Journal of Computer Networks»Articles

Article

Information Security of Kazakh Airlines

1Honored Worker of Education of Kazakhstan, Head. Department "Information Security" KazNTU named after K.I. Satpaeva, Kazakhstan, Almaty

2Vice-rector KazNTU named after K.I. Satpaeva, Kazakhstan,Almaty

3Master 1st year degree the Type the (protection and information security), KazNTU named after K.I. Satpaeva

4Master 2st year degree the Type the (protection and information security), KazNTU named after K.I. Satpaeva


Journal of Computer Networks. 2014, 2(2), 23-25
DOI: 10.12691/jcn-2-2-4
Copyright © 2014 Science and Education Publishing

Cite this paper:
Zhangisina G., Mukanov K., Kuldeev E., Usen A., Pavlikov R.. Information Security of Kazakh Airlines. Journal of Computer Networks. 2014; 2(2):23-25. doi: 10.12691/jcn-2-2-4.

Correspondence to: Zhangisina  G., Honored Worker of Education of Kazakhstan, Head. Department "Information Security" KazNTU named after K.I. Satpaeva, Kazakhstan, Almaty. Email: gul_zhd@mail.ru

Abstract

In this paper the problems in aviation and Information security of Kazakh airlines are considered. The problems of security in aviation and the principles of safe upper systems for civil aviation enterprises.

Keywords

References

[
[[1]  Zhangisina G.D. The cost-effectiveness of information security system. International Conference. Bulgaria 2011.
 
[[2]  Zhangisina G.D. Information security system. International Conference. Czech Republic, 2011.
 
[[3]  Zhangisina G.D., Usen A. Tursynova M., D. Akhmetov problem of information security. Search, 2013. № 2 (1).
 
[[4]  Zhangisina G.D., Rysty OM Pavlikov R., Usen, A., D. Akhmetov, Berkimbaeva A. On the methods and means of protection against leakage of information through technical channels. Search, 2013. № 1 (1).
 
[[5]  Zhangisina G.D., Shayhanova AK Rystaev O., D. Akhmetov, Tursynova M. Ombaev NO The problem of data security in organizations and enterprises. Search, 2013. № 2 (1).
 
Show More References
[6]  PB Horev Methods and tools for information security in computer systems. Moscow: Academy, 2005.
 
Show Less References

Article

Selection Criteria of the Tools of Information Security from Unauthorized Access into Computer Systems of Different Classes

1IT-Security Academic Department, National Aviation University, Kyiv, Ukraine


Journal of Computer Networks. 2014, 2(2), 18-22
DOI: 10.12691/jcn-2-2-3
Copyright © 2014 Science and Education Publishing

Cite this paper:
Oleksiy Gavrylenko, Sergiy Gnatyuk, Dmytro Matviiv. Selection Criteria of the Tools of Information Security from Unauthorized Access into Computer Systems of Different Classes. Journal of Computer Networks. 2014; 2(2):18-22. doi: 10.12691/jcn-2-2-3.

Correspondence to: Sergiy  Gnatyuk, IT-Security Academic Department, National Aviation University, Kyiv, Ukraine. Email: s.gnatyuk@nau.edu.ua

Abstract

The authors of the article proposed the definition of selection criteria of technical products protection of information from unauthorized access in automated systems of different classes based on the analysis and synthesis of classifications, characteristics and requirements to the known products for the purpose of forming the appropriate method of choice product protection.

Keywords

References

[[[[[[[[[[[[[[[
[[1]  Decree of President of Ukraine, Position number 17 is about a technical information security in Ukraine, List of tools of the general setting, which are selected for providing of technical information security, necessity of guard of which by the legislation of Ukraine, 27 Sep 1999.
 
[[2]  Law of Ukraine, About information security in informatively telecommunication systems, 5 Jul 1994. [Online] Available: http://zakon4.rada.gov.ua/laws/show/80/94-вр.
 
[[3]  Order number 22 of the Department of the special telecommunication systems and information security of Ukraine Service, ND TIS 2.5-004-99. Criteria of estimation of protection of information are in the computer systems from an unauthorized access, 28 Apr 1999.
 
[[4]  I.Z. Duchyak, Creation of classifiers, 2010. [Online] Available: http://pidruchniki.ws/1633082637655/logika/stvorennya_klasifikatoriv.
 
[[5]  L.I. Abrosymov, A.Y. Koablev, Methods and security information tools, [E-book] Available: http://www.melnikoff.com/yuriy/ posobie.htm.
 
Show More References
[6]  Order number 472 of the Administration of Government service of special communication and information security of Ukraine, ND TIS 1.5-002-2012. Classifier of tools of technical security information, 29 Aug 2012.
 
[7]  I.I. Simora, O.V. Gavrylenko, Classifier of tools of information security in informatively telecommunication systems, The 3rd international Scientific Conference ITSEC, National aviation university, 145.
 
