://tools.ietf.org/html/draft-savage-eigrp-00.
[4] Teare Diane: Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide.
Indianapolis: Cisco Press, 2010. ISBN 1587058820.
[5] Cisco Systems, Inc. BGP Best Path Selection Algorithm. Cisco. [Online] 2012. [Date: 25th of
October 2013.] http://www.cisco.com/image/gif/paws/13753/25.pdf.
[6] Doyle Jeff, Carroll Jennifer: CCIE Professional Development Routing TCP/IP Volume I.
Indianapolis: Cisco Press, 2006. ISBN 1587052024.
[7] D. Awduche, et. al.: RSVP-TE: Extensions to RSVP for LSP Tunnels. IETF. [Online] 2013
[Date: 11th of November 2013.] http://tools.ietf.org/html/rfc3209.
[8] X. Fu, et. al.: RSVP-TE extensions for Loss and Delay Traffic Engineering. IETF. [Online]
2013 [Date: 11th of November 2013.] http://tools.ietf.org/html/draft-fuxh-mpls-delay-loss-rsvp-
te-ext02.
[9] Z. Seils. Defining SDN Overview of SDN Terminology & Concepts. Cisco. [Online] 2013.
[Date: 4 th of October 2013.] https://learningnetwork.cisco.com/docs/DOC-21946.
[10] Cisco Systems, Inc. onePK Chat and Demo at Cisco Live. SlideShare. [Online] 2012. [Date:
4th of October 2013.] http://www.slideshare.net/getyourbuildon/onepk-chat-and-demo-at-cisco-
live.
[11] S. Cadora. Hitchhiker's Guide to onePK. Cisco. [Online] 2013. [Date: 12th of September
2013.] https://learningnetwork.cisco.com/docs/DOC-22910.
[12] R. Trunk. Understanding Performance Routing (PfR). Chesapeake Netcraftsmen. [Online]
2009. [Date: 15th of November 2013.] http://netcraftsmen.net/archived-documents/c-mug-
articlearchive/7-20090922-cmug-understanding-performance-routing/file.html?limit=10.
[13] Kalita Hemanta Kumar, Nambiar Manoj K.: Designing WANem: A Wide Area Network
Emulator tool. Bangalore, 2011. ISBN 9780769546186.
[14] R. Pandi Selvam, V.Palanisamy: An efficient cluster based approach for multi-source
multicast routing protocol in mobile ad hoc networks, International Journal of Computer
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND
EFFECTIVE SOLUTIONS
Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin
School of Computer Sciences, Universiti Sains Malaysia, Malaysia
ABSTRACT
Today, Global Positioning System (GPS) is widely used in almost every aspect of our daily life.
Commonly, users utilize the technology to track the position of a vehicle or an object of interest.
They also use it to safely navigate to the destination of their choice. As a result, there are countless
number of GPS based tracking application that has been developed. But, a main recurring issue that
exists among these applications are the inaccuracy of the tracking faced by users and this issue has
become a rising concern. Most existing research have examined the effects that the inaccuracy of
GPS have on users while others identified suitable methods to improve the accuracy of GPS based
on one or two factors. The objective of this survey paper is to identify the common factors that affects
the accuracy of GPS and identify an effective method which could mitigate or overcome most of
those factors. As part of our research, we conducted a thorough examination of the existing factors
for GPS inaccuracies. According to an initial survey that we have collected, most of the respondents
has faced some form of GPS inaccuracy. Among the common issues faced are inaccurate object
tracking and disconnection of GPS signal while using an application. As such, most of the
respondents agree that it is necessary to improve the accuracy of GPS. This leads to another objective
of this paper, which is to examine and evaluate existing methods as well as to identify the most
effective method that could improve the accuracy of GPS.
KEYWORDS
GPS, accuracy factors, improve accuracy, global positioning system
For More Details: https://aircconline.com/ijcnc/V8N2/8216cnc11.pdf
Volume Link: https://airccse.org/journal/ijc2016.html
REFERENCES
[1] Lin, J.Y, Yang, B.K., Tuan A.D., and Chen, H.C. (2013). “The Accuracy Enhancement of GPS
Track in Google Map”, 2013 Eighth International Conference on Broadband and Wireless
Computing, Communication and Applications, Compiegne, France. pp. 524-527.
[2] Iqbal, A., Mahmood. H., Farooq, U., Kabir, M.A. and Asad, M.U.. (2009). “An Overview of the
Factors Responsible for GPS Signal Error: Origin and Solution”, 2009 International Conference on
Wireless Networks and Information Systems, Shanghai, China. pp. 294-299.
[3] Bajaj, R., Ranaweera, S.L., Agrawal, D.P.. (2002). “GPS: Location-tracking Technology”,
Computer, vol.35, no..4, pp. 92-94.
[4] Huang, J.Y., and Tsai, C.H.. (2008). “Improve GPS Positioning Accuracy with Context
Awareness”, 2008 First IEEE International Conference on Ubi-Media Computing, Lanzhou, China,
pp. 94-99.
[5] Wubbena, G., Andreas, B., Seeber, G., Boder, V. and Hankemeier, P., (1996). “Reducing
Distance Dependant Errors for Real-Time Precise DGPS Applications by Establishing Reference
Station Networks”. In Proceedings of the 9th International Technical Meeting of the Satellite
Division of the Institute of Navigation (ION GPS-96)
[6] Enge, P., Walter, T., Pullen, S., Kee, C., Chao, Y. and Tsai, Y. (1996). “Wide area augmentation
of the global positioning system”. Proceedings of the IEEE, vol. 84 Aug. 1996, pp. 1063–1088.
[7] Qi, H. and Moore, J. B. (2002). “Direct Kalman Filtering Approach for GPS/INS Integration”,
IEEE Trans. Aerosp, Electron. System. vol. 38, no. 2, 2002, pp. 687-693.
[8] Malleswari, B.L., MuraliKrishna, I.V., Lalkishore, K., Seetha, M., Nagaratna, P. H. “The Role of
Kalman Filter in the Modelling of GPS Errors”, Journal of Theoretical and Applied Information
Technology, pp. 95-101.
[9] White, C.E., Bernstein, D. and Kornhauser, Alain L.. (2000). “Some map matching algorithms
for personal navigation assistants”. Transportation Research Part C, No. 8, 2000, pp. 91-108.
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE
COMPUTING IN SOFTWARE-DEFINED WIDE AREA NETWORKS
Felipe Rodriguez Yaguache and Kimmo Ahola
5G Networks & Beyond, Technical Research Centre of Finland (VTT), Espoo, Finland
ABSTRACT
As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology
adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the
opportunities for deploying edge-computing containerized applications running over SD-WAN are
vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the
lack of research focused on service discovery in these scenarios. In this article, an in-house service
discovery solution that works alongside Kubernetes’ master node for allowing improved traffic
handling and better user experience when running micro-services is developed. The service
discovery solution was conceived following a design science research approach. Our research
includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster
that allows us to deploy custom services and delimit the necessary characteristics of our in-house
solution. Also, the implementation's performance is tested based on the required times for updating
the discovery solution according to service updates. Finally, some conclusions and modifications are
pointed out based on the results, while also discussing possible enhancements.
KEYWORDS
SD-WAN, Edge computing, Virtualization, Kubernetes, Containers, Services
For More Details: https://aircconline.com/ijcnc/V11N5/11519cnc07.pdf
Volume Link: https://airccse.org/journal/ijc2019.html
REFERENCES
[1] Padhy, R., Patra, M., Satapathy, S. Virtualization Techniques & Technologies: State-of-The-Art.
Journal of Global Research in Computer Science, 2018, vol. 2, nro.12. ISSN: 2229-371X. Available
https://www.researchgate.net/publication/264884756_VIRTUALIZATION_TECHNIQUES_TEC
HN OLOGIES_STATE-OF-THE-ART.
[2] Horrel, J., Karimullah, A. SD-WAN Set to Transform WAN in Australia. IDC Custom Solutions,
Framingham, 2017.
[3] Jakma, P. Quagga Routing Software Suite. Quagga Routing Suite. Visited: 15.02.2019. Available
at: https://www.quagga.net/
[4] Open Network Operating System (ONOS). ONOS features. Open Networking Foundation & The
Linux Foundation, San Francisco, 2019. Visited 15.02.2019. Available at:
https://onosproject.org/features/
[5] Open Networking Foundation. Atomix. Open Networking Foundation. Visited 15.02.2019.
Available at: https://atomix.io/docs/latest/user-manual/introduction/what-is-atomix/
[6] Kubernetes. DNS for services and pods. The Linux Foundation, San Francisco, 2019. Visited
15.02.2019. Available at: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/
[7] Kubernetes. Access services running on clusters. The Linux Foundation, San Francisco, 2019.
Visited 15.02.2019. Available at: https://kubernetes.io/docs/tasks/administer-cluster/access-cluster-
services/
[8] MetalLB Metal Load-Balancer (MetalLB). Google. Visited 15.02.2019. Available at:
https://metallb.universe.tf/
[9] Stanford-Clark, A., Nipper, A. Message Queuing Telemetry Transport (MQTT). Organization
for the Advancement of Structured Information Standards (OASIS). Visited 15.02.2019. Available
at: http://mqtt.org
[10] Jarraya, Y., Madi, T., Debbabi, M., 2014. A Survey and a Layered Taxonomy of Software
Defined Networking. IEEE Communications Surveys & Tutorials 16,1955–1980. URL:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6805151, doi:
10.1109/COMST.2014.2320094.
[11] Kreutz, D., Ramos, F.M.V. , Esteves Verissimo, P., Esteve Rothenberg, C., Azodolmolky, S.,
Uhlig, S., 2015. Software-Defined Networking: A Comprehensive Survey. Proceedings of the IEEE
103,14– 76. URL: http://ieeexplore.ieee.org/document/6994333/,
doi:10.1109/JPROC.2014.2371999.
[12] Taleb, T., Samdanis, K., Mada, B., Flinck, H., Dutta, S., & Sabella, D. (2017). On Multi-Access
Edge Computing:A Survey of the Emerging 5G Network Edge Cloud Architecture and
Orchestration. IEEE Communications Surveys and Tutorials, 19(3), 1657-1681. [7931566].
https://doi.org/10.1109/COMST.2017.2705720
[13] Eugene, TS., Zhang, Hui. Predicting Internet Network Distance with Coordinates-Based
Approaches. Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and
Communications Societies, 2002, DOI: 10.1109/INFCOM.2002.1019258, ISSN: 0743-166X.
Available at: https://www.cs.rice.edu/~eugeneng/papers/INFOCOM02.pdf
[14] Miao, Rui., Hongyi, Zeng., Changhoon, Kim., Jeongkeun, Lee., Minlan, Yu. SilkRoad: Making
Stateful Layer-4 Load Balancing Fast andCheap Using Switching ASICs. Association for Computing
Machinery’s Special Interest Group on Data Communications (SIGCOMM), 2017, DOI:
10.1145/3098822.3098824, ISBN: 78-1-4503-4653-5/17/08. Available at:
https://eastzone.bitbucket.io/paper/sigcomm17-silkroad.pdf
[15] Changhoon, Kim., Sivaraman, Anirudh., Katta, Naga., Bas, Antonin., Wobker, Lawrence J. In-
band Network Telemetry via Programmable Dataplanes. 2015, Visited 12.05.2019. Available at:
https://pdfs.semanticscholar.org/a3f1/9dc8520e2f42673be7cbd8d80cd96e3ec0c1.pdf?_ga=2.76525
46 8.802012735.1559031914-713298922.1559031914
[16] Ranganathan, R. A highly available and scalable microservice architecture for access
management. Aalto University, 2018. Available at:
https://aaltodoc.aalto.fi/bitstream/handle/123456789/34401/master_Ranganathan_Rajagopalan_201
8. pdf?sequence=1&isAllowed=y
[17] Rodriguez Yaguache F., Ahola K. Enabling Edge Computing Using Container Orchestration
and Software Defined Wide Area Networks. 9th International Conference on Computer Science,
Engineering and Applications (CCSEA 2019), 353-372. ISBN: 978-1-925953-05-3. Available at:
http://aircconline.com/csit/papers/vol9/csit90930.pdf
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY
AND STEGANOGRAPHY
Saleh Saraireh
Department of Communications and Electronic Engineering, Philadelphia University, Amman,
Jordan
ABSTRACT
The information security has become one of the most significant problems in data communication.
So it becomes an inseparable part of data communication. In order to address this problem,
cryptography and steganography can be combined. This paper proposes a secure communication
system. It employs cryptographic algorithm together with steganography. The jointing of these
techniques provides a robust and strong communication system that able to withstand against
attackers. In this paper, the filter bank cipher is used to encrypt the secret text message, it provide
high level of security, scalability and speed. After that, a discrete wavelet transforms (DWT) based
steganography is employed to hide the encrypted message in the cover image by modifying the
wavelet coefficients. The performance of the proposed system is evaluated using peak signal to noise
ratio (PSNR) and histogram analysis. The simulation results show that, the proposed system provides
high level of security.
KEYWORDS
Steganography, Cryptography, DWT, Filter bank, PSNR
For More Details: https://airccse.org/journal/cnc/5313cnc10.pdf
Volume Link: https://airccse.org/journal/ijc2013.html
REFERENCES
[1] Obaida Mohammad Awad Al-Hazaimeh, (2013) "A New Approach for Complex Encrypting and
Decrypting Data" International Journal of Computer Networks & Communications (IJCNC) Vol.5,
No.2.
[2] Katzenbeisser, S. and Petitcolas, F.A.P. 2000, Information Hiding Techniques for Steganography
and Digital Watermarking. Artech House, Inc., Boston, London.
[3] Xinpeng Zhang and Shuozhong Wang, (2005), "Steganography Using MultipleBase Notational
System and Human Vision Sensitivity", IEEE signal processing letters, Vol. 12, No. 1.
[4] Jarno Mielikainen, (2006), "LSB Matching Revisited", IEEE signal processing letters, Vol. 13,
No. 5.
[5] Piyush Marwaha, Paresh Marwaha, (2010), "Visual Cryptographic Steganography in images",
IEEE, 2nd International conference on Computing, Communication and Networking Technologies.
[6] G.Karthigai Seivi, Leon Mariadhasan and K. L. Shunmuganathan, (2012), " Steganography Using
Edge Adaptive Image " IEEE, International Conference on Computing, Electronics and Electrical
Technologies.
[7] Hemalatha S, U Dinesh Acharya, Renuka A and Priya R. Kamath, (2012), " A Secure and High
Capacity Image Steganography Technique", Signal & Image Processing : An International Journal
(SIPIJ) Vol.4, No.1.
[8] Tong L.and Zheng-ding, Q, (2002), "DWT-based color Images Steganography Scheme", IEEE
International Conference on Signal Processing, 2:1568-1571.
[9] Mandal J.K. and Sengupta M., (2010), “Authentication/Secret Message Transformation Through
Wavelet Transform based Subband Image Coding (WTSIC).”, Proceedings of International
Symposium on Electronic System Design, IEEE Conference Publications, pp 225 – 229.
[10] Septimiu F. M., Mircea Vladutiu and Lucian P., (2011),"Secret data communication system
using Steganography, AES and RSA", IEEE 17th International Symposium for Design and
Technology in Electronic Packaging.
[11] H. Tian, K. Zhou, Y. Huang, D. Feng, J. Liu, (2008), "A Covert Communication Model Based
on Least Significant Bits Steganography in Voice over IP", IEEE The 9th International Conference
for Young Computer Scientists, pp. 647-652.
[12] Y. Huang, B. Xiao, H. Xiao, (2008), "Implementation of Covert Communication Based on
Steganography", IEEE International Conference on Intelligent Information Hiding and Multimedia
Signal Processing, pp. 1512-1515.
[13] Cheddad, A, Condell, Joan, Curran, K and McKevitt, Paul,(2008), "Securing Information
Content using New Encryption Method and Steganography", IEEE Third International Conference
on Digital Information Management.
[14] Rasul E., Saed F. and Hossein S, (2009), " Using the Chaotic Map in Image Steganography",
IEEE, International Conference on Signal Processing Systems.
[15] Majunatha R. H. S. and Raja K B, (2010), "High Capacity and Security Steganography using
Discrete Wavelet Transform", International Journal of Computer Science and Security (IJCSS), Vol.
3: Issue (6) pp 462-472.
[16] Saraireh S. and Benaissa M., (2009), “A Scalable Block Cipher Design using Filter Banks and
Lifting over Finite Fields” In IEEE International Conference on Communications (ICC), Dresden,
Germany.
[17] El Safy, R.O, Zayed. H. H, El Dessouki. A, (2009), “An adaptive steganography technique based
on integer wavelet transform,” ICNM International Conference on Networking and Media
Convergence, pp 111-117.
VISUALIZE NETWORK ANOMALY DETECTION BY USING K-MEANS
CLUSTERING ALGORITHM
A. M. Riad1
, Ibrahim Elhenawy2
, Ahmed Hassan3
and Nancy Awadallah1
1
Faculty of Computer Science and Information Systems, Mansoura University, Egypt
2
Faculty of Computer Science and Information Systems ,Zagazig University, Egypt
3
Faculty of Engineering Mansoura University , Egypt
ABSTRACT
With the ever increasing amount of new attacks in today’s world the amount of data will keep
increasing, and because of the base-rate fallacy the amount of false alarms will also increase. Another
problem with detection of attacks is that they usually isn’t detected until after the attack has taken
place, this makes defending against attacks hard and can easily lead to disclosure of sensitive
information. In this paper we choose K-means algorithm with the Kdd Cup 1999 network data set to
evaluate the performance of an unsupervised learning method for anomaly detection. The results of
the evaluation showed that a high detection rate can be achieve while maintaining a low false alarm
rate .This paper presents the result of using k-means clustering by applying Cluster 3.0 tool and
visualized this result by using TreeView visualization tool .
KEYWORDS
Intrusion detection, Clustering, K-means, Kdd Cup 99, Cluster 3.0, Visualization, TreeView
For More Details: https://airccse.org/journal/cnc/5513cnc14.pdf
Volume Link: https://airccse.org/journal/ijc2013.html
REFERENCES
[1] J. F. Nieves ,"Data Clustering for Anomaly Detection in Network Intrusion Detection "
,Research Alliance in Math and Science , August, pp.1-12, 2009 .
[2] L. Portnoy , E. Eskin , S. Stolfo , " Intrusion detection with unlabeled data using clustering",
In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001) ,
Philadelphia , PA,USA ,2001.
[3] E.Eskin, A.Arnold, , M. Prerau, L.Portnoy, S. Stolfo, "A geometric framework for
unsupervised anomaly detection: Detecting intrusions in unlabeled data", Applications of Data
Mining in Computer Security(2002), Norwell, MA, USA, Dec., pp. 78–100,2002.
[4] K. Nyarko, T. Capers, C. Scott, K. Ladeji-Osias,” Network Intrusion Visualization with
NIVA, an Intrusion Detection Visual Analyzer with Haptic Integration”, IEEE, 2002.
[5] K.Labib, V. R. Vemuri, "Anomaly Detection Using S Language Framework: Clustering and
Visualization of Intrusive Attacks on Computer Systems". Fourth Conference on Security and
Network Architectures, SAR'05, Batz sur Mer, France, June 2005
[6] P. Ren , Y. Gao , Z. Li , Y. Chen and B. Watson , “IDGraphs: Intrusion Detection and
AnalysisUsing Histographs” ,IEEE , 2005 .
[7] P. Laskov, K. Rieck, C. Schäfer, K.R. Müller, “Visualization of anomaly detection using
prediction sensitivity”, Proc.of Sicherheit, April 2005, 197- 208.
[8] A. Mitrokotsa, C. Douligeris ,” Detecting Denial of Service Attacks Using Emergent Self-
Organizing Maps” , Signal Processing and Information Technology, 2005. Proceedings of the
Fifth IEEE International Symposium , pp. 375 – 380 ,IEEE,2005.
[9] J. Peng, C. Feng, J.W. Rozenblit , “A Hybrid Intrusion Detection and Visualization System”
, Engineering of Computer Based Systems, 2006. ECBS 2006. 13th Annual IEEE International
Symposium and Workshop , , pp. – 506, IEEE ,2006.
[10] X.Cui, J.Beaver, T. Potok and L.Yang , “Visual Mining Intrusion Behaviors by Using
Swarm Technology” , System Sciences (HICSS), 2011 44th Hawaii International Conference ,
pp. 1 – 7, IEEE 2011.