[8]  GOST P ISO/MEC 12182-2002, Classification of programmatic tools, 01 Dec 2002.
 
[9]  ISO/IEC 15408-1:2009, Information technology -- Security techniques, Evaluation criteria for IT security -- Part 1: Introduction and general model.
 
[10]  Position number 1299 about a technical information security in Ukraine, ND TIS 3.7-001-99. The methodical pointing is in relation to creating of requirement specification on creation of the system of information security of automated system, 27 Sep 1999.
 
[11]  Order number 22 of the Department of the special telecommunication systems and information security of Ukraine Service, ND TIS 2.5-005-99. Classification of AS and standard functional types of protected of the processed information is from an unauthorized access, 28 Apr 1999.
 
[12]  Order number 93 of the Administration of Government service of special communication and information security of Ukraine, Position about state examination in the sphere of technical information security, 16 May 2007.
 
[13]  State standard of Ukraine, DSTU 3974-200. The system of development and imputing of products is on a production: Rule implementation of experimental and designer work, 01 Jun 2000.
 
[14]  List of facilities of TIS, which have an expert conclusion about accordance with the requirements of technical information security, [Online] Available: http://dstszi.kmu.gov.ua/dstszi/ control/uk/publish/. /.[Accessed May. 2, 2014].
 
[15]  Order number 200 of State standard of Ukraine, DSTU 3396.2-97. information security. Technical information security. Terms and determinations.11 Apr 1997.
 
[16]  Order number 60 of the Department of the special telecommunication systems and information security of Ukraine Service, ND TIS 3.6-001-2000. Technical information security. Computers systems. An order of creation, introduction, accompaniment and modernization of facilities of technical information security, is from an unauthorized access, 20 Dec 2000.
 
[17]  Order of the Department of the special telecommunication systems and information security of Ukraine Service, ND TIS 2.7-009-09. Guidelines for the evaluation of functional services security tools protecting information in computer systems from unauthorized access.
 
[18]  Tax Code of Ukraine number № 2755-VI., 02 Dec 2010. [Online]. Available: http://zakon4.rada.gov.ua/laws/show/2755-17/. [Accessed May. 2, 2014].
 
[19]  State standard of Ukraine, DSTU 3396.0-96 Information Security. Technical protection of information. The main provisions, 01 Jan 1997.
 
[20]  Information security tool, [Online] Available: http://avtoprom. kiev.ua/avtoprom/ua/content/.
 
Show Less References

Article

Parallelization of Integer Squaring Algorithms with Delayed Carry

1Academic Department of IT-Security, National Aviation University, Kiev, Ukraine


Journal of Computer Networks. 2014, 2(2), 10-17
DOI: 10.12691/jcn-2-2-2
Copyright © 2014 Science and Education Publishing

Cite this paper:
Korchenko Oleksandr, Kovtun Vladislav, Okhrimenko Andrew. Parallelization of Integer Squaring Algorithms with Delayed Carry. Journal of Computer Networks. 2014; 2(2):10-17. doi: 10.12691/jcn-2-2-2.

Correspondence to: Okhrimenko  Andrew, Academic Department of IT-Security, National Aviation University, Kiev, Ukraine. Email: andrew.okhrimenko@gmail.com

Abstract

Increasing amounts of information that needs to be protected put in claims specific requirements for information security systems. The main goal of this paper is to find ways to increase performance of cryptographic transformation with public key by increasing performance of integers squaring. Authors use delayed carry mechanism and approaches of effective parallelization for Comba multiplication algorithm, which was previously proposed by authors. They use the idea of carries accumulation by addition products of multiplying the relevant machine words in columns. As a result, it became possible to perform addition of such products in the column independently of each other. However, independent accumulation of products and carries require correction of the intermediate results to account for the accumulated carries. Due to the independence of accumulation in the columns, it became possible to parallelize the process of products accumulation that allowed formulating several approaches. In this paper received theoretical estimates of the computational complexity for proposed squaring algorithms. Software implementations of algorithms in C++ allowed receiving practical results of the performance, which are not contrary to theoretical estimates. The authors first proposed applying the method of delayed carry and parallelization techniques for squaring algorithms, which was previously proposed for integers multiplication.

Keywords

References

[
[[1]  Cohen H., Frey G., Avanzi R., Doche C., Lange T., Nguyen K., Vercauteren F. Handbook of Elliptic and Hyperelliptic Curve Cryptography, Chapman & Hall/CRC, 2006, 843.
 
[[2]  Denis, T., Rose G. (2006). BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic, Elsevier/Syngress, 2006, 315.
 
[[3]  Hankerson, D., Menezes, A.J., Vanstone, S. Guide to Elliptic Curve Cryptography, Springer-Verlag Professional Computing Series, 2004, 332.
 