[11] A.Frei, M. Rennhard ,” Histogram Matrix: Log File Visualization for Anomaly Detection”,
IEEE , 2007 .
[12] L. Dongxia , Z. Yongbo ,” An Intrusion Detection System Based on Honeypot Technology”
,Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on
IEEE, Vol.1,2012 .
[13] M. Jianliang , S. Haikun, B. Ling, "The Application on Intrusion Detection Based on K-
means Cluster Algorithm" , IFITA '09 Proceedings of the 2009 International Forum on
Information , Technology and Applications – Vol.1,pp. 150-152,IEEE ,2009.
[14] B. K. Kumar , A. Bhaskar , “Identifying Network Anomalies Using Clustering Technique
in Weblog Data”, International Journal of Computers & Technology, Vol. 2 No. 3, June, 2012.
[15] S. Akbar , K.Nageswara Rao , J.A.Chandulal ," Intrusion Detection System Methodologies
Based on Data Analysis",International Journal of Computer Applications ,Vol. 5 , No.2 , August
2010.
[16] K.Bharti, S. Shukla, S. Jain ,"Intrusion detection using clustering", IJCCT, Vol.1 , 2010
[17] S.Jain , M. Aalam , M.Doja , “ K-means clustering using weka interface” , Proceedings of
the 4th National Conference; INDIACom, Computing For Nation Development, 2010.
[18] The Third International Knowledge Discovery and Data Mining Tools Competition, May
2002,Available from http://kdd.ics.uci.edu/databases/kddcup99.kddcup99.html.
[19] M. Sabhnani ,G. Serpen, “Application of Machine Learning Algorithms to KDD Intrusion
Detection Dataset within Misuse Detection Context “, In Proceedings of the International
Conference on Machine Learning, Models, Technologies and Applications (MLMTA 2003),
Vol. 1, (2003).
[20] F.S.Gharehchopogh, Neda Jabbari, Zeinab Ghaffari Azar ,“Evaluation of Fuzzy K-Means
And KMeans Clustering Algorithms In Intrusion Detection Systems” , International Journal of
Scientific & Technology Research ,Vol. 1, issue 11, December 2012.
[21] M. E. Elhamahmy, H. N. Elmahdy , I. A. Saroit ,"A New Approach for Evaluating Intrusion
Detection System" , International Journal of Artificial Intelligent Systems and Machine
Learning, Vol. 2, No 11, November 2010 .
[22] Dr.S.Siva Sathya, Dr. R.Geetha Ramani and K.Sivaselvi. "Discriminant Analysis based
Feature Selection in KDD Intrusion Dataset ", International Journal of Computer Applications
31(11):1-7, October 2011.
[23] P. G.Jeya , M. Ravichandran and C. S. Ravichandran ," Efficient Classifier for R2L and
U2R Attacks. International Journal of Computer Applications 45(21):29-32, May 2012 .
[24] F. N. M. Sabri, N. M.Norwawi, K. Seman," "Identifying False Alarm Rates for Intrusion
Detection System with Data Mining", International Journal of Computer Science and Network
Security, VOL. 11 No. 4, April 2011
[25] P. Divya , R. Priya," Clustering Based Feature Selection and Outlier Analysis
",International Journal of Computer Science & Communication Networks, Vol 2(6), pg.647-
652.
[26] C.Ahlberg, B. Shneiderman ,” Visual information seeking: tight coupling of dynamic query
filters with starfield displays” , In proceeding of: Conference on Human Factors in Computing
Systems, CHI 1994, Boston, Massachusetts, USA, pp. 313-317,April 24-28, 1994.
[27] S. Noel , M. Jacobs , P. Kalapa , S. Jajodia “Multiple Coordinated Views for Network
Attack Graphs”, Visualization for Computer Security,.(VizSEC 05). IEEE Workshop on, 99-
106,2005
[28]http://www.researchgate.net/publication/27521564_The_Information_Mural_A_Techniqu
e_for_ Displaying_and_Navigating_Large_Information_Spaces
[29] http://www.ukessays.com/essays/information-technology/intrusion-detection-system-
methodologiesdata-analysis-information-technology-essay.php
[30] http://dl.acm.org/citation.cfm?id=1106724
[31] http://www.computer.org/csdl/proceedings/vizsec/2005/2782/00/27820005-abs.html
[32] http://dl.acm.org/citation.cfm?id=1106719
[33] Ms. P. K. Karmore and MS. S. T. Bodkhe ,"A Survey on Intrusion in Ad Hoc Networks
and its Detection Measures" , International Journal on Computer Science and Engineering
(IJCSE) ,3(5),pp.1896-1903,May 2011 .
[34] http://bonsai.hgc.jp/~mdehoon/software/cluster/cluster3.pdf - Last visiting at 21.06.2013.
On the Migration of a Large Scale Network from IPv4 to IPv6 Environment
Muhammad Yeasir Arafat1
, Feroz Ahmed2
and M Abdus Sobhan3
Department of Electrical and Electronic Engineering, School of Engineering and Computer
Science, Independent University, Bangladesh
ABSTRACT
This work mainly addresses the design a large scale network using dual stack mechanisms. We
focused on the most important theoretical concepts of the IPv6 protocol, such as addressing, address
allocation, routing with the OSPF and BGP protocols and routing protocols performance in dual
stack network using GNS3 and Wireshark simulators. we have a tendency to measure a perfect model
and a true large-scale network atmosphere victimization out there end-to-end activity techniques that
focuses on a large-scale IPv4 and IPv6 backbone and created performance the IPv4 and IPv6
network. In this paper, we compiled IPv6 address planning in large scale network, performance
statistics of each network in terms of TCP throughput, delay jitters, packet loss rate, and round trip
time. It is found that, a minor degradation within the throughput of the TCP, delay jitter, a lower
packet loss rate, and a rather longer round trip time are occurred in a real large scale dual stack
network.
KEYWORDS
IPv6, IPv4, double stack, BGPv4, OSPFv3, ISP, throughput, TCP and RTT
For More Details: https://airccse.org/journal/cnc/6214cnc10.pdf
Volume Link: https://airccse.org/journal/ijc2014.html
REFERENCES
[1] Tahir Abdullah, Shahbaz Nazeer, Afzaal Hussain, “NETWORK MIGRATION AND
PERFORMANCE ANALYSIS OF IPv4 AND IPv6”, European Scientific Journal, vol. 8, No.5, 2013
[2] Lefty Valle-Rosado, Lizzie Narváez-Díaz, Cinhtia González-Segura and Victor Chi-Pech,
“Design and Simulation of an IPv6 Network Using Two Transition Mechanisms”, IJCSI
International Journal of Computer Science Issues, Vol.9, No.6, pp: 60-65, Nov. 2012.
[3] Internet Engineering Task Force (IETF) RFC 6052, 3513, 4291, 6104, http://tools.ietf.org/html/
[4] Febby Nur Fatah, Adang Suhendra , M Akbar Marwan , Henki Firdaus Henki Firdaus ,
“Performance Measurements Analysis of Dual Stack IPv4-IPv6”, Proc. of the Second Intl.
Conference on Advances in Information Technology — AIT, 2013..
[5] Y. Wang, S. Ye, and X. Li, “Understanding Current IPv6 Performance: A Measurement Study”,
10th IEEE Symposium on Computer Communications, June 2005.
[6] Cebrail CIFLIKLI, Ali GEZER and Abdullah Tuncay OZSAHIN, “Packet traffic features of IPv6
and IPv4 protocol traffic, Turk”, J Elec Eng & Comp Science, Vol.20, No5, pp: 727-749, 2012
[7] Alex Hinds, Anthony Atojoko, and Shao Ying Zhu, “Evaluation of OSPF and EIGRP Routing
Protocols for IPv6”, International Journal of Future Computer and Communication (IJFCC), Vol.2,
No.4, pp: 287-291, Aug. 2013.
[8] T. Bates, R. Chandra, D. Katz, and Y. Rekhter, “Multiprotocol Extensions for BGP-4,” Internet
Request for Comments, vol. RFC 4760, Jan. 2007.
[9] Ing. Luis Marrone, Lic. Andr´es Barbieri and Mg. Mat ‘as Robles, “TCP Performance - CUBIC,
Vegas & Reno”, JCS&T, Vol.13, No.1, pp:1-8, April 2013
[10] Kevin R. Fall and W. Richard Stevens, “TCP/IP Illustrated”, volume 1, published by
Addisonwisely professional computer series, Pearson Education, 2012
PERFORMANCE ANALYSIS AND MONITORING OF VARIOUS
ADVANCED DIGITAL MODULATION AND MULTIPLEXING
TECHNIQUES OF F.O.C WITHIN AND BEYOND 400 GB/S.
Sumant Ku. Mohapatra, Ramya Ranjan Choudhury, Rabindra Bhojray and Pravanjan Das
Department of Electronics & Telecommunication Engineering, Trident Academy of
Technology, B.P.U.T, Bhubaneswar, Odisha, India
ABSTRACT
To achieve better calculative performance in optical fiber communication and for simplicity of
implementation different digital modulation, detection and multiplexing techniques are used.
These techniques maximize the spectral efficiency. This paper reviews a tabular comparative
analysis with 3D graphical representation for different optical digital modulation formats and
multiplexing techniques within and beyond 400 Gb/s. In this particular article we survey about
different parameters related to digital fiber optic communication.
KEYWORDS
OFDM, Digital Modulation formats, Multiplexing techniques, QAM & WDM.
For More Details : https://airccse.org/journal/cnc/6214cnc13.pdf
Volume Link : https://airccse.org/journal/ijc2014.html
REFERENCES
[1] K.-P. Ho, “Exact evaluation of the capacity for intensity-modulated direct-detection channels
with optical mplifier noises,” IEEE Photon. Technol. Lett. 17, 858−860 (2005).
[2] T. Pfau, S. Hoffmann, R. Peveling, S. Bhandard, S. Ibrahim, O. Adamczyk, M. Porrmann, R.
Noé and Y. Achiam, “First real-time data recovery for synchronous QPSK transmission with
standard DFB lasers,” IEEE Photon. Technol. Lett. 18, 1907–1909 (2006).
[3] A. Leven, N. Kaneda, U.-V. Koc and Y.-K. Chen, “Coherent receivers for practical optical
communication systems,” in Proceedings of IEEE Conference on Optical Fiber Communications,
(Institute of Electrical and Electronics Engineers, Anaheim, 2007), Paper OThK4.
[4] J. Hongo, K. Kasai, M. Yoshida and M. Nakazawa, “1-Gsymbol/s 64-QAM coherent optical
transmission over 150 km,” IEEE Photon. Technol. Lett. 19, 638–640 (2007).
[5] M. Nazarathy and E. Simony, “Multichip differential phase encoded optical transmission,”
IEEE Photon. Technol. Lett. 17, 1133–1135 (2005).
[6] D. Divsalar and M. Simon, “Multiple-symbol differential detection of MPSK,” IEEE Trans.
Commun. 38, 300–308 (1990).
[7] S. Benedetto and P. Poggiolini, “Theory of polarization shift keying modulation,” IEEE Trans.
Commun. 40, 708−721 (1992).
[8] E. Ip and J.M. Kahn, “Digital equalization of chromatic dispersion and polarization mode
dispersion,” J. Lightwave Technol. 25, 2033-2043 (2007).
[9] S. Tsukamoto, K. Katoh and K. Kikuchi, “Coherent demodulation of optical multilevel
phaseshift-keying signals using homodyne detection and digital signal processing,” IEEE Photon.
Technol. Lett. 18, 1131– 1133 (2006).
[10] C. D. Poole, R. W. Tkach, A. R. Chraplyvy and D. A.Fishman, “Fading in lightwave
systems due to polarization-mode dispersion,” IEEE Photon. Technol. Lett. 3, 68–70 (1991).
[11] H. Bülow, W. Baumert, H. Schmuck, F. Mohr, T. Schulz, F. Küppers and W. Weiershausen,
“Measurement of the maximum speed of PMD fluctuation in installed field fiber,” in Proceedings
of IEEE Conference on Optical Fiber Communications, (Institute of Electrical and Electronics
Engineers, San Diego, 1999), Paper OWE4.
[12] H. Sunnerud, C. Xie, M. Karlsson, R. Samuelsson and P. Andrekson, “A comparison
between different PMD compensation techniques,” J. Lightwave Technol. 20, 368–378 (2002)..
[13] K.-P. Ho, Phase-Modulated Optical Communication Systems, (Springer, New York, 2005).
[14] K.-P. Ho and J. M. Kahn, “Detection technique to mitigate Kerr effect phase noise,” J.
Lightwave Technol. 22, 779−783 (2004).
[15] A. P. T. Lau and J. M. Kahn, “Signal design and detection in presence of nonlinear phase
noise,” J. Lightwave Technol. 25, 3008−3016 (2007).
[16] S.K Mohapatra, R. Bhojray and S.K Mandal, “Analog And Digital Modulation Formats Of
Optical Fiber Communication Within And Beyond 100 Gb/S: A Comparative Overview”,IJECET
Volume 4, Issue 2, March – April, 2013, ISSN-0976-6472(online).
[17] IEEE Std 802.3ba-2010, Amendment to IEEE Std 802.3-2008: Media Access control
parameters, physical layers, and management parameter for 40 Gb/s and 100 Gb/s operation, June
2010. [18] Gizem, Aksahya & Ayese, Ozcan (2009) Coomunications & Networks, NetworkBooks,
ABC Publishers.
[18] P.J. Winzer et al., 10 _ 107-Gb/s NRZ-DQPSK transmission at 1.0 b/s/Hz over 12 _ 100 km
including 6 optical routing nodes, in: Proc. OFC 2007, post deadline paper PDP24.
[19] K. Kikuchi, “Coherent detection of phase-shift keying signals using digital carrier-phase
estimation,” in Proceedings of IEEE Conference on Optical Fiber Communications, (Institute of
Electrical and Electronics Engineers, Anaheim, 2006), Paper OTuI4.
[20] P. Serena, A. Orlandini and A. Bononi, “Parametric-Gain approach to the analysis of
singlechannel DPSK/DQPSK systems with nonlinear phase noise,” J. Lightwave Technol. 24,
2026−2037 (2006).
[21] K.P. Ho and H.C. Wang, “Comparison of nonlinear phase noise and intrachannel four-wave
mixing for RZDPSK signals in dispersive transmission systems,” IEEE Photon. Technol. Lett.
17, 1426−1428 (2005).
[22] K. Kikuchi, “Phase-diversity homodyne detection of multilevel optical modulation with
digital carrier phase estimation,” J. Sel. Top. Quantum Electron. 12, 563−570 (2006).
[23] M. G. Taylor, “Accurate digital phase estimation process for coherent detection using a
parallel digital processor,” in Proceedings ECOC 2005, Glasgow, UK, 2005, Paper Tu4.2.6.
[24] D.-S. Ly-Gagnon, S. Tsukamoto, K. Katoh and K. Kikuchi, “Coherent detection of optical
quadrature phase-shift keying signals with coherent phase estimation,” J. Lightwave Technol. 24,
12–21, (2006).
[25] W. Shieh, X. Yi, and Y. Tang, “Experimental demonstration of transmission of coherent
optical OFDM Systems,” in Proceedings of IEEE Conference on Optical Fiber Communications,
(Institute of Electrical and Electronics Engineers, Anaheim, 2007), Paper OMP2.
[26] W. Shieh and C. Athaudage, “Coherent optical orthogonal frequency division
multiplexing,” Electron. Lett. 42, 587−589 (2006).
[27] N. Cvijetic, L. Xu and T. Wang, “Adaptive PMD compensation using OFDM in long-haul
10 Gb/s DWDM systems,” in Proceedings of IEEE Conference on Optical Fiber
Communications, (Institute of Electrical and Electronics Engineers, Anaheim, 2007), Paper
OTuA5
[28] A. Lowery and J. Armstrong, “Orthogonal-frequency-division multiplexing for optical
dispersion compensation,” in Proceedings of IEEE Conference on Optical Fiber Communications,
(Institute of Electrical and Electronics Engineers, Anaheim, 2007), PaperOTuA4.
[29] J. Jang, K. B. Lee and Y.-H. Lee, “Transmit power and bit allocations for OFDM systems in
a fading channel,” in Proceedings of IEEE GLOBECOM, (Institute of Electrical and Electronics
Engineers, San Francisco, 2003), pp. 858−862.
[30] D.-S. Ly-Gagnon, “Information recovery using coherent detection and digital signal
pocessing for phaseshift- keying modulation formats in optical communication systems,” M.S.
Thesis, University of Tokyo (2004).
[31] Eugen Lach,Wilfried Idler “modulation formats for 100 G and beyond” ELSEIVIER optical
fiber technology 17(2011) 377-386.
[32] J. M. Kahn and K.-P. Ho, “Spectral efficiency limits and modulation/detection techniques
for DWDM Systems,” ,” J. Sel. Top. Quantum Electron. 10, 259–271 (2004).
[33] M. Rohde,C.Caspar,N.Heimes,M.Konitzer,E-J.Bachus and N.Hanik, “Robustness of DPSK
direct detection transmission format in standard fiber WDM systems” Electron.Lett,vol
36,pp.1483-1484,2000.
[34] W. Idler et al., WDM field trial over 764 km SSMF with 16 _ 112 Gb/s NRZDQPSK
copropagating with 10.7 Gb/s NRZ, in: ECOC 2010, paper We.8.C.5.
[35] Sano et al., 14-Tb/s (140 _ 111-Gb/s PDM/WDM) CSRZ-DQPSK transmission over 160
km using 7-THz bandwidth extended L-band EDFAs, in: ECOC 2006, post- Deadline paper
Th4.1.1.
[36] W. Idler et al., 16 _ 112 Gb/s NRZ-DQPSK WDM transmission over 604 km SSMF including
high PMD fibers, in: OECC 2010, paper 9B1-2.
[37] Michael H. Eiselt et al., Requirements for 100-Gb/s metro networks, in: OFC 2009, paper
OTuN6.
[38] Brian Teipen et al., 100 Gb/s DPSK-3ASK modulation format for metro networks:
experimental results, in: ITG Photonische Netze, 2009.
[39] M. Eiselt, B. Teipen, DPSK-3ASK transmission optimization by adapting modulationLevels,
in: APOC 2008, paper 3171-17.
[40] Xiang Liu et al., Transmission of a 448-Gb/s reduced-guard-interval COOFDM signal with
a 60-GHz optical bandwidth over 2000 km of ULAF and five 80-GHz-grid ROADMs, in: OFC
2010, post deadline paper PDPC2.
[41] K. Roberts et al., 100G and beyond with digital coherent signal processing, IEEE Commun.
Mag. (2010) 62–69.
[42] Xiang Zhou, Jianjun Yu, Advanced coherent modulation formats and algorithms: higher-
order multi-level coding for high-capacity system based on 100 Gbps channel, in: OFC 2010, paper
OMJ3.
[43] G. Bosco et al., Performance limits of Nyquist-WDM and CO-OFDM in high speed PM-
QPSK systems,IEEE Photon. Technol. Lett. 22 (2010) 1129–1131.
[44] G. Bosco et al., Performance limits of Nyquist-WDM and CO-OFDM in high speed PM-
QPSK systems,IEEE Photon. Technol. Lett. 22 (2010) 1129–1131.
[45] Xiang Liu et al., Efficient digital coherent detection of a 1.2-Tb/s 24-carrier no-guard-
interval CO-OFDM signal by simultaneously detecting multiple carriers per sampling, in: OFC
2010, paper OWO2.
[46] P. Hofmann, E. E. Basch, S. Gringeri, R. Egorov, D. A. Fishman, and W. A. Thompson,
“DWDM Long Haul Network Deployment for the Verizon GNI Nationwide Network,” Proc.
Optical Fiber Communication Conf. (OFC „05), Vol. 2, (2005).
[47] M. Nakazawa et al., 256 QAM (64 Gb/s) coherent optical transmission over 160 km with an
optical bandwidth of 5.4 GHz, in: OFC 2010, paper OMJ5.
[48] A. Sano et al., 100 _ 120-Gb/s PDM 64-QAM transmission over 160 km using line
widthtolerant pilotless digital coherent detection, in: ECOC 2010, post deadline paper PD2.4.
[49] M. Alfiad et al., Transmission of 11 _ 224 Gb/s POLMUX-RZ-16QAM over 1500 km of
LongLine and pure-silica SMF, in: ECOC 2010, paper We.8.C.2.
[50] T. Xia et al., Field experiment with mixed line-rate transmission (112 Gb/s, 450 Gb/s, and
1.15 Tb/s) over 3560 km of installed fiber using filter less coherent receiver and EDFAs only, in:
OFC 2011, PDPA3.
[51] Y. More et al., 200-km transmission of 100-Gb/s 32-QAM dual-polarization signals using a
digital coherent receiver, in: ECOC 2010, paper 8.4.6.
[52] S. Okamoto et al., 512 QAM (54 Gb/s) coherent optical transmission over 150 km with an
optical bandwidth of 4.1 GHz, in: ECOC 2010, post-deadline paper.
[53] M. Rhode, C. Caspar, N. Heimes, M. Konitzer, E. J. Bachus, and N. Hanik, “ Robustness of
DPSK direct detection transmission format in standard fiber WDM systems,” Electronics Letters,
26(17):1483–1484, August 2000.
[54] C. Wree, J. Leibrich, and W. Rosenkranz, “RZ-DQPSK format with high spectral efficiency
and high robustness towards fiber nonlinearities,” European Conference on Optical
Communication (ECOC), 4(9.6.6), September 2002.
[55] Abhijit Banerjee and B. N. Biswas, “Stability Analysis of a Modified PSK Homodyne Optical
Receiver”, International Journal of Electronics and Communication Engineering & Technology
(IJECET), Volume 3, Issue 2, 2012, pp. 32 - 40, ISSN Print: 0976- 6464, ISSN Online: 0976 –
6472.
[56] C.Xie,L.Moller,H.Haunstein and S.Hunsche “comparison of system tolerance to
polarization mode dispersion between different modulation formats” , IEEE photons.
Technol.Lett.vol.15,pp.1168-1170,Aug.2003
[57] Yu Yu,Bingrong zou,Wenhan Wu and Xinliang zhang “all optical parallel NRZ- DPSK to
RZ-DPSK format conversion at 40 Gb/s based on XPM effect in a single SOA”.
[58] I. Morita et al., High speed transmission technologies for 100-Gb/s-classEthernet, in: ECOC
2007, invited paper Mo1.3.1.
[59] M. Daikoku et al., 100-Gb/s DQPSK transmission experiment without OTDMfor 100G
Ethernet transport, J. Lightw. Technol. 25 (1) (2007).
[60] M. Daikoku, I. Morita, H. Taga, H. Tanaka, T. Kawanishi, T. Sakamoto, T.Miyazaki, T.
Fujita,100 Gb/s DQPSK transmission experiment without OTDMfor 100G Ethernet transport, in:
OFC 2006, post-deadline paper PDP36.
[61] P.J. Winzer et al., 2000 km-WDM transmission of 10 _ 107 Gb/s RZ-DQPSK, in:, ECOC
2006, Cannes, post-deadline paper Th4.1.3.
[62] Xiang Zhou, Jianjun Yu, Mei Du, Guodong Zhang, 2 Tb/s (20 _ 107 Gb/s) RZDQPSK
straight-line transmission over 1005 km of standard single mode fiber (SSMF) without Raman
amplification in: Proc. OFC 2008, paper OMQ3.
[63] G. Raybon et al., 107-Gb/s transmission over 700 km and one intermediate ROADMusing
Lambda Xtreme_ transport system, in: OFC 2008, paper OMQ4.
[64] Mei Du et al., Unrepeatered transmission of 107 Gb/s RZ-DQPSK over 300 km NZDSF
with bi-directional Raman amplification, in: Proc. OFC 2008, paper JThA47.
[65] Brian Teipen, Impact of modulator characteristicson multi-level signal Transmission
performance, in: ITG Workshopp Fachgruppe 5.3.1, 2008 (Kiel).
[66] Brian Teipen et al., 107 Gb/s DPSK-3ASK optical transmission over SSMF, in:OFC 2010,
paper NMB1.
[67] ITU-T Recommendation G.709, Interfaces for the Optical Transport Network (OTN),
December 2009.
[68] M. Eiselt, B.Teipen, DPSK-3ASK transmission optimization by adapting modulation
Levels, in: APOC 2008, paper 3171-17.
[69] D. van den Borne et al., Coherent equalization versus direct detection for 111- Gb/s Ethernet
transport, in: LEOS Summer Topical Meeting, 2008, paper MA2-4.
[70] J.X. Cai et al., 20Tbit/s capacity transmission over 6860 km, in: Proceedings OFC, 2011,
PDPB4.
[71] A.H. Gnauck et al., 10 _ 224-Gb/s WDM transmission of 28-Gbaud PDM 16-QAM on a 50-
GHz grid over 1200 km of fiber, in: OFC 2010, post deadline paper PDPB8.
[72] P.J. Winzer et al., Spectrally efficient long-haul optical networking using 112- Gb/s
polarizationmultiplexed 16-QAM, J. Lighw. Technol. 28 (4) (2010).
[73] M. Alfiad et al., Transmission of 11 _ 224 Gb/s POLMUX-RZ-16QAM over 1500 km of
LongLine and pure-silica SMF, in: ECOC 2010, paper We.8.C.2.
[74] P.J. Winzer et al., Generation and 1200-km transmission of 448-Gb/s ETDM 56-Gbaud
PDM 16-QAM using a single I/Q modulator, in: ECOC 2010, post dead line paper PD2.2.
[75] B.-E. Olsson et al., RF-assisted optical dual-carrier 112 Gb/s polarization multiplexed 16-
QAM transmitter, in: OFC 2010, paper OMK5.
[76] William Shieh, OFDM for adaptive ultra high-speed optical networks, in: OFC2010, paper
OWO1.
[77] Fred Buchali et al., Nonlinear limitations in a joint transmission of 100 Gb/s OOFDM and 40
Gb/s DPSK over a 50 GHz channel grid, in: OFC 2010, paper OTuL4.
[78] S. Chandrasekhar et al., Transmission of a 1.2-Tb/s 24-carrier no-guard interval coherent
OFDM super channel over 7200-km of ultra-large-area fiber, in: ECOC 2009, post- deadline paper
PD 2.6.
[79] Haiying Julie Zhu, Roshdy H.M. Hafez and John Sydor, “Cross Layer Scheduling Algorithms for
Different Rate Traffic OFDM Broadband Wireless Systems ” , IJCNC Vol No.1,No.3,October 2009
[80] Asim M. Mazin and Garth V. Crosby, “Reducing the Peak Average Power Ratio of MIMO- OFDM
Systems”, IJCNC Vol.5, No.3, May 2013.
A DEEP LEARNING TECHNIQUE FOR WEB PHISHING DETECTION
COMBINED URL FEATURES AND VISUAL SIMILARITY
Saad Al-Ahmadi1
and Yasser Alharbi 2
1
College of Computer and Information Science, Computer Science Department, King Saud
University, Riyadh, Saudi Arabia 2
College of Computer and Information Science, Computer
Engineering Department, King Saud University, Riyadh, Saudi Arabia
ABSTRACT
The most popular way to deceive online users nowadays is phishing. Consequently, to increase
cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper,
we propose an approach that rely on websites image and URL to deals with the issue of phishing
website recognition as a classification challenge. Our model uses webpage URLs and images to
detect a phishing attack using convolution neural networks (CNNs) to extract the most important
features of website images and URLs and then classifies them into benign and phishing pages. The
accuracy rate of the results of the experiment was 99.67%, proving the effectiveness of the
proposed model in detecting a web phishing attack.
KEYWORDS
Phishing detection, URL, visual similarity, deep learning, convolution neural network.
For More Details: https://aircconline.com/ijcnc/V12N5/12520cnc03.pdf
Volume Link: https://airccse.org/journal/ijc2020.html
REFERENCES
[1] H. Thakur, “Available Online at www.ijarcs.info A Survey Paper On Phishing Detection,” vol.
7, no. 4, pp. 64–68, 2016.
[2] G. Varshney, M. Misra, and P. K. Atrey, “A survey and classification of web phishing detection
schemes,” Security and Communication Networks. 2016, doi: 10.1002/sec.1674.
[3] E. S. Aung, T. Zan, and H. Yamana, “A Survey of URL-based Phishing Detection,” pp. 1–8,
2019, [Online]. Available: https://db-event.jpn.org/deim2019/post/papers/201.pdf.
[4] S. Nakayama, H. Yoshiura, and I. Echizen, “Preventing false positives in content-based phishing
detection,” in IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding
and Multimedia Signal Processing, 2009, doi: 10.1109/IIH-MSP.2009.147.
[5] A. K. Jain and B. B. Gupta, “Phishing detection: Analysis of visual similarity based approaches,”
Security and Communication Networks. 2017, doi: 10.1155/2017/5421046.
[6] A. Khan, A. Sohail, U. Zahoora, and A. S. Qureshi, “A Survey of the Recent Architectures of
Deep Convolutional Neural Networks,” pp. 1–68, 2019, doi: 10.1007/s10462-020-09825-6.
[7] J. Mao et al., “Phishing page detection via learning classifiers from page layout feature,” Eurasip
J. Wirel. Commun. Netw., 2019, doi: 10.1186/s13638-019-1361-0.
[8] I. F. Lam, W. C. Xiao, S. C. Wang, and K. T. Chen, “Counteracting phishing page polymorphism:
An image layout analysis approach,” in Lecture Notes in Computer Science (including subseries
Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2009, doi:
10.1007/978-3-642- 02617-1_28.
[9] T. C. Chen, T. Stepan, S. Dick, and J. Miller, “An anti-phishing system employing diffused
information,” ACM Trans. Inf. Syst. Secur., vol. 16, no. 4, 2014, doi: 10.1145/2584680.
[10] A. S. Bozkir and E. A. Sezer, “Use of HOG descriptors in phishing detection,” in 4th
International Symposium on Digital Forensics and Security, ISDFS 2016 - Proceeding, 2016, doi:
10.1109/ISDFS.2016.7473534.
[11] F. C. Dalgic, A. S. Bozkir, and M. Aydos, “Phish-IRIS: A New Approach for Vision Based
Brand Prediction of Phishing Web Pages via Compact Visual Descriptors,” ISMSIT 2018 - 2nd Int.
Symp. Multidiscip. Stud. Innov. Technol. Proc., 2018, doi: 10.1109/ISMSIT.2018.8567299.
[12] K. L. Chiew, E. H. Chang, S. N. Sze, and W. K. Tiong, “Utilisation of website logo for phishing
detection,” Comput. Secur., 2015, doi: 10.1016/j.cose.2015.07.006.
[13] K. L. Chiew, J. S. F. Choo, S. N. Sze, and K. S. C. Yong, “Leverage Website Favicon to Detect
Phishing Websites,” Secur. Commun. Networks, 2018, doi: 10.1155/2018/7251750.
[14] Y. Zhou, Y. Zhang, J. Xiao, Y. Wang, and W. Lin, “Visual similarity based anti-phishing with
the combination of local and global features,” in Proceedings - 2014 IEEE 13th International
Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014,
2015, doi: 10.1109/TrustCom.2014.28.
[15] A. P. E. Rosiello, E. Kirda, C. Kruegel, and F. Ferrandi, “A layout-similarity-based approach
for detecting phishing pages,” in Proceedings of the 3rd International Conference on Security and
Privacy in Communication Networks, SecureComm, 2007, doi: 10.1109/SECCOM.2007.4550367.
[16] J. Mao, P. Li, K. Li, T. Wei, and Z. Liang, “BaitAlarm: Detecting phishing sites using similarity
in fundamental visual features,” in Proceedings - 5th International Conference on Intelligent
Networking and Collaborative Systems, INCoS 2013, 2013, doi: 10.1109/INCoS.2013.151.
[17] S. Haruta, H. Asahina, and I. Sasase, “Visual Similarity-Based Phishing Detection Scheme
Using Image and CSS with Target Website Finder,” in 2017 IEEE Global Communications
Conference, GLOBECOM 2017 - Proceedings, 2017, doi: 10.1109/GLOCOM.2017.8254506.
[18] H. Zhang, G. Liu, T. W. S. Chow, and W. Liu, “Textual and visual content-based anti-phishing:
A Bayesian approach,” IEEE Trans. Neural Networks, 2011, doi: 10.1109/TNN.2011.2161999.
[19] E. Medvet, E. Kirda, and C. Kruegel, “Visual-similarity-based phishing detection,” Proc. 4th
Int. Conf. Secur. Priv. Commun. Networks, Secur., no. September 2008, 2008, doi:
10.1145/1460877.1460905.
[20] S. G. Selvaganapathy, M. Nivaashini, and H. P. Natarajan, “Deep belief network based detection
and categorization of malicious URLs,” Inf. Secur. J., vol. 27, no. 3, pp. 145–161, 2018, doi:
10.1080/19393555.2018.1456577.
[21] Y. Ding, N. Luktarhan, K. Li, and W. Slamu, “A keyword-based combination approach for
detecting phishing webpages,” Comput. Secur., vol. 84, pp. 256–275, 2019, doi:
10.1016/j.cose.2019.03.018.
[22] H. huan Wang, L. Yu, S. wei Tian, Y. fang Peng, and X. jun Pei, “Bidirectional LSTM Malicious
webpages detection algorithm based on convolutional neural network and independent recurrent
neural network,” Appl. Intell., vol. 49, no. 8, pp. 3016–3026, 2019, doi: 10.1007/s10489-019-01433-
4.
[23] M. Zouina and B. Outtaj, “A novel lightweight URL phishing detection system using SVM and
similarity index,” Human-centric Comput. Inf. Sci., vol. 7, no. 1, pp. 1–13, 2017, doi:
10.1186/s13673-017-0098-1.
[24] S. Parekh, D. Parikh, S. Kotak, and S. Sankhe, “A New Method for Detection of Phishing
Websites: URL Detection,” Proc. Int. Conf. Inven. Commun. Comput. Technol. ICICCT 2018, no.
Icicct, pp. 949–952, 2018, doi: 10.1109/ICICCT.2018.8473085.
[25] H. Le, Q. Pham, D. Sahoo, and S. C. H. Hoi, “URLNet: Learning a URL Representation with
Deep Learning for Malicious URL Detection,” no. i, 2018, [Online]. Available:
http://arxiv.org/abs/1802.03162.
[26] J. Saxe and K. Berlin, “eXpose: A Character-Level Convolutional Neural Network with
Embeddings For Detecting Malicious URLs, File Paths and Registry Keys,” 2017, [Online].
Available: http://arxiv.org/abs/1702.08568.
[27] K. Shima et al., “Classification of URL bitstreams using bag of bytes,” 21st Conf. Innov. Clouds,
Internet Networks, ICIN 2018, pp. 1–5, 2018, doi: 10.1109/ICIN.2018.8401597.
[28] R. Vinayakumar, K. P. Soman, and P. Poornachandran, “Evaluating deep learning approaches
to characterize and classify malicious URL’s,” J. Intell. Fuzzy Syst., vol. 34, no. 3, pp. 1333–1343,
2018, doi: 10.3233/JIFS-169429.
[29] O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing detection
from URLs,” Expert Syst. Appl., vol. 117, pp. 345–357, 2019, doi: 10.1016/j.eswa.2018.09.029.
[30] W. Wang, F. Zhang, X. Luo, and S. Zhang, “PDRCNN: Precise Phishing Detection with
Recurrent Convolutional Neural Networks,” Secur. Commun. Networks, 2019, doi:
10.1155/2019/2595794.
[31] S. Khan, H. Rahmani, S. A. A. Shah, and M. Bennamoun, “A Guide to Convolutional Neural
Networks for Computer Vision,” Synth. Lect. Comput. Vis., 2018, doi:
10.2200/s00822ed1v01y201712cov015.
[32] V. Karthikeyani and S. Nagarajan, “Machine Learning Classification Algorithms to Recognize
Chart Types in Portable Document Format (PDF) Files,” Int. J. Comput. Appl., 2012, doi:
10.5120/4789- 6997.
[33] M. A. Adebowale, K. T. Lwin, and M. A. Hossain, “Deep learning with convolutional neural
network and long short-term memory for phishing detection,” 2019 13th Int. Conf. Software,
Knowledge, Inf. Manag. Appl. Ski. 2019, no. March 2019, doi:
10.1109/SKIMA47702.2019.8982427.
[34] C. Opara, B. Wei, and Y. Chen, “HTMLPhish: Enabling Phishing Web Page Detection by
Applying Deep Learning Techniques on HTML Analysis,” no. October 2018, 2019, [Online].
Available: http://arxiv.org/abs/1909.01135.
A COMPREHENSIVE STUDY OF DSCP MARKINGS' IMPACT ON
VOIP QOS IN HFC NETWORKS
Shaher Daoud and Yanzhen Qu
School of Computer Science, Colorado Technical University, Colorado Springs, USA
ABSTRACT
Various factors can have a significant degrading impact on the residential Voice over Internet
Protocol (VoIP) phone services’ quality. Hybrid fibre- coaxial (HFC) networks typically carry three
types of traffic that include voice, data, and video. Unlike data and video, some delays or packet loss
can result in a noticeable degraded impact on a VoIP’s phone conversation. This paper will analyze
and assess VoIP traffic prioritization and its impact on VoIP’s quality of service (QoS) based on the
concept of differentiated services code point (DSCP) markings. Call testing examines two types of
calls. The first set of tests focus on calls that originate from a VoIP network and terminate on a
signalling system 7 (SS7) network. The second experiment focuses on calls that originate from SS7
network and terminate on a VoIP network. The research results provide DSCP markings
configurations that can improve phone conversations’ quality.
KEYWORDS
QoS , VoIP, DSCP Marking , jitter, HFC Network, MOS.
For More Details: https://aircconline.com/ijcnc/V11N5/11519cnc01.pdf
Volume Link: https://airccse.org/journal/ijc2019.html
REFERENCES
[1] Daoud, S., & Qu, Y. (2019). A Comparison Research on DSCP Marking’s Impact to the QoS
of VoIP-based and SS7-based Phone Calls.
[2] Daoud, S., & Qu, Y. (2019). Optimizing DSCP Marking to Ensure VoIP’s QoS over HFC
Network.
[3] Mathiyalakan, S. (2015). VoIP adoption: Issues & concerns. Communications of the IIMA,
6(2), 3.
[4] Khitmoh, N., Wuttidittachotti, P., & Daengsi, T. (2014, February). A subjective—VoIP quality
estimation model for G. 729 based on native Thai users. In Advanced Communication Technology
(ICACT), 2014 16th International Conference on (pp. 48-53). IEEE.
[5] Xiao, Y., Qu, G., & Kiseon, K. (2015). A new DiffServ edge router with controlled UDP.
Chinese Journal of Electronics, 24(1).
[6] Kamarudin, I. E., Sharif, S. A. M., & Herawan, T. (2013). Performance analysis on the effect
of G. 729, Speex and GSM speech codec on 802.11 g wireless local area network over VoIPvusing
packet jitter. International Journal of Control and Automation, 6(4), 387-395.
[7] Broß, J. F., & Meinel, C. (2008). Can VoIP live up to the QoS standards of traditional wireline
telephony? In Telecommunications, 2008. AICT'08. Fourth Advanced International Conference
on (pp. 126-132). IEEE.
[8] Singh, P. & Kaur, R. (2014). VOIP over Wimax: A comprehensive review. International
Journal of Computer Science & Information Technologies, 5(4).
[9] Yuan, Z. (2002). SIP-based VoIP network and its interworking with the PSTN. Electronics &
Communication Engineering Journal, 14(6), 273-282.
[10] Ali, M. A., Rashid, I., & Khan, A. A. (2013). Selection of VoIP CODECs for different
networks based on QoS analysis. International Journal of Computer Applications (IJCA), 84(5),
14575-2702.
[11] Chen, J. J., Lee, L., & Tseng, Y. C. (2011). Integrating SIP and IEEE 802.11 e to support
handoff and multi-grade QoS for VoIP-over-WLAN applications. Computer Networks, 55(8),
1719-1734.
[12] Assem, H., Malone, D., Dunne, J., & O'Sullivan, P. (2013, January). Monitoring VoIP call
quality using improved simplified E-model. In Computing, Networking and Communications
(ICNC), 2013 International Conference on (pp. 927-931). IEEE.
[13] FCC. (2013, June). Local telephone competition: Status as of June30, 2012.
[14] FCC. (2014, June). FCC releases new data on Internet access services and local telephone
competition.
[15] Vijayakumar, M., Karthikeyani, V., & Omar, M. (2013). Implementation of queuing
algorithm in multipath dynamic routing architecture for effective and secured data transfer in
VoIP. International Journal of Engineering Trends and Technology, 4(4), 1226-1230.
[16] Gray, R. M. (2005). The 1974 origins of VoIP. Signal Processing Magazine, IEEE, 22(4), 87-
90.
[17] Vlaovic, B., & Brezocnik, Z. (2001, July). Packet based telephony. InEUROCON'2001,
Trends in Communications, International Conference on. (Vol. 1, pp. 210-213). IEEE.
[18] Bridova, I., Vaculik, M., & Brida, P. (2011). Impact of background traffic on VoIP QoS
parameters in GPON upstream link. Electronics and Electrical Engineering.–Kaunas:
Technologija, (1), 104.
[19] Naeem, M., Naz, S., & Asghar, S. (2013). QoS guarantee for VOIP over wireless LANs.
International Journal of Hybrid Information Technology, 6(3), 25-32.
[20] Mohammed, H. A., Ali, A. H., & Mohammed, H. J. (2013). The affects of different queuing
algorithms within the router on QoS VoIP application using OPNET. arXiv preprint
arXiv:1302.1642.
[21] Rivas, F. J., Díaz, A., & Merino, P. (2013). Obtaining more realistic cross-layer QoS
measurements: A VoIP over LTE Use Case. Journal of Computer Networks and Communications,
2013.
[22] Mahajan, S., & Chopra, V. (2013). Performance evaluation of MANET routing protocols with
scalability using QoS metrics of VOIP applications. International Journal, 3(2).
[23] Chen, J. J., Lee, L., & Tseng, Y. C. (2011). Integrating SIP and IEEE 802.11 e to support
handoff and multi-grade QoS for VoIP-over-WLAN applications. Computer Networks, 55(8),
1719-1734.
[24] Miraz, M. H., Molvi, S. A., Ali, M., Ganie, M. A., & Hussein, A. H. (2017). Analysis of QoS
of VoIP traffic through WiFi-UMTS networks. arXiv preprint arXiv:1708.05068.
[25] Charonyktakis, P., Plakia, M., Tsamardinos, I., & Papadopouli, M. (2016). On user-centric
modular qoe prediction for voip based on machine-learning algorithms. IEEE Transactions on
mobile computing, 15(6), 1443-1456.
[26] Silva, S., Soares, S., Reis, M. J., Neves, F., & Assuncao, P. A. (2017, July). A dynamic
programming algorithm to select optimal high-priority voice segments using Arduino. In IEEE
EUROCON 2017- 17th International Conference on Smart Technologies (pp. 271-276). IEEE.
[27] Baharudin, M. A. B., Quang, T. M., & Kamioka, E. (2015). Improvement of handover
performance based on bio-inspired approach with received signal strength and mean opinion score.
Arabian Journal for Science and Engineering, 40(6), 1623-1636.
[28] ITU-T. (1996). Methods for objective and subjective assessment of quality. ITU-T
Recommendation, 830.
[29] Al-Sayyed, R., Pattinson, C., & Dacre, T. (2007, February). VoIP and database traffic
coexistence over IEEE 802.11 b WLAN with redundancy. In Proceedings of the International
Conference on Computer, Information and Systems Science and Engineering (pp. 25-27).
[30] Vijayakumar, M., Karthikeyani, V., & Omar, M. (2013). Implementation of queuing
algorithm in multipath dynamic routing architecture for effective and secured data transfer in
VoIP. International Journal of Engineering Trends and Technology, 4(4), 1226-1230.
[31] Chen, S., Wang, X., & Jajodia, S. (2006). On the anonymity and traceability of peer-to-peer
VoIP calls. IEEE Network, 20(5), 32-37.
[32] Ahmed, D. T., & Shirmohammadi, S. (2012). Improving online gaming experience using
location awareness and interaction details. Multimedia Tools and Applications, 61(1), 163-180.
[33] Englander, M. (2012). The interview: Data collection in descriptive phenomenological human
scientific research*. Journal of Phenomenological Psychology, 43(1), 13-35.
[34] Martinek, R., & Zidek, J. (2012). Application of synthetic instrumentation that applies the
trend of software-based approach for measuring on the field of modern wireless transfer systems.
International Journal of Digital Information and Wireless Communications (IJDIWC), 2(3), 208-
221.
[35] Creswell, J. (2013). Qualitative inquiry and research design: choosing among five approaches.
Los Angeles: SAGE Publications.
[36] Raychaudhuri, D., Seskar, I., Ott, M., Ganu, S., Ramachandran, K., Kremo, H., ... & Singh,
M. (2005, March). Overview of the ORBIT radio grid testbed for evaluation of nextgeneration
wireless network protocols. In Wireless Communications and Networking Conference, 2005 IEEE
(Vol. 3, pp. 1664- 1669). IEEE.