[[4]  Kovtun, V.Y., Okhrimenko, A.O. “Approaches for the Parallelization of Software Implementation of Integer Multiplication”, Radiotehnika. Vseukrainskij mezhvedomstvennyj nauchno-tehnicheskij sbornik, 171, 123-132. 2012.
 
[[5]  Kovtun, V.Y., Okhrimenko, A.O. “Integer multiplication algorithms with delayed carry for public-key cryptosystems”. In: V.S. Ponomarenko (Eds.), Informacionnye tehnologi i sistemy v upravlenii, obrazovanii, nauke. Kharkiv: Cifrova drukarnja №1. 69-82. 2013.
 
Show More References
[6]  Kovtun, V.Y., Okhrimenko, A.O., Nechiporuk, V.V. “Approaches for the performance increasing of software implementation of integer multiplication in prime fields”, Zashchita informacii, 1 (54), 68-75. 2012.
 
Show Less References

Article

About the Security System in Air Transportation

1Honored Worker of Education of Kazakhstan, Head. Department "Information Security" KazNTU named after K.I. Satpaeva, Kazakhstan, Almaty

2Master 1st year degree the Type the (protection and information security), KazNTU named after K.I. Satpaeva


Journal of Computer Networks. 2014, 2(2), 6-9
DOI: 10.12691/jcn-2-2-1
Copyright © 2014 Science and Education Publishing

Cite this paper:
Zhangisina G., Yessetov Chingis. About the Security System in Air Transportation. Journal of Computer Networks. 2014; 2(2):6-9. doi: 10.12691/jcn-2-2-1.

Correspondence to: Zhangisina  G., Honored Worker of Education of Kazakhstan, Head. Department "Information Security" KazNTU named after K.I. Satpaeva, Kazakhstan, Almaty. Email: gul_zhd@mail.ru

Abstract

In this paper the problems in aviation and principles security creating are considered. The problems of security in aviation and the principles of safe upper systems for civil aviation enterprises. R & D related to the protection of information and the development of models and cryptographic techniques to protect the information in the aviation industry.

Keywords

References

[[1]  Zhangisina G.D, Yessetov Ch.Security issues in aviation. Proceedings of the 3rd International Scientific Conference dedicated to the 80th anniversary of the National Aviation University. Kiev, 21-24 May 2014 y. p.1-5.
 
[[2]  Zhangisina G.D., Yessetov Ch/ Systems Security in air transport. Journal of Information Security, Kiev, 2013 № 3 (11). Lugansk. -5 p.
 

Article

Investigation of Call Quality in Cdma: Case Study of Two Network Operators in Epe Town, Nigeria

1Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria

2Department of Computer Engineering, Moshood Abiola Polytechnic, Abeokuta, Nigeria


Journal of Computer Networks. 2014, 2(1), 1-5
DOI: 10.12691/jcn-2-1-1
Copyright © 2014 Science and Education Publishing

Cite this paper:
O. Shoewu, Segun O. Olatinwo. Investigation of Call Quality in Cdma: Case Study of Two Network Operators in Epe Town, Nigeria. Journal of Computer Networks. 2014; 2(1):1-5. doi: 10.12691/jcn-2-1-1.

Correspondence to: Segun  O. Olatinwo, Department of Computer Engineering, Moshood Abiola Polytechnic, Abeokuta, Nigeria. Email: segunolatinwo@yahoo.co.uk

Abstract

This work presents the study of the call quality provided by the two CDMA service operators within Epe town of Lagos State, South-West Nigeria by collecting and analyzing call data from the Network Operation Centre in an attempt to evaluate the call quality parameters as provided by these operators. The result of the analysis is then compared with that those specified by the Nigerian Communication Commission NCC which is the main regulatory body for telecommunication operations in Nigeria. In this work, various call quality parameters were being evaluated for two CDMA mobile operators, that is, Operators 1 and Operator 2 with existing network infrastructures within Epe town. A total of three parameters were evaluated. These parameters are Ec/Io, Rx_Level and Tx_Power. In the course of this research, the six call quality parameters and the quality of services provided by two CDMA network operators were investigated, the research outcome shows that both operators provided a very good quality of services as specified by the Nigerian Communication Commission (NCC) during the period within which this research work was carried out.

Keywords

References

[[[[[[[[[[[[
[[1]  Alamouti, S.M, “A simple transmit diversity technique for wireless communications”, IEEE J. Select. Areas Commun., 16, 1451-1458, 1998.
 
[[2]  Alard, M. and Lassalle, R., “Principles of modulation and channel coding for digital broadcastingfor mobile receivers”, EBU Techn, Review 224, 47-68, 1987.
 
[[3]  Bahl, L.R, Cocke, J., Jelinek, F. and Raviv, J. “Optimal decoding of linear codes for minimizingsymbol error rate”, IEEE Trans. Inf. Theory, 20, 284-287, 1974.
 
[[4]  Baier, P.W, Bing, T. and Klein, A., “TD-CDMAin Third Generation Mobile Communication System”, Artech House Publishers, 25-72, 2000.
 
[[5]  Banelli, P. and Baruffa, G., “Mixed BB-IF predistortion of OFDM signals in nonlinear channels”, IEEE Trans. Broadcast, 47, 137-146, 2001.
 
Show More References
[6]  Benedetto, S. and Biglieri, E., “Principles of Digital Transmission With Wireless Applications Generation Mobile Communication Systems”, Artech House Publishers, 91-132, 1999.
 
[7]  Blahut, R.E., “Theory and Practice of Error Control Codes”, Addison-Wesley, Reading, Massachusetts, 1983.
 
[8]  Blahut, R.E., “Digital Transmission of Information”, Addison-Wessley, 1990.
 
[9]  Bossert, M. “Channel Coding for Telecommunications”, Wiley, 1999.
 
[10]  Bracewell, N., “The Fourier Transform and its Applications”, McGraw-Hill, 2000.
 
[11]  Caire, G., Taricco, G. and Biglieri, E., “Bit-interleaved coded modulation”, IEEE Trans. Inf. Theory, 1998.
 
[12]  Chang, R.W., “Synthesis of band-limited orthogonal signals for multi-channel data transmission”, Bell Labs Tech. J.,45, 1775-1796, 1966.
 
[13]  Chang R.W. and Gibby, R.A., “A theoretical study of performance of an orthogonal multiplexingdata transmission scheme”, IEEE Trans. Commun., 16, 529-340, 1968.
 
[14]  Cimini, L.J., “Analysis and simulation of a digital mobile radio channel using orthogonal frequency division multiplexing”, IEEE Trans. Commu., 33, 665-675, 1985.
 
[15]  Clark, G.C and Cain, J.B., “Error-Correction Coding for Digital Communications”, Plenum, NewYork, 1998.
 
[16]  Holma, H. and Toskala, WCDMA for UMTS, Wiley, Revised Edition, 2001.
 
[17]  Hoeher, P., “A statistical discrete-time model for the WSSUS multipath channel”, IEEE Trans. Veh. Technol,. 41, 461-468, 1992.
 
Show Less References

Article

Broadband Wireless Access Deployment Approach to Rural Communities

1Electrical and Information Engineering Department, Covenant University, Nigeria


Journal of Computer Networks. 2013, 1(3), 38-45
DOI: 10.12691/jcn-1-3-1
Copyright © 2013 Science and Education Publishing

Cite this paper:
Ibikunle Frank, Jakpa Orunta, Ike Dike. Broadband Wireless Access Deployment Approach to Rural Communities. Journal of Computer Networks. 2013; 1(3):38-45. doi: 10.12691/jcn-1-3-1.

Correspondence to: Ibikunle Frank, Electrical and Information Engineering Department, Covenant University, Nigeria. Email: faibikunle2@yahoo.co.uk

Abstract

Broadband wireless access networks are enterprise level networks that provide more capacity as well as coverage. In rural inaccessible areas, wired networks are not at all cost effective. Wireless networking offers an alternative solution for such problem of information access in rural areas. They have definitely changed the way people communicate and share information among themselves by overcoming problems nowadays associated with distance and location. This paper describes the frame work for deploying Wi-Fi and WiMAX technologies in Jeddo, a rural community in Warri, Nigeria. Wi-Fi / WiMAX technologies have not only the potential to compete on a cost-per-megabyte basis with cable and Digital Subscriber Line (DSL), but also make ubiquitous broadband access a reality. If engineering and economics are correctly applied, a Wi-Fi network can be built around an entire rural community with a WiMAX backhaul, instead of providing limited coverage for hotspots. This paper further outline the technical aspects of WiFi and WiMAX, discuss the network planning issues to implement these technologies, survey their network infrastructure and different components as well as explore how they are leveraged by service providers to offer wireless broadband internet connectivity and services.

Keywords

References

[[[[[[[[[[[[[[[[[[[[[[[[[
[[1]  Sameer Kurkure and Shravan Kumar, “WiFIRE: Wireless Broadband Access for Rural Area, Unpublished Masters Thesis, KanwalRekhi School of Information Technology.
 
[[2]  Intel Corp., Understanding Wi-Fi and WiMAX as Metro-Access Solutions, retrieved from: http//www.intel.com, accessed on June 23, 2013.
 
[[3]  Dowd, K., “Wireless WAN/LAN solutions for schools using WiMAX, WiFi and Secured Access andContent”. Internet Document of Halestar, Inc,,Hartford Connecticut, Virginia, USA, 2008.
 