More Related Content

Similar to February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf

IRJET- A Wearable Device Data Sharing and Collaboration in Mobile Healthcare ...
IRJET- A Wearable Device Data Sharing and Collaboration in Mobile Healthcare ...IRJET- A Wearable Device Data Sharing and Collaboration in Mobile Healthcare ...
IRJET- A Wearable Device Data Sharing and Collaboration in Mobile Healthcare ...IRJET Journal
 
Interenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare NetworkInterenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare NetworkIstabraq M. Al-Joboury
 
A literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemA literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemBRNSSPublicationHubI
 
Predictive Data Mining for Converged Internet of
Predictive Data Mining for Converged Internet ofPredictive Data Mining for Converged Internet of
Predictive Data Mining for Converged Internet ofJames Kang
 
IRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno MicrocontrollerIRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno MicrocontrollerIRJET Journal
 
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docxMMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx4934bk
 
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...IRJET Journal
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
 
electronics-11-02668-v2.pdf
electronics-11-02668-v2.pdfelectronics-11-02668-v2.pdf
electronics-11-02668-v2.pdfmokamojah
 
Transforming Healthcare Industry by Implementing Cloud Computing
Transforming Healthcare Industry by Implementing Cloud ComputingTransforming Healthcare Industry by Implementing Cloud Computing
Transforming Healthcare Industry by Implementing Cloud Computingijtsrd
 
The internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive surveyThe internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive surveyredpel dot com
 
Iot based intelligent medicine box 1
Iot based intelligent medicine box 1Iot based intelligent medicine box 1
Iot based intelligent medicine box 1sidsingh680
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
 
Ecis final paper-june2017_two way architecture between iot sensors and cloud ...
Ecis final paper-june2017_two way architecture between iot sensors and cloud ...Ecis final paper-june2017_two way architecture between iot sensors and cloud ...
Ecis final paper-june2017_two way architecture between iot sensors and cloud ...Oliver Neuland
 
IRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoTIRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoTIRJET Journal
 
Survey on IoT Based Health Monitoring System: “IoT Based Biomedical Instrumen...
Survey on IoT Based Health Monitoring System: “IoT Based Biomedical Instrumen...Survey on IoT Based Health Monitoring System: “IoT Based Biomedical Instrumen...
Survey on IoT Based Health Monitoring System: “IoT Based Biomedical Instrumen...IRJET Journal
 

Similar to February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf (20)

IRJET- A Wearable Device Data Sharing and Collaboration in Mobile Healthcare ...
IRJET- A Wearable Device Data Sharing and Collaboration in Mobile Healthcare ...IRJET- A Wearable Device Data Sharing and Collaboration in Mobile Healthcare ...
IRJET- A Wearable Device Data Sharing and Collaboration in Mobile Healthcare ...
 
Interenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare NetworkInterenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare Network
 
A literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemA literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring System
 
Predictive Data Mining for Converged Internet of
Predictive Data Mining for Converged Internet ofPredictive Data Mining for Converged Internet of
Predictive Data Mining for Converged Internet of
 
IRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno MicrocontrollerIRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
 
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docxMMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
 
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
 
electronics-11-02668-v2.pdf
electronics-11-02668-v2.pdfelectronics-11-02668-v2.pdf
electronics-11-02668-v2.pdf
 
Machine learning classifiers for fall detection leveraging LoRa communicatio...
Machine learning classifiers for fall detection leveraging LoRa  communicatio...Machine learning classifiers for fall detection leveraging LoRa  communicatio...
Machine learning classifiers for fall detection leveraging LoRa communicatio...
 
Transforming Healthcare Industry by Implementing Cloud Computing
Transforming Healthcare Industry by Implementing Cloud ComputingTransforming Healthcare Industry by Implementing Cloud Computing
Transforming Healthcare Industry by Implementing Cloud Computing
 
The internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive surveyThe internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive survey
 
Iot based intelligent medicine box 1
Iot based intelligent medicine box 1Iot based intelligent medicine box 1
Iot based intelligent medicine box 1
 
Role of Technology & Importance in Tracking Healthcare Services
Role of Technology & Importance in Tracking Healthcare Services Role of Technology & Importance in Tracking Healthcare Services
Role of Technology & Importance in Tracking Healthcare Services
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...
 
Ecis final paper-june2017_two way architecture between iot sensors and cloud ...
Ecis final paper-june2017_two way architecture between iot sensors and cloud ...Ecis final paper-june2017_two way architecture between iot sensors and cloud ...
Ecis final paper-june2017_two way architecture between iot sensors and cloud ...
 
IRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoTIRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoT
 
Survey on IoT Based Health Monitoring System: “IoT Based Biomedical Instrumen...
Survey on IoT Based Health Monitoring System: “IoT Based Biomedical Instrumen...Survey on IoT Based Health Monitoring System: “IoT Based Biomedical Instrumen...
Survey on IoT Based Health Monitoring System: “IoT Based Biomedical Instrumen...
 