[[4]  G.O. Ofori-Dwumfuo and S.V. Salakpi, “WiFi and WiMAX Deployment at the Ghana Ministry of Food and Agriculture”, Research Journal of Applied Sciences, Engineering and Technology, 3(12): 1374-1383, December 2011.
 
[[5]  Corning Incorporated, “Broadband Technology Overview White Paper”, June 2005.
 
Show More References
[6]  Salakpi, S.V., M. Ahelegbe, F. Ameyaw and J. Mensah, “The design of a WiFi-WiMax configuration for MOFA”. Unpublished M.Sc. Thesis, Trimester Project Report, Ghana Telecom University College, Ghana, 2009.
 
[7]  Gunasekaran and F.C. Harmantzi, “Emerging wireless technologies for developing countries”, Technology in Society, (2007) 23-42.
 
[8]  M. Mandioma, “Rural Internet Connectivity: A Deployment in Dwesa-Cwebe, Eastern Cape, South Africa”, Nov. 2007.
 
[9]  http://www.dsoftsolutions.net
 
[10]  Aruba Networks, “Using Wi-Fi and WiMAX to Deliver Broadband Wireless Services”.
 
[11]  http://www.wimaxforum.org/resources/technical-specifications.
 
[12]  S. Banerji and R.S. Chowdhury, “Wi-Fi &WiMAX: A Comparative Study”.
 
[13]  N.Y Asabere et al., “Analysis of Wi-Fi and WiMAX deployment: a Case Study of theMinistry Of Food and Agriculture (MOFA) In The Republic Of Ghana”.
 
[14]  http://vetechlib.blogspot.com.
 
[15]  http://www.ni.com/white-paper/7102/en.
 
[16]  MuhibbulMuktadir, “WiMAX& Wi-Fi”, IT infrastructure and Operations, QUBES, 2009.
 
[17]  E.S. Roman, “Bringing Broadband Access to Rural Areas: A Step-By-Step Approach for Regulators, Policy Makers and Universal Access Program Administrators”, 9th Global Symposium for Regulators, Beirut, Lebanon, 10-12 November 2009.
 
[18]  http://www.esri.com/what-is-gis/overview#overview_panel
 
[19]  Geographic information system, retrieved from www.wikipedia.com, June 20, 2013.
 
[20]  http://searchenterprisewan.techtarget.com/tip/How-to-calculate-network-bandwidth-requirements
 
[21]  http://www.wikihow.com/Calculate-Bandwidth
 
[22]  http://en.kioskea.net/faq/2761-what-is-network-architecture
 
[23]  Network architecture, retrieved from www.wikipedia.org, June 20, 2013.
 
[24]  “WiMAX Forum, “WiMAX’s technology for LOS and NLOS environments”.
 
[25]  http://en.wikipedia.org/wiki/List_of_deployed_WiMAX_networks.
 
[26]  S. Islam et al., “Performance Analysis of WiMax/WiFi System under Different Codecs”,International Journal of Computer Applications, Volume 18– No.6, March 2011.
 
[27]  T. Lammle, “CCNA Cisco Certified Network Associate Study Guide Sixth Edition”, Wiley Publishing, 2007.
 
[28]  A. Bruno and S. Jordan, “Cisco Certified Design Associate 640-864 Official Certification Guide”, Cisco Press, 2011.
 
[29]  F.A Ibikunle, “Comparative Analysis of Alternative Last Mile Broadband Access Technologies (Wi-Fi and WiMAX)”,Pacific Journal of Science and Technology, pp. 280-285, 2008
 
[30]  V. Mehta and N. Gupta, “Performance Analysis of QoS Parameters for WiMAX Networks”,International Journal of Engineering and Innovative Technology (IJEIT) Volume 1, Issue 5, May 2012.
 
Show Less References

Article

Recognition of Nigerian Major Languages Using Neural Networks

1Botswana Int’l University of Science and Technology, Botswana


Journal of Computer Networks. 2013, 1(2), 32-37
DOI: 10.12691/jcn-1-2-3
Copyright © 2013 Science and Education Publishing

Cite this paper:
Ibikunle Frank, Katende James. Recognition of Nigerian Major Languages Using Neural Networks. Journal of Computer Networks. 2013; 1(2):32-37. doi: 10.12691/jcn-1-2-3.

Correspondence to: Ibikunle Frank, Botswana Int’l University of Science and Technology, Botswana. Email: faibikunle2@yahoo.co.uk

Abstract

Speech Recognition is the technology by which sounds, words or phrases spoken by humans are converted into electrical signals and these signals are transformed into coding patterns to which meanings are assigned. It has two main types: discrete word and continuous speech recognition systems. Each type can be further sub-divided into two categories as Speaker Dependent and Speaker Independent recognition systems. Speaker dependent system operates only on the speech of a particular speaker for which the system is trained, while the Speaker Independent systems can be operated on the speech of any speaker. The speech recognition system proposed here digitizes the isolated words spoken by a speaker and performs Mel Frequency ceptral analysis and other signal processing techniques on the digitized data. The processed speech signal is then passed on to a pattern recognition which takes action based on the type of command pattern received. Artificial Neural Network (ANN) is used as speech recognition engine. Two different corpora were collected of audio recordings of Yoruba, Igbo and Hausa language speakers, in which subjects read aloud different words. One of the collected corpora contained data with background noise and the other without background noise. The results obtained from simulation can be generalized to cater for larger vocabularies and for continuous speech recognition.

Keywords

References

[[[[[[[
[[1]  Rudnicky, A., Lee K., and Hauptmann A., (1992):“Survey of current speech technology”. Communications of the ACM, 37(3): pp52-57.
 
[[2]  Picheny M., (2002). Large vocabulary speech recognition, IEEE Computer, 35(4):42-50.
 
[[3]  Reddy D.R., (1976). Speech Recognition by Machine: a Review. Proceeding of IEEE, 64(4):501-531.
 
[[4]  Odetunji Ajadi Odelobi, “Recognition of Tones in Yoruba Speech: experiments with Artificial Neural Network, Studies in Computational Intelligence 83, 23-47 (2008).
 
[[5]  Mohamad Adnan etal., “Speech Recognition using Artificial NeuralNetworks and Hidden Markov Models”.
 
Show More References
[6]  Burr, D. (1988). “Experiments on Neural Net Recognition of Spoken and Written Text”, IEEE Trans. on Acoustics, Speech, and Signal Processing, 36, pp 1162-1168.
 
[7]  Franzini, M., Witbrock, M., and Lee K., “Speaker-Independent Recognition of Connected Utterances using Recurrent and Non-Recurrent Neural Networks”, In Proc. International Joint Conference on Neural Networks, 1989.
 
[8]  Rabiner, L, and Wilpon, J., (1979). “Considerations in applying clustering techniques to speaker-independent word recognition” Journal of Acoustic Society of America, pp.663-673.
 
[9]  Haykin S, "Neural Networks: a comprehensive foundation", 2nd Edition, Prentice Hall, 1999.
 
[10]  LawenceRabinar& Bine-hwangJuang, “Fundamentals of speech recognition’. Prentice Hall, Englewood Cliffs, 1999.
 
[11]  Jurafsky, Daniel and Martin, James H, “Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics and Speech Recognition” (1st ed.). Prentice Hall, 1996.
 
[12]  Daoudi, K. (2002): “Automatic Speech Recognition: The New Millennium”, Proceedings of the 15th International Conference on Industrial and Engineering, Applications of Artificial Intelligence and Expert Systems: Developments in Applied Artificial Intelligence, pp 253-263.
 
Show Less References

Article

DE Based Job Scheduling in Grid Environments

1R.V.R. & J.C. College of Engineering, Guntur, A.P., India

2VNR Vignana Jyothi Institute of Engineering & Technology, Hyderabad, A.P., India


Journal of Computer Networks. 2013, 1(2), 28-31
DOI: 10.12691/jcn-1-2-2
Copyright © 2013 Science and Education Publishing

Cite this paper:
Ch.Srinivasa Rao, Dr.B.Raveendra Babu. DE Based Job Scheduling in Grid Environments. Journal of Computer Networks. 2013; 1(2):28-31. doi: 10.12691/jcn-1-2-2.

Correspondence to: Ch.Srinivasa Rao, R.V.R. & J.C. College of Engineering, Guntur, A.P., India. Email: chereddy.sriny@gmail.com

Abstract

Grid Computing is a computing framework developed to meet the growing computational demands. Essential grid services contain more intelligent functions for resource management, grid service marketing, collaboration etc. The load sharing of computational jobs is the major task of computational grids. Grid resource manager provides functional mechanism for discovery, publishing of resources as well as scheduling, submission and monitoring of jobs. This paper introduces an approach, based on Differential Evolution Algorithm for scheduling jobs on computational grid. The proposed approach generates an optimal schedule which helps in completing the jobs within a minimum period of time. We evaluate the performance of our proposed approach with a direct Genetic Algorithm (GA), Simulated Annealing (SA) and Particle Swarm Optimization (PSO) approach.

Keywords

References

[[[[[[[
[[1]  I.Foster,C.Kesselmann,(Eds.), The Grid: Blueprint for a New Computing Infrastructure, Morgan Kaufmann Publishers, , 1999.
 
[[2]  O.H.Ibarra and C.E.Kim, Heuristic algorithms for scheduling independent tasks on nonidentical processors, J.ACM 24, 2 (Apr.1977), pp.280-289.
 
[[3]  K.Krauter, R.Buyya, M.Maheswaran,A taxonomy and survey of grid resource management systems for distributed computing, Software-Practice and Experience,32:135-164, 2002.
 