More from IJCNCJournal

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksIJCNCJournal
 

More from IJCNCJournal (20)

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
 

Recently uploaded

Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf

  • 1. February 2024: Top 10 Read Articles in Computer Networks & Communications International Journal of Computer Networks& Communications (IJCNC) http://airccse.org/journal/ijcnc.html (Scopus, ERA Listed, WJCI Indexed) Scopus Cite Score 2022—1.8 ISSN 0974 - 9322 (Online); 0975 - 2293 (Print) Citations, h-index, i10-index
  • 2. REAL TIME WIRELESS HEALTH MONITORING APPLICATION USING MOBILE DEVICES Amna Abdullah, Asma Ismael, Aisha Rashid, Ali Abou-ElNour, and Mohammed Tarique Department of Electrical Engineering, Ajman University of Science and Technology, P.O. Box 2202, Fujairah, United Arab Emirates ABSTRACT In the last decade the healthcare monitoring systems have drawn considerable attentions of the researchers. The prime goal was to develop a reliable patient monitoring system so that the healthcare professionals can monitor their patients, who are either hospitalized or executing their normal daily life activities. In this work we present a mobile device based wireless healthcare monitoring system that can provide real time online information about physiological conditions of a patient. Our proposed system is designed to measure and monitor important physiological data of a patient in order to accurately describe the status of her/his health and fitness. In additionthe proposed system is able to send alarming message about the patient’s critical health data by text messages or by email reports. By using the information contained in the text or e-mail message the healthcare professional can provide necessary medical advising. The system mainly consists of sensors, the data acquisition unit, microcontroller (i.e., Arduino), and software (i.e., LabVIEW). The patient’s temperature, heart beat rate, muscles, blood pressure, blood glucose level, and ECG data are monitored, displayed, and stored by our system. To ensure reliabilityand accuracy the proposed system has been field tested. The test results show that our system is able to measure the patient’s physiological data with a very high accuracy. KEYWORDS ZigBee, remote healthcare, mobile device, patient monitoring, LabView For More Details: https://airccse.org/journal/cnc/7315cnc02.pdf Volume Link: https://airccse.org/journal/ijc2015.html
  • 3. REFERENCES [1] Global Challenges for Humanity available at http://www.millenniumproject.org/millennium/challenges.html [2] A Right to Health available at http://www.who.int/mediacentre/factsheets [3] FRANCIS S. COLLINS, “MOBILE TECHNOLOGY AND HEALTHCARE”, AVAILABLE at http://www.nlm.nih.gov/medlineplus/magazine/issues/winter11 [4] How the Smartphone Can Revolutionize Healthcare available at http://www.mdtmag.com/ [5] mHealth App Developer Economics(2014) available at http://mhealtheconomics.com/mhealthdeveloper-economics-report/ [6] Bourouis, A., Feham, M., and Bouchachia, A.(2011), “ Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE)”, International Journal of Computer Science and Information Technology, Vol.2, No. 3, June, pp. 74-82 [7] Lee, Y.D. and Chung, W.Y. (2009) “Wireless Sensor Network Based Wearable Smart Shirt for Ubiquitous Health and Activity Monitoring”, Sensors and Actuators B: Chameical, Vol. 140, No. 2, July, pp. 390-395 [8] Orlando R. E. P., Caldeira, M. L. P. Lei S., and Rodrigues, J.P.C (2014), “An Efficient and Low Cost Windows Mobile BSN Monitoring SystemBased on TinyOS”, Journal of Telecommunication Systems, Vol. 54, No. 1, pp. 1-9 [9] Yuce, M. R.(2010)” Implementation of wireless body area networks for healthcare systems”, Sensor and Actuators A:Physical, Vol. 162, No. 1, July, pp. 116-129 [10] Lei Clifton, David A. Clifton, Marco A. F. Pimentel, Peter J. Watkinson, and Lionel Tarassenko (2014),” Predictive Monitoring of Mobile Patients by Combining Clinical Observations with Data From Wearable Sensors”, IEEE Journal of Biomedical and Health Informatics, Vol. 18, No. 3, May , pp. 722-730 [11] Parane, K.A., Patil, N.C. ; Poojara, S.R. ; Kamble, T.S(2014) “Cloud based Intelligent Healthcare Monitoring System”, In the proceedings of International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), February 7-8, Ghaziabad, Indian, pp. 697-701 [12] Xiaoliang Wang ; Qiong Gui ; Bingwei Liu ; Zhanpeng Jin et al (2014), “Enabling Smart Personalized Healthcare: A Hybrid Mobile-Cloud Approach for ECG Telemonitoring”, IEEE Journal of Biomedical and Health Informatics, Vol. 18, No. 3, May, pp. 739 – 745 [13] Dunsmuir, D., Payne, B. ; Cloete, G. ; Petersen, C.(2014), “Development of m-Health Applications for Pre-eclampsia Triage”, IEEE Journal of Biomedical and Health Informatics, Vol. PP, No. 99, January , pp. 2168-2194
  • 4. [14] Tello, J.P. ; Manjarres, O. ; Quijano, M. ; Blanco, A. et al(2013) , “ Remote Monitoring System of ECG and Human Body Temperature Signals”, IEEE Latin American Transaction, Vol. 11, No. 1, February, pp. 314-318 [15] Moreira, H. ; Oliveira, R. ; Flores, N.(2013), “STAlz: Remotely supporting the diagnosis, tracking and rehabilitation of patients with Alzheimer's”, In the Proceedings of the 15th IEEE Conference on E-health Networking, Applications, and Services, October 9-12, Lisbob, pp. 580- 584 [16] Touati, F. ; Tabish, R. ; and Ben Mnaouer, A.(2013), “Towards u-health: An indoor 6LoWPAN based platform for real-time healthcare monitoring”, In the proceedings of the IFIP International Conference on Wireless and Mobile Networking, April 20-23, 2013,Dubai, pp. 1-4 [17] Strisland, F. ; Sintef,; Svagard, I. ; Seeberg, T.M.(2013) “ESUMS: A mobile system for continuous home monitoring of rehabilitation patient”, In the proceedings of the 35th IEEE Annual International Conference on Engineering in Medicine and Biology Society, July 3-7, 2013, Osaka, pp. 4670-4673 [18] Yun-Hong Noh ; Jiunn Huei Yap ; and Do-Un Jeong(2013) “Implementation of the Abnormal ECG Monitoring System Using Heartbeat Check Map Technique”, In the proceedings of International Conference on IT Convergence and Security, December 16-18, 2013, Macao, pp. 1-4 [19] Triantafyllidis, A.K. ; Koutkias, V.G. ; Chouvarda, I. ; Maglaveras, N.(2013) “A Pervasive Health System Integrating Patient Monitoring, Status Logging, and Social Sharing”, IEEE Journal on Biomedical and Health Informatics, Vol. 17, No. 1, January , pp. 30-37 [20] Bin Yu ; Lisheng Xu ; Yongxu Li(2012) “Bluetooth Low Energy (BLE) based mobile electrocardiogram monitoring system”, In the proceedings of International Conference on Information and Automation, June 6-8, 2012, Shenyang, pp. 763-767 [21] Mitra, P. ; Poellabauer, C.(2012) ,” Emergency response in smartphone-based Mobile Ad- Hoc Networks”, In the proceedings of IEEE International Conference on Communication, June 10-15, Ottawa, pp. 6091 - 6095 [22] Ospino, M.R. ; Ariza, L.C. ; Rojas, J.G., (2012), ”Mobile system for monitoring measurements in hypertensive patients”, In the proceedings of the IEEE Colombian Communication conference, May 16-18, CA, pp. 1-6 [23] Ruipeng Gao ; Liqiong Yang ; Xinyu Wu ; and Tao Wang, (2012) “A phone-based e-health system for OSAS and its energy issue”, In the proceedings of the International Symposium on Information Technology in Medicine and Education, August 3-5, 2012, Hokodate, Hokkaido, pp. 682-696 [24] https://www.zigbee.org/
  • 5. [25] The IEEE 802.15.4 standard available at http://standards.ieee.org/getieee802/download/802.15.4d2009.pdf Bluetooth Developer Portal available at https://developer.bluetooth.org/TechnologyOverview/Pages/Compare.aspx DYNAMIC ROUTING OF IP TRAFFIC BASED ON QOS PARAMETERS Martin Kriška1 , Jozef Janitor2 and Peter Fecilak3
  • 6. 1Computer Networks Laboratory, Technical University of Kosice, Slovakia 2 Institute of Computer Technology, Technical University of Kosice, Slovakia 3Department of Computers and Informatics, Technical University of Kosice, Slovakia ABSTRACT The article looks into the current state of the art of dynamic routing protocols with respect to their possibilities to react to changes in the Quality of Service when selecting the best route towards a destination network. New options that could leverage information about the ever changing QoS parameters for data communication are analysed and a Cisco Performance Routing solution is described more in detail. The practical part of this work focuses on a design and implementation of a test bed that provides a scalable laboratory architecture to manipulate QoS parameters of different data communications flowing through it. The test bed is used in various use cases that were used to evaluate Cisco Performance Routing optimization capabilitiesin different scenarios. KEYWORDS Performance Routing, PfR, Quality of Service, QoS, Optimized Edge Routing For More Details: https://airccse.org/journal/cnc/6414cnc02.pdf Volume Link: https://airccse.org/journal/ijc2014.html
  • 7. REFERENCES [1] Information Sciences Institute, University of Southern California. RFC 791 INTERNET PROTOCOL - DARPA INTERNET PROGRAM, PROTOCOL SPECIFICATION. s.l. : Internet Engineering Task Force, 1981. [2] Cisco Systems, Inc. Route Selection in Cisco Routers. Cisco. [Online] 2008. [Date: 25th of October 2013.] http://www.cisco.com/image/gif/paws/8651/21.pdf. [3] D. Savage, et. al.: Enhanced Interior Gateway Routing Protocol. IETF. [Online] 2013 [Date: 25th of October 2013.] http://tools.ietf.org/html/draft-savage-eigrp-00. [4] Teare Diane: Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide. Indianapolis: Cisco Press, 2010. ISBN 1587058820. [5] Cisco Systems, Inc. BGP Best Path Selection Algorithm. Cisco. [Online] 2012. [Date: 25th of October 2013.] http://www.cisco.com/image/gif/paws/13753/25.pdf. [6] Doyle Jeff, Carroll Jennifer: CCIE Professional Development Routing TCP/IP Volume I. Indianapolis: Cisco Press, 2006. ISBN 1587052024. [7] D. Awduche, et. al.: RSVP-TE: Extensions to RSVP for LSP Tunnels. IETF. [Online] 2013 [Date: 11th of November 2013.] http://tools.ietf.org/html/rfc3209. [8] X. Fu, et. al.: RSVP-TE extensions for Loss and Delay Traffic Engineering. IETF. [Online] 2013 [Date: 11th of November 2013.] http://tools.ietf.org/html/draft-fuxh-mpls-delay-loss-rsvp- te-ext02. [9] Z. Seils. Defining SDN Overview of SDN Terminology & Concepts. Cisco. [Online] 2013. [Date: 4 th of October 2013.] https://learningnetwork.cisco.com/docs/DOC-21946. [10] Cisco Systems, Inc. onePK Chat and Demo at Cisco Live. SlideShare. [Online] 2012. [Date: 4th of October 2013.] http://www.slideshare.net/getyourbuildon/onepk-chat-and-demo-at-cisco- live. [11] S. Cadora. Hitchhiker's Guide to onePK. Cisco. [Online] 2013. [Date: 12th of September 2013.] https://learningnetwork.cisco.com/docs/DOC-22910. [12] R. Trunk. Understanding Performance Routing (PfR). Chesapeake Netcraftsmen. [Online] 2009. [Date: 15th of November 2013.] http://netcraftsmen.net/archived-documents/c-mug- articlearchive/7-20090922-cmug-understanding-performance-routing/file.html?limit=10. [13] Kalita Hemanta Kumar, Nambiar Manoj K.: Designing WANem: A Wide Area Network Emulator tool. Bangalore, 2011. ISBN 9780769546186. [14] R. Pandi Selvam, V.Palanisamy: An efficient cluster based approach for multi-source multicast routing protocol in mobile ad hoc networks, International Journal of Computer
  • 8. GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin School of Computer Sciences, Universiti Sains Malaysia, Malaysia ABSTRACT Today, Global Positioning System (GPS) is widely used in almost every aspect of our daily life. Commonly, users utilize the technology to track the position of a vehicle or an object of interest. They also use it to safely navigate to the destination of their choice. As a result, there are countless number of GPS based tracking application that has been developed. But, a main recurring issue that exists among these applications are the inaccuracy of the tracking faced by users and this issue has become a rising concern. Most existing research have examined the effects that the inaccuracy of GPS have on users while others identified suitable methods to improve the accuracy of GPS based on one or two factors. The objective of this survey paper is to identify the common factors that affects the accuracy of GPS and identify an effective method which could mitigate or overcome most of those factors. As part of our research, we conducted a thorough examination of the existing factors for GPS inaccuracies. According to an initial survey that we have collected, most of the respondents has faced some form of GPS inaccuracy. Among the common issues faced are inaccurate object tracking and disconnection of GPS signal while using an application. As such, most of the respondents agree that it is necessary to improve the accuracy of GPS. This leads to another objective of this paper, which is to examine and evaluate existing methods as well as to identify the most effective method that could improve the accuracy of GPS. KEYWORDS GPS, accuracy factors, improve accuracy, global positioning system For More Details: https://aircconline.com/ijcnc/V8N2/8216cnc11.pdf Volume Link: https://airccse.org/journal/ijc2016.html
  • 9. REFERENCES [1] Lin, J.Y, Yang, B.K., Tuan A.D., and Chen, H.C. (2013). “The Accuracy Enhancement of GPS Track in Google Map”, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, Compiegne, France. pp. 524-527. [2] Iqbal, A., Mahmood. H., Farooq, U., Kabir, M.A. and Asad, M.U.. (2009). “An Overview of the Factors Responsible for GPS Signal Error: Origin and Solution”, 2009 International Conference on Wireless Networks and Information Systems, Shanghai, China. pp. 294-299. [3] Bajaj, R., Ranaweera, S.L., Agrawal, D.P.. (2002). “GPS: Location-tracking Technology”, Computer, vol.35, no..4, pp. 92-94. [4] Huang, J.Y., and Tsai, C.H.. (2008). “Improve GPS Positioning Accuracy with Context Awareness”, 2008 First IEEE International Conference on Ubi-Media Computing, Lanzhou, China, pp. 94-99. [5] Wubbena, G., Andreas, B., Seeber, G., Boder, V. and Hankemeier, P., (1996). “Reducing Distance Dependant Errors for Real-Time Precise DGPS Applications by Establishing Reference Station Networks”. In Proceedings of the 9th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GPS-96) [6] Enge, P., Walter, T., Pullen, S., Kee, C., Chao, Y. and Tsai, Y. (1996). “Wide area augmentation of the global positioning system”. Proceedings of the IEEE, vol. 84 Aug. 1996, pp. 1063–1088. [7] Qi, H. and Moore, J. B. (2002). “Direct Kalman Filtering Approach for GPS/INS Integration”, IEEE Trans. Aerosp, Electron. System. vol. 38, no. 2, 2002, pp. 687-693. [8] Malleswari, B.L., MuraliKrishna, I.V., Lalkishore, K., Seetha, M., Nagaratna, P. H. “The Role of Kalman Filter in the Modelling of GPS Errors”, Journal of Theoretical and Applied Information Technology, pp. 95-101. [9] White, C.E., Bernstein, D. and Kornhauser, Alain L.. (2000). “Some map matching algorithms for personal navigation assistants”. Transportation Research Part C, No. 8, 2000, pp. 91-108. CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED WIDE AREA NETWORKS Felipe Rodriguez Yaguache and Kimmo Ahola 5G Networks & Beyond, Technical Research Centre of Finland (VTT), Espoo, Finland ABSTRACT As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology
  • 10. adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the opportunities for deploying edge-computing containerized applications running over SD-WAN are vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the lack of research focused on service discovery in these scenarios. In this article, an in-house service discovery solution that works alongside Kubernetes’ master node for allowing improved traffic handling and better user experience when running micro-services is developed. The service discovery solution was conceived following a design science research approach. Our research includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster that allows us to deploy custom services and delimit the necessary characteristics of our in-house solution. Also, the implementation's performance is tested based on the required times for updating the discovery solution according to service updates. Finally, some conclusions and modifications are pointed out based on the results, while also discussing possible enhancements. KEYWORDS SD-WAN, Edge computing, Virtualization, Kubernetes, Containers, Services For More Details: https://aircconline.com/ijcnc/V11N5/11519cnc07.pdf Volume Link: https://airccse.org/journal/ijc2019.html REFERENCES [1] Padhy, R., Patra, M., Satapathy, S. Virtualization Techniques & Technologies: State-of-The-Art. Journal of Global Research in Computer Science, 2018, vol. 2, nro.12. ISSN: 2229-371X. Available https://www.researchgate.net/publication/264884756_VIRTUALIZATION_TECHNIQUES_TEC HN OLOGIES_STATE-OF-THE-ART. [2] Horrel, J., Karimullah, A. SD-WAN Set to Transform WAN in Australia. IDC Custom Solutions, Framingham, 2017. [3] Jakma, P. Quagga Routing Software Suite. Quagga Routing Suite. Visited: 15.02.2019. Available at: https://www.quagga.net/ [4] Open Network Operating System (ONOS). ONOS features. Open Networking Foundation & The Linux Foundation, San Francisco, 2019. Visited 15.02.2019. Available at:
  • 11. https://onosproject.org/features/ [5] Open Networking Foundation. Atomix. Open Networking Foundation. Visited 15.02.2019. Available at: https://atomix.io/docs/latest/user-manual/introduction/what-is-atomix/ [6] Kubernetes. DNS for services and pods. The Linux Foundation, San Francisco, 2019. Visited 15.02.2019. Available at: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/ [7] Kubernetes. Access services running on clusters. The Linux Foundation, San Francisco, 2019. Visited 15.02.2019. Available at: https://kubernetes.io/docs/tasks/administer-cluster/access-cluster- services/ [8] MetalLB Metal Load-Balancer (MetalLB). Google. Visited 15.02.2019. Available at: https://metallb.universe.tf/ [9] Stanford-Clark, A., Nipper, A. Message Queuing Telemetry Transport (MQTT). Organization for the Advancement of Structured Information Standards (OASIS). Visited 15.02.2019. Available at: http://mqtt.org [10] Jarraya, Y., Madi, T., Debbabi, M., 2014. A Survey and a Layered Taxonomy of Software Defined Networking. IEEE Communications Surveys & Tutorials 16,1955–1980. URL: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6805151, doi: 10.1109/COMST.2014.2320094. [11] Kreutz, D., Ramos, F.M.V. , Esteves Verissimo, P., Esteve Rothenberg, C., Azodolmolky, S., Uhlig, S., 2015. Software-Defined Networking: A Comprehensive Survey. Proceedings of the IEEE 103,14– 76. URL: http://ieeexplore.ieee.org/document/6994333/, doi:10.1109/JPROC.2014.2371999. [12] Taleb, T., Samdanis, K., Mada, B., Flinck, H., Dutta, S., & Sabella, D. (2017). On Multi-Access Edge Computing:A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration. IEEE Communications Surveys and Tutorials, 19(3), 1657-1681. [7931566]. https://doi.org/10.1109/COMST.2017.2705720 [13] Eugene, TS., Zhang, Hui. Predicting Internet Network Distance with Coordinates-Based Approaches. Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, 2002, DOI: 10.1109/INFCOM.2002.1019258, ISSN: 0743-166X. Available at: https://www.cs.rice.edu/~eugeneng/papers/INFOCOM02.pdf [14] Miao, Rui., Hongyi, Zeng., Changhoon, Kim., Jeongkeun, Lee., Minlan, Yu. SilkRoad: Making Stateful Layer-4 Load Balancing Fast andCheap Using Switching ASICs. Association for Computing Machinery’s Special Interest Group on Data Communications (SIGCOMM), 2017, DOI: 10.1145/3098822.3098824, ISBN: 78-1-4503-4653-5/17/08. Available at: https://eastzone.bitbucket.io/paper/sigcomm17-silkroad.pdf [15] Changhoon, Kim., Sivaraman, Anirudh., Katta, Naga., Bas, Antonin., Wobker, Lawrence J. In- band Network Telemetry via Programmable Dataplanes. 2015, Visited 12.05.2019. Available at: https://pdfs.semanticscholar.org/a3f1/9dc8520e2f42673be7cbd8d80cd96e3ec0c1.pdf?_ga=2.76525 46 8.802012735.1559031914-713298922.1559031914
  • 12. [16] Ranganathan, R. A highly available and scalable microservice architecture for access management. Aalto University, 2018. Available at: https://aaltodoc.aalto.fi/bitstream/handle/123456789/34401/master_Ranganathan_Rajagopalan_201 8. pdf?sequence=1&isAllowed=y [17] Rodriguez Yaguache F., Ahola K. Enabling Edge Computing Using Container Orchestration and Software Defined Wide Area Networks. 9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019), 353-372. ISBN: 978-1-925953-05-3. Available at: http://aircconline.com/csit/papers/vol9/csit90930.pdf A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY Saleh Saraireh Department of Communications and Electronic Engineering, Philadelphia University, Amman, Jordan ABSTRACT The information security has become one of the most significant problems in data communication. So it becomes an inseparable part of data communication. In order to address this problem, cryptography and steganography can be combined. This paper proposes a secure communication system. It employs cryptographic algorithm together with steganography. The jointing of these techniques provides a robust and strong communication system that able to withstand against attackers. In this paper, the filter bank cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed. After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted message in the cover image by modifying the wavelet coefficients. The performance of the proposed system is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show that, the proposed system provides high level of security. KEYWORDS Steganography, Cryptography, DWT, Filter bank, PSNR
  • 13. For More Details: https://airccse.org/journal/cnc/5313cnc10.pdf Volume Link: https://airccse.org/journal/ijc2013.html REFERENCES [1] Obaida Mohammad Awad Al-Hazaimeh, (2013) "A New Approach for Complex Encrypting and Decrypting Data" International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2. [2] Katzenbeisser, S. and Petitcolas, F.A.P. 2000, Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Inc., Boston, London. [3] Xinpeng Zhang and Shuozhong Wang, (2005), "Steganography Using MultipleBase Notational System and Human Vision Sensitivity", IEEE signal processing letters, Vol. 12, No. 1. [4] Jarno Mielikainen, (2006), "LSB Matching Revisited", IEEE signal processing letters, Vol. 13, No. 5. [5] Piyush Marwaha, Paresh Marwaha, (2010), "Visual Cryptographic Steganography in images", IEEE, 2nd International conference on Computing, Communication and Networking Technologies. [6] G.Karthigai Seivi, Leon Mariadhasan and K. L. Shunmuganathan, (2012), " Steganography Using Edge Adaptive Image " IEEE, International Conference on Computing, Electronics and Electrical Technologies. [7] Hemalatha S, U Dinesh Acharya, Renuka A and Priya R. Kamath, (2012), " A Secure and High Capacity Image Steganography Technique", Signal & Image Processing : An International Journal (SIPIJ) Vol.4, No.1.
  • 14. [8] Tong L.and Zheng-ding, Q, (2002), "DWT-based color Images Steganography Scheme", IEEE International Conference on Signal Processing, 2:1568-1571. [9] Mandal J.K. and Sengupta M., (2010), “Authentication/Secret Message Transformation Through Wavelet Transform based Subband Image Coding (WTSIC).”, Proceedings of International Symposium on Electronic System Design, IEEE Conference Publications, pp 225 – 229. [10] Septimiu F. M., Mircea Vladutiu and Lucian P., (2011),"Secret data communication system using Steganography, AES and RSA", IEEE 17th International Symposium for Design and Technology in Electronic Packaging. [11] H. Tian, K. Zhou, Y. Huang, D. Feng, J. Liu, (2008), "A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP", IEEE The 9th International Conference for Young Computer Scientists, pp. 647-652. [12] Y. Huang, B. Xiao, H. Xiao, (2008), "Implementation of Covert Communication Based on Steganography", IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1512-1515. [13] Cheddad, A, Condell, Joan, Curran, K and McKevitt, Paul,(2008), "Securing Information Content using New Encryption Method and Steganography", IEEE Third International Conference on Digital Information Management. [14] Rasul E., Saed F. and Hossein S, (2009), " Using the Chaotic Map in Image Steganography", IEEE, International Conference on Signal Processing Systems. [15] Majunatha R. H. S. and Raja K B, (2010), "High Capacity and Security Steganography using Discrete Wavelet Transform", International Journal of Computer Science and Security (IJCSS), Vol. 3: Issue (6) pp 462-472. [16] Saraireh S. and Benaissa M., (2009), “A Scalable Block Cipher Design using Filter Banks and Lifting over Finite Fields” In IEEE International Conference on Communications (ICC), Dresden, Germany. [17] El Safy, R.O, Zayed. H. H, El Dessouki. A, (2009), “An adaptive steganography technique based on integer wavelet transform,” ICNM International Conference on Networking and Media Convergence, pp 111-117.
  • 15. VISUALIZE NETWORK ANOMALY DETECTION BY USING K-MEANS CLUSTERING ALGORITHM A. M. Riad1 , Ibrahim Elhenawy2 , Ahmed Hassan3 and Nancy Awadallah1 1 Faculty of Computer Science and Information Systems, Mansoura University, Egypt 2 Faculty of Computer Science and Information Systems ,Zagazig University, Egypt 3 Faculty of Engineering Mansoura University , Egypt ABSTRACT With the ever increasing amount of new attacks in today’s world the amount of data will keep increasing, and because of the base-rate fallacy the amount of false alarms will also increase. Another problem with detection of attacks is that they usually isn’t detected until after the attack has taken place, this makes defending against attacks hard and can easily lead to disclosure of sensitive information. In this paper we choose K-means algorithm with the Kdd Cup 1999 network data set to evaluate the performance of an unsupervised learning method for anomaly detection. The results of the evaluation showed that a high detection rate can be achieve while maintaining a low false alarm rate .This paper presents the result of using k-means clustering by applying Cluster 3.0 tool and visualized this result by using TreeView visualization tool . KEYWORDS Intrusion detection, Clustering, K-means, Kdd Cup 99, Cluster 3.0, Visualization, TreeView For More Details: https://airccse.org/journal/cnc/5513cnc14.pdf Volume Link: https://airccse.org/journal/ijc2013.html
  • 16. REFERENCES [1] J. F. Nieves ,"Data Clustering for Anomaly Detection in Network Intrusion Detection " ,Research Alliance in Math and Science , August, pp.1-12, 2009 . [2] L. Portnoy , E. Eskin , S. Stolfo , " Intrusion detection with unlabeled data using clustering", In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001) , Philadelphia , PA,USA ,2001. [3] E.Eskin, A.Arnold, , M. Prerau, L.Portnoy, S. Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data", Applications of Data Mining in Computer Security(2002), Norwell, MA, USA, Dec., pp. 78–100,2002. [4] K. Nyarko, T. Capers, C. Scott, K. Ladeji-Osias,” Network Intrusion Visualization with NIVA, an Intrusion Detection Visual Analyzer with Haptic Integration”, IEEE, 2002. [5] K.Labib, V. R. Vemuri, "Anomaly Detection Using S Language Framework: Clustering and Visualization of Intrusive Attacks on Computer Systems". Fourth Conference on Security and Network Architectures, SAR'05, Batz sur Mer, France, June 2005 [6] P. Ren , Y. Gao , Z. Li , Y. Chen and B. Watson , “IDGraphs: Intrusion Detection and AnalysisUsing Histographs” ,IEEE , 2005 . [7] P. Laskov, K. Rieck, C. Schäfer, K.R. Müller, “Visualization of anomaly detection using prediction sensitivity”, Proc.of Sicherheit, April 2005, 197- 208. [8] A. Mitrokotsa, C. Douligeris ,” Detecting Denial of Service Attacks Using Emergent Self- Organizing Maps” , Signal Processing and Information Technology, 2005. Proceedings of the Fifth IEEE International Symposium , pp. 375 – 380 ,IEEE,2005. [9] J. Peng, C. Feng, J.W. Rozenblit , “A Hybrid Intrusion Detection and Visualization System” , Engineering of Computer Based Systems, 2006. ECBS 2006. 13th Annual IEEE International Symposium and Workshop , , pp. – 506, IEEE ,2006. [10] X.Cui, J.Beaver, T. Potok and L.Yang , “Visual Mining Intrusion Behaviors by Using Swarm Technology” , System Sciences (HICSS), 2011 44th Hawaii International Conference , pp. 1 – 7, IEEE 2011. [11] A.Frei, M. Rennhard ,” Histogram Matrix: Log File Visualization for Anomaly Detection”, IEEE , 2007 . [12] L. Dongxia , Z. Yongbo ,” An Intrusion Detection System Based on Honeypot Technology” ,Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on IEEE, Vol.1,2012 .
  • 17. [13] M. Jianliang , S. Haikun, B. Ling, "The Application on Intrusion Detection Based on K- means Cluster Algorithm" , IFITA '09 Proceedings of the 2009 International Forum on Information , Technology and Applications – Vol.1,pp. 150-152,IEEE ,2009. [14] B. K. Kumar , A. Bhaskar , “Identifying Network Anomalies Using Clustering Technique in Weblog Data”, International Journal of Computers & Technology, Vol. 2 No. 3, June, 2012. [15] S. Akbar , K.Nageswara Rao , J.A.Chandulal ," Intrusion Detection System Methodologies Based on Data Analysis",International Journal of Computer Applications ,Vol. 5 , No.2 , August 2010. [16] K.Bharti, S. Shukla, S. Jain ,"Intrusion detection using clustering", IJCCT, Vol.1 , 2010 [17] S.Jain , M. Aalam , M.Doja , “ K-means clustering using weka interface” , Proceedings of the 4th National Conference; INDIACom, Computing For Nation Development, 2010. [18] The Third International Knowledge Discovery and Data Mining Tools Competition, May 2002,Available from http://kdd.ics.uci.edu/databases/kddcup99.kddcup99.html. [19] M. Sabhnani ,G. Serpen, “Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context “, In Proceedings of the International Conference on Machine Learning, Models, Technologies and Applications (MLMTA 2003), Vol. 1, (2003). [20] F.S.Gharehchopogh, Neda Jabbari, Zeinab Ghaffari Azar ,“Evaluation of Fuzzy K-Means And KMeans Clustering Algorithms In Intrusion Detection Systems” , International Journal of Scientific & Technology Research ,Vol. 1, issue 11, December 2012. [21] M. E. Elhamahmy, H. N. Elmahdy , I. A. Saroit ,"A New Approach for Evaluating Intrusion Detection System" , International Journal of Artificial Intelligent Systems and Machine Learning, Vol. 2, No 11, November 2010 . [22] Dr.S.Siva Sathya, Dr. R.Geetha Ramani and K.Sivaselvi. "Discriminant Analysis based Feature Selection in KDD Intrusion Dataset ", International Journal of Computer Applications 31(11):1-7, October 2011. [23] P. G.Jeya , M. Ravichandran and C. S. Ravichandran ," Efficient Classifier for R2L and U2R Attacks. International Journal of Computer Applications 45(21):29-32, May 2012 . [24] F. N. M. Sabri, N. M.Norwawi, K. Seman," "Identifying False Alarm Rates for Intrusion Detection System with Data Mining", International Journal of Computer Science and Network Security, VOL. 11 No. 4, April 2011 [25] P. Divya , R. Priya," Clustering Based Feature Selection and Outlier Analysis ",International Journal of Computer Science & Communication Networks, Vol 2(6), pg.647- 652.
  • 18. [26] C.Ahlberg, B. Shneiderman ,” Visual information seeking: tight coupling of dynamic query filters with starfield displays” , In proceeding of: Conference on Human Factors in Computing Systems, CHI 1994, Boston, Massachusetts, USA, pp. 313-317,April 24-28, 1994. [27] S. Noel , M. Jacobs , P. Kalapa , S. Jajodia “Multiple Coordinated Views for Network Attack Graphs”, Visualization for Computer Security,.(VizSEC 05). IEEE Workshop on, 99- 106,2005 [28]http://www.researchgate.net/publication/27521564_The_Information_Mural_A_Techniqu e_for_ Displaying_and_Navigating_Large_Information_Spaces [29] http://www.ukessays.com/essays/information-technology/intrusion-detection-system- methodologiesdata-analysis-information-technology-essay.php [30] http://dl.acm.org/citation.cfm?id=1106724 [31] http://www.computer.org/csdl/proceedings/vizsec/2005/2782/00/27820005-abs.html [32] http://dl.acm.org/citation.cfm?id=1106719 [33] Ms. P. K. Karmore and MS. S. T. Bodkhe ,"A Survey on Intrusion in Ad Hoc Networks and its Detection Measures" , International Journal on Computer Science and Engineering (IJCSE) ,3(5),pp.1896-1903,May 2011 . [34] http://bonsai.hgc.jp/~mdehoon/software/cluster/cluster3.pdf - Last visiting at 21.06.2013. On the Migration of a Large Scale Network from IPv4 to IPv6 Environment Muhammad Yeasir Arafat1 , Feroz Ahmed2 and M Abdus Sobhan3 Department of Electrical and Electronic Engineering, School of Engineering and Computer Science, Independent University, Bangladesh ABSTRACT This work mainly addresses the design a large scale network using dual stack mechanisms. We focused on the most important theoretical concepts of the IPv6 protocol, such as addressing, address