[[4]  S.A.Jarvis, D.P.Spooner, H.N.Lim Choi Keung, G.R.Nudd, J.Cao, S.Saini, Performance prediction and its use in parallel and distributed computing systems. In the Proceedings of the IEEE/ACM International Workshop on Performance Evaluation and Optimization of Parallel and distributed Systems, Nice, France.2003.
 
[[5]  T.D.Braun, H.J.Siegel, N.Beck, D.A.Hensgen, R.F.Freund, A comparison of eleven static heuristics for mapping a class of independent tasks on heterogeneous distributed systems, Journal of Parallel and Distributed Computing, 2001, pp.810-837.
 
Show More References
[6]  H.Liu, A.Abraham, A.E.Hassanien, Scheduling Jobs on computational grids using a fuzzy particle swarm optimization algorithm, Future Generation Computer Systems (2009).
 
[7]  S.K.Garg, R.Buyya, H.J.Siegel, Time and cost trade-off management for scheduling parallel applications on Utility Grids, Future Generation Computer Systems (2009).
 
[8]  F.P.Chang, C.Hwang, Design of digital PID Controllers for continuous time plants with performance criteria, Journal of the chineese Institute of Chemical Engineers, 35(6), 2004, pp.683-696.
 
[9]  Y.P.Chang, C.J.Wu, Optimal multiobjective planning of large-scale passive harmonic filters using hybrid differential evolution method considering parameter and loading uncertainty, IEEE transactions on Power Delivery, 20(1), 2005, pp.408-416.
 
[10]  G.Onwubolu, D.Davendra, Discrete Optmization Scheduling flow shops using differential evolution algorithm, European Journal of Operational Research 171 2006, pp.674-692.
 
[11]  A.K.M.K.A.Talukder, M.Kirley, R.Buyya, Multi objective Differential Evolution for Scheduling workflow applications on global Grids, Concurrency and Computation: Practice and Experience, published online in Wiley Interscience, (2009).
 
[12]  K.Price, R.Storn, Differential evolution (DE) for Continuous function optimization, 2007.http://www.icsi.berkeley.edu/%7Estorn/code.html.
 
Show Less References

Article

Identification of Hidden VoIP (Grey Traffic)

1National University of Science and Technology, Pakistan

2Centre for Advanced Studies in Engineering, Pakistan


Journal of Computer Networks. 2013, 1(2), 15-27
DOI: 10.12691/jcn-1-2-1
Copyright © 2013 Science and Education Publishing

Cite this paper:
Ch. M. Asim Rasheed, Ayesha Khaliq, Ammara Sajid, Sana Ajmal. Identification of Hidden VoIP (Grey Traffic). Journal of Computer Networks. 2013; 1(2):15-27. doi: 10.12691/jcn-1-2-1.

Correspondence to: Sana Ajmal, Centre for Advanced Studies in Engineering, Pakistan. Email: sana.ajmal84@yahoo.com

Abstract

National Telecommunication Regulator in many countries around the world imposes call termination taxes on national calls as well as international calls landing in that country. In many third world countries, every year up to 90 % of the international traffic bypasses regulatory checks, causing a huge revenue loss to the country. The use of illegal gateways to bypass the Voice Clearing Houses to terminate international traffic using VoIP gateways, GSM / local line branch exchanges or other related equipment are the simplest means of Grey traffic. Use of the encryption and other network design techniques are the easiest methods to hide the VoIP traffic from any clearing house. We have proposed an architecture based on a mathematical model to detect, segregate and qualify VoIP traffic (Grey) into different categories. The proposed model identifies grey traffic, through traffic analysis techniques coupled with statistical anomaly based intrusion detection system and behavior analysis.

Keywords

References

[[[[[[[[[[[[[[[[[[[[[
[[1]  Nabil Schear and Nikita Borisov “Preventing SSL Traffic Analysis with Realistic Cover Traffic (extended abstract)” 16th ACM Conference on Computer and Communications Security, CCS 2009.
 
[[2]  Sen. Patrick Leahy “Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act of 2011”, 112th US Congress, 2011-2012.
 
[[3]  PTA, “PTA ANNUAL REPORT 2008-09-10” Annual Reports Published by Pakistan Telecommunication Authority, online available on http://www.pta.gov.pk/annual-reports, 2010.
 
[[4]  ITU “The Status of Voice over Internet Protocol (VoIP) Worldwide, 2006” Report published by International Telecommunication Union, The Future of Voice Document, January 2007.
 
[[5]  Choudhary, M.A.; Aftab, H “Optimizing financial parameters to disincentives international grey traffic and rationalization of measures to curb illegal international telephony in Pakistan” IEEE International Technology Management Conference (ITMC), 2011.
 