  • 19. allocation, routing with the OSPF and BGP protocols and routing protocols performance in dual stack network using GNS3 and Wireshark simulators. we have a tendency to measure a perfect model and a true large-scale network atmosphere victimization out there end-to-end activity techniques that focuses on a large-scale IPv4 and IPv6 backbone and created performance the IPv4 and IPv6 network. In this paper, we compiled IPv6 address planning in large scale network, performance statistics of each network in terms of TCP throughput, delay jitters, packet loss rate, and round trip time. It is found that, a minor degradation within the throughput of the TCP, delay jitter, a lower packet loss rate, and a rather longer round trip time are occurred in a real large scale dual stack network. KEYWORDS IPv6, IPv4, double stack, BGPv4, OSPFv3, ISP, throughput, TCP and RTT For More Details: https://airccse.org/journal/cnc/6214cnc10.pdf Volume Link: https://airccse.org/journal/ijc2014.html REFERENCES [1] Tahir Abdullah, Shahbaz Nazeer, Afzaal Hussain, “NETWORK MIGRATION AND PERFORMANCE ANALYSIS OF IPv4 AND IPv6”, European Scientific Journal, vol. 8, No.5, 2013 [2] Lefty Valle-Rosado, Lizzie Narváez-Díaz, Cinhtia González-Segura and Victor Chi-Pech, “Design and Simulation of an IPv6 Network Using Two Transition Mechanisms”, IJCSI International Journal of Computer Science Issues, Vol.9, No.6, pp: 60-65, Nov. 2012. [3] Internet Engineering Task Force (IETF) RFC 6052, 3513, 4291, 6104, http://tools.ietf.org/html/ [4] Febby Nur Fatah, Adang Suhendra , M Akbar Marwan , Henki Firdaus Henki Firdaus , “Performance Measurements Analysis of Dual Stack IPv4-IPv6”, Proc. of the Second Intl. Conference on Advances in Information Technology — AIT, 2013.. [5] Y. Wang, S. Ye, and X. Li, “Understanding Current IPv6 Performance: A Measurement Study”,
  • 20. 10th IEEE Symposium on Computer Communications, June 2005. [6] Cebrail CIFLIKLI, Ali GEZER and Abdullah Tuncay OZSAHIN, “Packet traffic features of IPv6 and IPv4 protocol traffic, Turk”, J Elec Eng & Comp Science, Vol.20, No5, pp: 727-749, 2012 [7] Alex Hinds, Anthony Atojoko, and Shao Ying Zhu, “Evaluation of OSPF and EIGRP Routing Protocols for IPv6”, International Journal of Future Computer and Communication (IJFCC), Vol.2, No.4, pp: 287-291, Aug. 2013. [8] T. Bates, R. Chandra, D. Katz, and Y. Rekhter, “Multiprotocol Extensions for BGP-4,” Internet Request for Comments, vol. RFC 4760, Jan. 2007. [9] Ing. Luis Marrone, Lic. Andr´es Barbieri and Mg. Mat ‘as Robles, “TCP Performance - CUBIC, Vegas & Reno”, JCS&T, Vol.13, No.1, pp:1-8, April 2013 [10] Kevin R. Fall and W. Richard Stevens, “TCP/IP Illustrated”, volume 1, published by Addisonwisely professional computer series, Pearson Education, 2012
  • 21. PERFORMANCE ANALYSIS AND MONITORING OF VARIOUS ADVANCED DIGITAL MODULATION AND MULTIPLEXING TECHNIQUES OF F.O.C WITHIN AND BEYOND 400 GB/S. Sumant Ku. Mohapatra, Ramya Ranjan Choudhury, Rabindra Bhojray and Pravanjan Das Department of Electronics & Telecommunication Engineering, Trident Academy of Technology, B.P.U.T, Bhubaneswar, Odisha, India ABSTRACT To achieve better calculative performance in optical fiber communication and for simplicity of implementation different digital modulation, detection and multiplexing techniques are used. These techniques maximize the spectral efficiency. This paper reviews a tabular comparative analysis with 3D graphical representation for different optical digital modulation formats and multiplexing techniques within and beyond 400 Gb/s. In this particular article we survey about different parameters related to digital fiber optic communication. KEYWORDS OFDM, Digital Modulation formats, Multiplexing techniques, QAM & WDM. For More Details : https://airccse.org/journal/cnc/6214cnc13.pdf Volume Link : https://airccse.org/journal/ijc2014.html
  • 22. REFERENCES [1] K.-P. Ho, “Exact evaluation of the capacity for intensity-modulated direct-detection channels with optical mplifier noises,” IEEE Photon. Technol. Lett. 17, 858−860 (2005). [2] T. Pfau, S. Hoffmann, R. Peveling, S. Bhandard, S. Ibrahim, O. Adamczyk, M. Porrmann, R. Noé and Y. Achiam, “First real-time data recovery for synchronous QPSK transmission with standard DFB lasers,” IEEE Photon. Technol. Lett. 18, 1907–1909 (2006). [3] A. Leven, N. Kaneda, U.-V. Koc and Y.-K. Chen, “Coherent receivers for practical optical communication systems,” in Proceedings of IEEE Conference on Optical Fiber Communications, (Institute of Electrical and Electronics Engineers, Anaheim, 2007), Paper OThK4. [4] J. Hongo, K. Kasai, M. Yoshida and M. Nakazawa, “1-Gsymbol/s 64-QAM coherent optical transmission over 150 km,” IEEE Photon. Technol. Lett. 19, 638–640 (2007). [5] M. Nazarathy and E. Simony, “Multichip differential phase encoded optical transmission,” IEEE Photon. Technol. Lett. 17, 1133–1135 (2005). [6] D. Divsalar and M. Simon, “Multiple-symbol differential detection of MPSK,” IEEE Trans. Commun. 38, 300–308 (1990). [7] S. Benedetto and P. Poggiolini, “Theory of polarization shift keying modulation,” IEEE Trans. Commun. 40, 708−721 (1992). [8] E. Ip and J.M. Kahn, “Digital equalization of chromatic dispersion and polarization mode dispersion,” J. Lightwave Technol. 25, 2033-2043 (2007). [9] S. Tsukamoto, K. Katoh and K. Kikuchi, “Coherent demodulation of optical multilevel phaseshift-keying signals using homodyne detection and digital signal processing,” IEEE Photon. Technol. Lett. 18, 1131– 1133 (2006). [10] C. D. Poole, R. W. Tkach, A. R. Chraplyvy and D. A.Fishman, “Fading in lightwave systems due to polarization-mode dispersion,” IEEE Photon. Technol. Lett. 3, 68–70 (1991). [11] H. Bülow, W. Baumert, H. Schmuck, F. Mohr, T. Schulz, F. Küppers and W. Weiershausen, “Measurement of the maximum speed of PMD fluctuation in installed field fiber,” in Proceedings of IEEE Conference on Optical Fiber Communications, (Institute of Electrical and Electronics Engineers, San Diego, 1999), Paper OWE4. [12] H. Sunnerud, C. Xie, M. Karlsson, R. Samuelsson and P. Andrekson, “A comparison between different PMD compensation techniques,” J. Lightwave Technol. 20, 368–378 (2002).. [13] K.-P. Ho, Phase-Modulated Optical Communication Systems, (Springer, New York, 2005). [14] K.-P. Ho and J. M. Kahn, “Detection technique to mitigate Kerr effect phase noise,” J. Lightwave Technol. 22, 779−783 (2004).
  • 23. [15] A. P. T. Lau and J. M. Kahn, “Signal design and detection in presence of nonlinear phase noise,” J. Lightwave Technol. 25, 3008−3016 (2007). [16] S.K Mohapatra, R. Bhojray and S.K Mandal, “Analog And Digital Modulation Formats Of Optical Fiber Communication Within And Beyond 100 Gb/S: A Comparative Overview”,IJECET Volume 4, Issue 2, March – April, 2013, ISSN-0976-6472(online). [17] IEEE Std 802.3ba-2010, Amendment to IEEE Std 802.3-2008: Media Access control parameters, physical layers, and management parameter for 40 Gb/s and 100 Gb/s operation, June 2010. [18] Gizem, Aksahya & Ayese, Ozcan (2009) Coomunications & Networks, NetworkBooks, ABC Publishers. [18] P.J. Winzer et al., 10 _ 107-Gb/s NRZ-DQPSK transmission at 1.0 b/s/Hz over 12 _ 100 km including 6 optical routing nodes, in: Proc. OFC 2007, post deadline paper PDP24. [19] K. Kikuchi, “Coherent detection of phase-shift keying signals using digital carrier-phase estimation,” in Proceedings of IEEE Conference on Optical Fiber Communications, (Institute of Electrical and Electronics Engineers, Anaheim, 2006), Paper OTuI4. [20] P. Serena, A. Orlandini and A. Bononi, “Parametric-Gain approach to the analysis of singlechannel DPSK/DQPSK systems with nonlinear phase noise,” J. Lightwave Technol. 24, 2026−2037 (2006). [21] K.P. Ho and H.C. Wang, “Comparison of nonlinear phase noise and intrachannel four-wave mixing for RZDPSK signals in dispersive transmission systems,” IEEE Photon. Technol. Lett. 17, 1426−1428 (2005). [22] K. Kikuchi, “Phase-diversity homodyne detection of multilevel optical modulation with digital carrier phase estimation,” J. Sel. Top. Quantum Electron. 12, 563−570 (2006). [23] M. G. Taylor, “Accurate digital phase estimation process for coherent detection using a parallel digital processor,” in Proceedings ECOC 2005, Glasgow, UK, 2005, Paper Tu4.2.6. [24] D.-S. Ly-Gagnon, S. Tsukamoto, K. Katoh and K. Kikuchi, “Coherent detection of optical quadrature phase-shift keying signals with coherent phase estimation,” J. Lightwave Technol. 24, 12–21, (2006). [25] W. Shieh, X. Yi, and Y. Tang, “Experimental demonstration of transmission of coherent optical OFDM Systems,” in Proceedings of IEEE Conference on Optical Fiber Communications, (Institute of Electrical and Electronics Engineers, Anaheim, 2007), Paper OMP2. [26] W. Shieh and C. Athaudage, “Coherent optical orthogonal frequency division multiplexing,” Electron. Lett. 42, 587−589 (2006). [27] N. Cvijetic, L. Xu and T. Wang, “Adaptive PMD compensation using OFDM in long-haul 10 Gb/s DWDM systems,” in Proceedings of IEEE Conference on Optical Fiber
  • 24. Communications, (Institute of Electrical and Electronics Engineers, Anaheim, 2007), Paper OTuA5 [28] A. Lowery and J. Armstrong, “Orthogonal-frequency-division multiplexing for optical dispersion compensation,” in Proceedings of IEEE Conference on Optical Fiber Communications, (Institute of Electrical and Electronics Engineers, Anaheim, 2007), PaperOTuA4. [29] J. Jang, K. B. Lee and Y.-H. Lee, “Transmit power and bit allocations for OFDM systems in a fading channel,” in Proceedings of IEEE GLOBECOM, (Institute of Electrical and Electronics Engineers, San Francisco, 2003), pp. 858−862. [30] D.-S. Ly-Gagnon, “Information recovery using coherent detection and digital signal pocessing for phaseshift- keying modulation formats in optical communication systems,” M.S. Thesis, University of Tokyo (2004). [31] Eugen Lach,Wilfried Idler “modulation formats for 100 G and beyond” ELSEIVIER optical fiber technology 17(2011) 377-386. [32] J. M. Kahn and K.-P. Ho, “Spectral efficiency limits and modulation/detection techniques for DWDM Systems,” ,” J. Sel. Top. Quantum Electron. 10, 259–271 (2004). [33] M. Rohde,C.Caspar,N.Heimes,M.Konitzer,E-J.Bachus and N.Hanik, “Robustness of DPSK direct detection transmission format in standard fiber WDM systems” Electron.Lett,vol 36,pp.1483-1484,2000. [34] W. Idler et al., WDM field trial over 764 km SSMF with 16 _ 112 Gb/s NRZDQPSK copropagating with 10.7 Gb/s NRZ, in: ECOC 2010, paper We.8.C.5. [35] Sano et al., 14-Tb/s (140 _ 111-Gb/s PDM/WDM) CSRZ-DQPSK transmission over 160 km using 7-THz bandwidth extended L-band EDFAs, in: ECOC 2006, post- Deadline paper Th4.1.1. [36] W. Idler et al., 16 _ 112 Gb/s NRZ-DQPSK WDM transmission over 604 km SSMF including high PMD fibers, in: OECC 2010, paper 9B1-2. [37] Michael H. Eiselt et al., Requirements for 100-Gb/s metro networks, in: OFC 2009, paper OTuN6. [38] Brian Teipen et al., 100 Gb/s DPSK-3ASK modulation format for metro networks: experimental results, in: ITG Photonische Netze, 2009. [39] M. Eiselt, B. Teipen, DPSK-3ASK transmission optimization by adapting modulationLevels, in: APOC 2008, paper 3171-17.
  • 25. [40] Xiang Liu et al., Transmission of a 448-Gb/s reduced-guard-interval COOFDM signal with a 60-GHz optical bandwidth over 2000 km of ULAF and five 80-GHz-grid ROADMs, in: OFC 2010, post deadline paper PDPC2. [41] K. Roberts et al., 100G and beyond with digital coherent signal processing, IEEE Commun. Mag. (2010) 62–69. [42] Xiang Zhou, Jianjun Yu, Advanced coherent modulation formats and algorithms: higher- order multi-level coding for high-capacity system based on 100 Gbps channel, in: OFC 2010, paper OMJ3. [43] G. Bosco et al., Performance limits of Nyquist-WDM and CO-OFDM in high speed PM- QPSK systems,IEEE Photon. Technol. Lett. 22 (2010) 1129–1131. [44] G. Bosco et al., Performance limits of Nyquist-WDM and CO-OFDM in high speed PM- QPSK systems,IEEE Photon. Technol. Lett. 22 (2010) 1129–1131. [45] Xiang Liu et al., Efficient digital coherent detection of a 1.2-Tb/s 24-carrier no-guard- interval CO-OFDM signal by simultaneously detecting multiple carriers per sampling, in: OFC 2010, paper OWO2. [46] P. Hofmann, E. E. Basch, S. Gringeri, R. Egorov, D. A. Fishman, and W. A. Thompson, “DWDM Long Haul Network Deployment for the Verizon GNI Nationwide Network,” Proc. Optical Fiber Communication Conf. (OFC „05), Vol. 2, (2005). [47] M. Nakazawa et al., 256 QAM (64 Gb/s) coherent optical transmission over 160 km with an optical bandwidth of 5.4 GHz, in: OFC 2010, paper OMJ5. [48] A. Sano et al., 100 _ 120-Gb/s PDM 64-QAM transmission over 160 km using line widthtolerant pilotless digital coherent detection, in: ECOC 2010, post deadline paper PD2.4. [49] M. Alfiad et al., Transmission of 11 _ 224 Gb/s POLMUX-RZ-16QAM over 1500 km of LongLine and pure-silica SMF, in: ECOC 2010, paper We.8.C.2. [50] T. Xia et al., Field experiment with mixed line-rate transmission (112 Gb/s, 450 Gb/s, and 1.15 Tb/s) over 3560 km of installed fiber using filter less coherent receiver and EDFAs only, in: OFC 2011, PDPA3. [51] Y. More et al., 200-km transmission of 100-Gb/s 32-QAM dual-polarization signals using a digital coherent receiver, in: ECOC 2010, paper 8.4.6. [52] S. Okamoto et al., 512 QAM (54 Gb/s) coherent optical transmission over 150 km with an optical bandwidth of 4.1 GHz, in: ECOC 2010, post-deadline paper. [53] M. Rhode, C. Caspar, N. Heimes, M. Konitzer, E. J. Bachus, and N. Hanik, “ Robustness of DPSK direct detection transmission format in standard fiber WDM systems,” Electronics Letters, 26(17):1483–1484, August 2000. [54] C. Wree, J. Leibrich, and W. Rosenkranz, “RZ-DQPSK format with high spectral efficiency and high robustness towards fiber nonlinearities,” European Conference on Optical Communication (ECOC), 4(9.6.6), September 2002.
  • 26. [55] Abhijit Banerjee and B. N. Biswas, “Stability Analysis of a Modified PSK Homodyne Optical Receiver”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2, 2012, pp. 32 - 40, ISSN Print: 0976- 6464, ISSN Online: 0976 – 6472. [56] C.Xie,L.Moller,H.Haunstein and S.Hunsche “comparison of system tolerance to polarization mode dispersion between different modulation formats” , IEEE photons. Technol.Lett.vol.15,pp.1168-1170,Aug.2003 [57] Yu Yu,Bingrong zou,Wenhan Wu and Xinliang zhang “all optical parallel NRZ- DPSK to RZ-DPSK format conversion at 40 Gb/s based on XPM effect in a single SOA”. [58] I. Morita et al., High speed transmission technologies for 100-Gb/s-classEthernet, in: ECOC 2007, invited paper Mo1.3.1. [59] M. Daikoku et al., 100-Gb/s DQPSK transmission experiment without OTDMfor 100G Ethernet transport, J. Lightw. Technol. 25 (1) (2007). [60] M. Daikoku, I. Morita, H. Taga, H. Tanaka, T. Kawanishi, T. Sakamoto, T.Miyazaki, T. Fujita,100 Gb/s DQPSK transmission experiment without OTDMfor 100G Ethernet transport, in: OFC 2006, post-deadline paper PDP36. [61] P.J. Winzer et al., 2000 km-WDM transmission of 10 _ 107 Gb/s RZ-DQPSK, in:, ECOC 2006, Cannes, post-deadline paper Th4.1.3. [62] Xiang Zhou, Jianjun Yu, Mei Du, Guodong Zhang, 2 Tb/s (20 _ 107 Gb/s) RZDQPSK straight-line transmission over 1005 km of standard single mode fiber (SSMF) without Raman amplification in: Proc. OFC 2008, paper OMQ3. [63] G. Raybon et al., 107-Gb/s transmission over 700 km and one intermediate ROADMusing Lambda Xtreme_ transport system, in: OFC 2008, paper OMQ4. [64] Mei Du et al., Unrepeatered transmission of 107 Gb/s RZ-DQPSK over 300 km NZDSF with bi-directional Raman amplification, in: Proc. OFC 2008, paper JThA47. [65] Brian Teipen, Impact of modulator characteristicson multi-level signal Transmission performance, in: ITG Workshopp Fachgruppe 5.3.1, 2008 (Kiel).
  • 27. [66] Brian Teipen et al., 107 Gb/s DPSK-3ASK optical transmission over SSMF, in:OFC 2010, paper NMB1. [67] ITU-T Recommendation G.709, Interfaces for the Optical Transport Network (OTN), December 2009. [68] M. Eiselt, B.Teipen, DPSK-3ASK transmission optimization by adapting modulation Levels, in: APOC 2008, paper 3171-17. [69] D. van den Borne et al., Coherent equalization versus direct detection for 111- Gb/s Ethernet transport, in: LEOS Summer Topical Meeting, 2008, paper MA2-4. [70] J.X. Cai et al., 20Tbit/s capacity transmission over 6860 km, in: Proceedings OFC, 2011, PDPB4. [71] A.H. Gnauck et al., 10 _ 224-Gb/s WDM transmission of 28-Gbaud PDM 16-QAM on a 50- GHz grid over 1200 km of fiber, in: OFC 2010, post deadline paper PDPB8. [72] P.J. Winzer et al., Spectrally efficient long-haul optical networking using 112- Gb/s polarizationmultiplexed 16-QAM, J. Lighw. Technol. 28 (4) (2010). [73] M. Alfiad et al., Transmission of 11 _ 224 Gb/s POLMUX-RZ-16QAM over 1500 km of LongLine and pure-silica SMF, in: ECOC 2010, paper We.8.C.2. [74] P.J. Winzer et al., Generation and 1200-km transmission of 448-Gb/s ETDM 56-Gbaud PDM 16-QAM using a single I/Q modulator, in: ECOC 2010, post dead line paper PD2.2. [75] B.-E. Olsson et al., RF-assisted optical dual-carrier 112 Gb/s polarization multiplexed 16- QAM transmitter, in: OFC 2010, paper OMK5. [76] William Shieh, OFDM for adaptive ultra high-speed optical networks, in: OFC2010, paper OWO1. [77] Fred Buchali et al., Nonlinear limitations in a joint transmission of 100 Gb/s OOFDM and 40 Gb/s DPSK over a 50 GHz channel grid, in: OFC 2010, paper OTuL4. [78] S. Chandrasekhar et al., Transmission of a 1.2-Tb/s 24-carrier no-guard interval coherent OFDM super channel over 7200-km of ultra-large-area fiber, in: ECOC 2009, post- deadline paper PD 2.6. [79] Haiying Julie Zhu, Roshdy H.M. Hafez and John Sydor, “Cross Layer Scheduling Algorithms for Different Rate Traffic OFDM Broadband Wireless Systems ” , IJCNC Vol No.1,No.3,October 2009 [80] Asim M. Mazin and Garth V. Crosby, “Reducing the Peak Average Power Ratio of MIMO- OFDM Systems”, IJCNC Vol.5, No.3, May 2013.
  • 28. A DEEP LEARNING TECHNIQUE FOR WEB PHISHING DETECTION COMBINED URL FEATURES AND VISUAL SIMILARITY Saad Al-Ahmadi1 and Yasser Alharbi 2 1 College of Computer and Information Science, Computer Science Department, King Saud University, Riyadh, Saudi Arabia 2 College of Computer and Information Science, Computer Engineering Department, King Saud University, Riyadh, Saudi Arabia ABSTRACT The most popular way to deceive online users nowadays is phishing. Consequently, to increase cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper, we propose an approach that rely on websites image and URL to deals with the issue of phishing website recognition as a classification challenge. Our model uses webpage URLs and images to detect a phishing attack using convolution neural networks (CNNs) to extract the most important features of website images and URLs and then classifies them into benign and phishing pages. The accuracy rate of the results of the experiment was 99.67%, proving the effectiveness of the proposed model in detecting a web phishing attack. KEYWORDS Phishing detection, URL, visual similarity, deep learning, convolution neural network. For More Details: https://aircconline.com/ijcnc/V12N5/12520cnc03.pdf Volume Link: https://airccse.org/journal/ijc2020.html
  • 29. REFERENCES [1] H. Thakur, “Available Online at www.ijarcs.info A Survey Paper On Phishing Detection,” vol. 7, no. 4, pp. 64–68, 2016. [2] G. Varshney, M. Misra, and P. K. Atrey, “A survey and classification of web phishing detection schemes,” Security and Communication Networks. 2016, doi: 10.1002/sec.1674. [3] E. S. Aung, T. Zan, and H. Yamana, “A Survey of URL-based Phishing Detection,” pp. 1–8, 2019, [Online]. Available: https://db-event.jpn.org/deim2019/post/papers/201.pdf. [4] S. Nakayama, H. Yoshiura, and I. Echizen, “Preventing false positives in content-based phishing detection,” in IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009, doi: 10.1109/IIH-MSP.2009.147. [5] A. K. Jain and B. B. Gupta, “Phishing detection: Analysis of visual similarity based approaches,” Security and Communication Networks. 2017, doi: 10.1155/2017/5421046. [6] A. Khan, A. Sohail, U. Zahoora, and A. S. Qureshi, “A Survey of the Recent Architectures of Deep Convolutional Neural Networks,” pp. 1–68, 2019, doi: 10.1007/s10462-020-09825-6. [7] J. Mao et al., “Phishing page detection via learning classifiers from page layout feature,” Eurasip J. Wirel. Commun. Netw., 2019, doi: 10.1186/s13638-019-1361-0. [8] I. F. Lam, W. C. Xiao, S. C. Wang, and K. T. Chen, “Counteracting phishing page polymorphism: An image layout analysis approach,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2009, doi: 10.1007/978-3-642- 02617-1_28. [9] T. C. Chen, T. Stepan, S. Dick, and J. Miller, “An anti-phishing system employing diffused information,” ACM Trans. Inf. Syst. Secur., vol. 16, no. 4, 2014, doi: 10.1145/2584680. [10] A. S. Bozkir and E. A. Sezer, “Use of HOG descriptors in phishing detection,” in 4th International Symposium on Digital Forensics and Security, ISDFS 2016 - Proceeding, 2016, doi: 10.1109/ISDFS.2016.7473534. [11] F. C. Dalgic, A. S. Bozkir, and M. Aydos, “Phish-IRIS: A New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors,” ISMSIT 2018 - 2nd Int. Symp. Multidiscip. Stud. Innov. Technol. Proc., 2018, doi: 10.1109/ISMSIT.2018.8567299. [12] K. L. Chiew, E. H. Chang, S. N. Sze, and W. K. Tiong, “Utilisation of website logo for phishing detection,” Comput. Secur., 2015, doi: 10.1016/j.cose.2015.07.006. [13] K. L. Chiew, J. S. F. Choo, S. N. Sze, and K. S. C. Yong, “Leverage Website Favicon to Detect Phishing Websites,” Secur. Commun. Networks, 2018, doi: 10.1155/2018/7251750. [14] Y. Zhou, Y. Zhang, J. Xiao, Y. Wang, and W. Lin, “Visual similarity based anti-phishing with the combination of local and global features,” in Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 2015, doi: 10.1109/TrustCom.2014.28.
  • 30. [15] A. P. E. Rosiello, E. Kirda, C. Kruegel, and F. Ferrandi, “A layout-similarity-based approach for detecting phishing pages,” in Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm, 2007, doi: 10.1109/SECCOM.2007.4550367. [16] J. Mao, P. Li, K. Li, T. Wei, and Z. Liang, “BaitAlarm: Detecting phishing sites using similarity in fundamental visual features,” in Proceedings - 5th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013, 2013, doi: 10.1109/INCoS.2013.151. [17] S. Haruta, H. Asahina, and I. Sasase, “Visual Similarity-Based Phishing Detection Scheme Using Image and CSS with Target Website Finder,” in 2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings, 2017, doi: 10.1109/GLOCOM.2017.8254506. [18] H. Zhang, G. Liu, T. W. S. Chow, and W. Liu, “Textual and visual content-based anti-phishing: A Bayesian approach,” IEEE Trans. Neural Networks, 2011, doi: 10.1109/TNN.2011.2161999. [19] E. Medvet, E. Kirda, and C. Kruegel, “Visual-similarity-based phishing detection,” Proc. 4th Int. Conf. Secur. Priv. Commun. Networks, Secur., no. September 2008, 2008, doi: 10.1145/1460877.1460905. [20] S. G. Selvaganapathy, M. Nivaashini, and H. P. Natarajan, “Deep belief network based detection and categorization of malicious URLs,” Inf. Secur. J., vol. 27, no. 3, pp. 145–161, 2018, doi: 10.1080/19393555.2018.1456577. [21] Y. Ding, N. Luktarhan, K. Li, and W. Slamu, “A keyword-based combination approach for detecting phishing webpages,” Comput. Secur., vol. 84, pp. 256–275, 2019, doi: 10.1016/j.cose.2019.03.018. [22] H. huan Wang, L. Yu, S. wei Tian, Y. fang Peng, and X. jun Pei, “Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network,” Appl. Intell., vol. 49, no. 8, pp. 3016–3026, 2019, doi: 10.1007/s10489-019-01433- 4. [23] M. Zouina and B. Outtaj, “A novel lightweight URL phishing detection system using SVM and similarity index,” Human-centric Comput. Inf. Sci., vol. 7, no. 1, pp. 1–13, 2017, doi: 10.1186/s13673-017-0098-1. [24] S. Parekh, D. Parikh, S. Kotak, and S. Sankhe, “A New Method for Detection of Phishing Websites: URL Detection,” Proc. Int. Conf. Inven. Commun. Comput. Technol. ICICCT 2018, no. Icicct, pp. 949–952, 2018, doi: 10.1109/ICICCT.2018.8473085. [25] H. Le, Q. Pham, D. Sahoo, and S. C. H. Hoi, “URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection,” no. i, 2018, [Online]. Available: http://arxiv.org/abs/1802.03162. [26] J. Saxe and K. Berlin, “eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys,” 2017, [Online]. Available: http://arxiv.org/abs/1702.08568. [27] K. Shima et al., “Classification of URL bitstreams using bag of bytes,” 21st Conf. Innov. Clouds, Internet Networks, ICIN 2018, pp. 1–5, 2018, doi: 10.1109/ICIN.2018.8401597.
  • 31. [28] R. Vinayakumar, K. P. Soman, and P. Poornachandran, “Evaluating deep learning approaches to characterize and classify malicious URL’s,” J. Intell. Fuzzy Syst., vol. 34, no. 3, pp. 1333–1343, 2018, doi: 10.3233/JIFS-169429. [29] O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing detection from URLs,” Expert Syst. Appl., vol. 117, pp. 345–357, 2019, doi: 10.1016/j.eswa.2018.09.029. [30] W. Wang, F. Zhang, X. Luo, and S. Zhang, “PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks,” Secur. Commun. Networks, 2019, doi: 10.1155/2019/2595794. [31] S. Khan, H. Rahmani, S. A. A. Shah, and M. Bennamoun, “A Guide to Convolutional Neural Networks for Computer Vision,” Synth. Lect. Comput. Vis., 2018, doi: 10.2200/s00822ed1v01y201712cov015. [32] V. Karthikeyani and S. Nagarajan, “Machine Learning Classification Algorithms to Recognize Chart Types in Portable Document Format (PDF) Files,” Int. J. Comput. Appl., 2012, doi: 10.5120/4789- 6997. [33] M. A. Adebowale, K. T. Lwin, and M. A. Hossain, “Deep learning with convolutional neural network and long short-term memory for phishing detection,” 2019 13th Int. Conf. Software, Knowledge, Inf. Manag. Appl. Ski. 2019, no. March 2019, doi: 10.1109/SKIMA47702.2019.8982427. [34] C. Opara, B. Wei, and Y. Chen, “HTMLPhish: Enabling Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis,” no. October 2018, 2019, [Online]. Available: http://arxiv.org/abs/1909.01135.
  • 32. A COMPREHENSIVE STUDY OF DSCP MARKINGS' IMPACT ON VOIP QOS IN HFC NETWORKS Shaher Daoud and Yanzhen Qu School of Computer Science, Colorado Technical University, Colorado Springs, USA ABSTRACT Various factors can have a significant degrading impact on the residential Voice over Internet Protocol (VoIP) phone services’ quality. Hybrid fibre- coaxial (HFC) networks typically carry three types of traffic that include voice, data, and video. Unlike data and video, some delays or packet loss can result in a noticeable degraded impact on a VoIP’s phone conversation. This paper will analyze and assess VoIP traffic prioritization and its impact on VoIP’s quality of service (QoS) based on the concept of differentiated services code point (DSCP) markings. Call testing examines two types of calls. The first set of tests focus on calls that originate from a VoIP network and terminate on a signalling system 7 (SS7) network. The second experiment focuses on calls that originate from SS7 network and terminate on a VoIP network. The research results provide DSCP markings configurations that can improve phone conversations’ quality. KEYWORDS QoS , VoIP, DSCP Marking , jitter, HFC Network, MOS. For More Details: https://aircconline.com/ijcnc/V11N5/11519cnc01.pdf Volume Link: https://airccse.org/journal/ijc2019.html
  • 33. REFERENCES [1] Daoud, S., & Qu, Y. (2019). A Comparison Research on DSCP Marking’s Impact to the QoS of VoIP-based and SS7-based Phone Calls. [2] Daoud, S., & Qu, Y. (2019). Optimizing DSCP Marking to Ensure VoIP’s QoS over HFC Network. [3] Mathiyalakan, S. (2015). VoIP adoption: Issues & concerns. Communications of the IIMA, 6(2), 3. [4] Khitmoh, N., Wuttidittachotti, P., & Daengsi, T. (2014, February). A subjective—VoIP quality estimation model for G. 729 based on native Thai users. In Advanced Communication Technology (ICACT), 2014 16th International Conference on (pp. 48-53). IEEE. [5] Xiao, Y., Qu, G., & Kiseon, K. (2015). A new DiffServ edge router with controlled UDP. Chinese Journal of Electronics, 24(1). [6] Kamarudin, I. E., Sharif, S. A. M., & Herawan, T. (2013). Performance analysis on the effect of G. 729, Speex and GSM speech codec on 802.11 g wireless local area network over VoIPvusing packet jitter. International Journal of Control and Automation, 6(4), 387-395. [7] Broß, J. F., & Meinel, C. (2008). Can VoIP live up to the QoS standards of traditional wireline telephony? In Telecommunications, 2008. AICT'08. Fourth Advanced International Conference on (pp. 126-132). IEEE. [8] Singh, P. & Kaur, R. (2014). VOIP over Wimax: A comprehensive review. International Journal of Computer Science & Information Technologies, 5(4). [9] Yuan, Z. (2002). SIP-based VoIP network and its interworking with the PSTN. Electronics & Communication Engineering Journal, 14(6), 273-282. [10] Ali, M. A., Rashid, I., & Khan, A. A. (2013). Selection of VoIP CODECs for different networks based on QoS analysis. International Journal of Computer Applications (IJCA), 84(5), 14575-2702. [11] Chen, J. J., Lee, L., & Tseng, Y. C. (2011). Integrating SIP and IEEE 802.11 e to support handoff and multi-grade QoS for VoIP-over-WLAN applications. Computer Networks, 55(8), 1719-1734. [12] Assem, H., Malone, D., Dunne, J., & O'Sullivan, P. (2013, January). Monitoring VoIP call quality using improved simplified E-model. In Computing, Networking and Communications (ICNC), 2013 International Conference on (pp. 927-931). IEEE. [13] FCC. (2013, June). Local telephone competition: Status as of June30, 2012. [14] FCC. (2014, June). FCC releases new data on Internet access services and local telephone competition. [15] Vijayakumar, M., Karthikeyani, V., & Omar, M. (2013). Implementation of queuing algorithm in multipath dynamic routing architecture for effective and secured data transfer in
  • 34. VoIP. International Journal of Engineering Trends and Technology, 4(4), 1226-1230. [16] Gray, R. M. (2005). The 1974 origins of VoIP. Signal Processing Magazine, IEEE, 22(4), 87- 90. [17] Vlaovic, B., & Brezocnik, Z. (2001, July). Packet based telephony. InEUROCON'2001, Trends in Communications, International Conference on. (Vol. 1, pp. 210-213). IEEE. [18] Bridova, I., Vaculik, M., & Brida, P. (2011). Impact of background traffic on VoIP QoS parameters in GPON upstream link. Electronics and Electrical Engineering.–Kaunas: Technologija, (1), 104. [19] Naeem, M., Naz, S., & Asghar, S. (2013). QoS guarantee for VOIP over wireless LANs. International Journal of Hybrid Information Technology, 6(3), 25-32. [20] Mohammed, H. A., Ali, A. H., & Mohammed, H. J. (2013). The affects of different queuing algorithms within the router on QoS VoIP application using OPNET. arXiv preprint arXiv:1302.1642. [21] Rivas, F. J., Díaz, A., & Merino, P. (2013). Obtaining more realistic cross-layer QoS measurements: A VoIP over LTE Use Case. Journal of Computer Networks and Communications, 2013. [22] Mahajan, S., & Chopra, V. (2013). Performance evaluation of MANET routing protocols with scalability using QoS metrics of VOIP applications. International Journal, 3(2). [23] Chen, J. J., Lee, L., & Tseng, Y. C. (2011). Integrating SIP and IEEE 802.11 e to support handoff and multi-grade QoS for VoIP-over-WLAN applications. Computer Networks, 55(8), 1719-1734. [24] Miraz, M. H., Molvi, S. A., Ali, M., Ganie, M. A., & Hussein, A. H. (2017). Analysis of QoS of VoIP traffic through WiFi-UMTS networks. arXiv preprint arXiv:1708.05068. [25] Charonyktakis, P., Plakia, M., Tsamardinos, I., & Papadopouli, M. (2016). On user-centric modular qoe prediction for voip based on machine-learning algorithms. IEEE Transactions on mobile computing, 15(6), 1443-1456. [26] Silva, S., Soares, S., Reis, M. J., Neves, F., & Assuncao, P. A. (2017, July). A dynamic programming algorithm to select optimal high-priority voice segments using Arduino. In IEEE EUROCON 2017- 17th International Conference on Smart Technologies (pp. 271-276). IEEE. [27] Baharudin, M. A. B., Quang, T. M., & Kamioka, E. (2015). Improvement of handover performance based on bio-inspired approach with received signal strength and mean opinion score. Arabian Journal for Science and Engineering, 40(6), 1623-1636. [28] ITU-T. (1996). Methods for objective and subjective assessment of quality. ITU-T Recommendation, 830. [29] Al-Sayyed, R., Pattinson, C., & Dacre, T. (2007, February). VoIP and database traffic coexistence over IEEE 802.11 b WLAN with redundancy. In Proceedings of the International Conference on Computer, Information and Systems Science and Engineering (pp. 25-27).
  • 35. [30] Vijayakumar, M., Karthikeyani, V., & Omar, M. (2013). Implementation of queuing algorithm in multipath dynamic routing architecture for effective and secured data transfer in VoIP. International Journal of Engineering Trends and Technology, 4(4), 1226-1230. [31] Chen, S., Wang, X., & Jajodia, S. (2006). On the anonymity and traceability of peer-to-peer VoIP calls. IEEE Network, 20(5), 32-37. [32] Ahmed, D. T., & Shirmohammadi, S. (2012). Improving online gaming experience using location awareness and interaction details. Multimedia Tools and Applications, 61(1), 163-180. [33] Englander, M. (2012). The interview: Data collection in descriptive phenomenological human scientific research*. Journal of Phenomenological Psychology, 43(1), 13-35. [34] Martinek, R., & Zidek, J. (2012). Application of synthetic instrumentation that applies the trend of software-based approach for measuring on the field of modern wireless transfer systems. International Journal of Digital Information and Wireless Communications (IJDIWC), 2(3), 208- 221. [35] Creswell, J. (2013). Qualitative inquiry and research design: choosing among five approaches. Los Angeles: SAGE Publications. [36] Raychaudhuri, D., Seskar, I., Ott, M., Ganu, S., Ramachandran, K., Kremo, H., ... & Singh, M. (2005, March). Overview of the ORBIT radio grid testbed for evaluation of nextgeneration wireless network protocols. In Wireless Communications and Networking Conference, 2005 IEEE (Vol. 3, pp. 1664- 1669). IEEE.