Show More References
[6]  Toshiya Okabe, Tsutomu Kitamura, and Takayuki Shizuno. “Statistical traffic identification method based on flow-level behavior for fair VoIP service” 1st IEEE workshop on VoIP Management and Security (VoIP MaSe), April 2006.
 
[7]  Riyad Alshammari and A. Nur Zincir-Heywood “Unveiling Skype Encrypted Tunnels using GP” IEEE Congress on Evolutionary Computation (CEC), 2010.
 
[8]  Stephens, A., and P. J. Cordell. "SIP and H. 323—interworking VoIP networks." BT technology journal 19.2 (2001): 119-127.
 
[9]  JPG Dalton Jr, SA Thomas “Clearinghouse server for Internet telephony and multimedia communications” US Patent 7,017,050, 2006.
 
[10]  Angelos D. Keromytis, “Survey of VoIP Security Research Literature” Voice over IP Security, Springer Briefs in Computer Science, 1, 27-55, 2011.
 
[11]  Carlos Scott and Chez Ciechanowicz, “Covert channels of communication hidden inside legitimate networks cannot be eliminated but they can be significantly reduced by careful design and analysis”, Information Security Group at Royal Holloway, University of London, 2008.
 
[12]  Thomas Porter, C. I. S. S. P., and CCDA CCNP. Practical VoIP Security. Syngress, 2006.
 
[13]  Chou, W. “Strategies to Keep Your VoIP Network Secure” IEEE IT Professional September.-October. 2007.
 
[14]  Robert Birke, Marco Mellia, Michele Petracca, Dario Rossi “Experiences of VoIP traffic monitoring in a commercial ISP” International Journal of Network Management Special Issue: Traffic Monitoring and Network Measurements: from Theory to Practice, 20(5), 339-359, September/October 2010.
 
[15]  M. Dusi, M. Crotti, F. Gringoli and L. Salgarelli “Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting”, Elsevier, Journal of Computer Networks, 53, 81-97, 2009.
 
[16]  Taner Yildirim and Dr. PJ Radcliffe “VoIP Traffic Classification in IPSec Tunnels”, International Conference on Electronics and Information Engineering (ICEIE 2010).
 
[17]  A. W. Moore and D. Zuev “Internet traffic classification using Bayesian analysis techniques”, In SIGMETRICS ’05: Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pages 50-60, New York, NY, USA, 2005. ACM Press.
 
[18]  N. Williams, S. Zander, and G. Armitage “A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification” SIGCOMM Computer. Communication. Rev., 36(5):5-16, 2006.
 
[19]  E. Alpaydin “Introduction to Machine Learning” MIT Press, 2004.
 
[20]  J. Doucette and M. Heywood “Gp Classification under Imbalanced Data Sets: Active Sub-sampling and AUC Approximation”, In European Conference on Genetic Programming, volume. 4971 of Lecture Notes in Computer Science, pages 266-277, 2008.
 
[21]  Chappell, Laura A. Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide. Protocol Analysis Institute, Chappell University, 2010.
 
[22]  Caswell, Brian, Jay Beale, and Andrew Baker. Snort Intrusion Detection and Prevention Toolkit. Syngress, 2007.
 
[23]  Snex A/S “Application Visibility and Risk Report”, A report on Network Traffic by Paloalto Networks, April 19, 2011.
 
[24]  Bing Li, Zhigang Jin , Maode Ma, ”VoIP Traffic Identification Based on Host and Flow Behavior Analysis”, 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), 2010.
 
[25]  Pelaez, J.C.; Fernandez, E.B, “VoIP Network Forensic Patterns” Fourth International Multi-Conference on Computing in the Global Information Technology, 2009. ICCGI '09.
 
[26]  Venkatesha Prasad, R., et al. "Comparison of voice activity detection algorithms for VoIP." Computers and Communications, 2002. Proceedings. ISCC 2002. Seventh International Symposium on. IEEE, 2002.
 
Show Less References

Article

QoS Routing Algorithm with Sleep Mode in MANETs


Journal of Computer Networks. 2013, 1(1), 10-14
DOI: 10.12691/jcn-1-1-2
Copyright © 2013 Science and Education Publishing

Cite this paper:
Akhilesh A. Waoo, Dr. P.S. Patheja, Dr. Sanjay Sharma, Tripti Nema. QoS Routing Algorithm with Sleep Mode in MANETs. Journal of Computer Networks. 2013; 1(1):10-14. doi: 10.12691/jcn-1-1-2.

Correspondence to: Tripti Nema, . Email:

Abstract

MANET became the focus of researchers as an assurance technology for a broad range of due to their self-managing and self-configuring multi-hop wireless networks since the nodes are mobile, the network topology may change rapidly and unpredictably over time. An ad hoc network, or MANET (Mobile Ad-hoc Network), is a network contain only of nodes, with no Access Point. One significant area of research within ad hoc networks is energy consumption concern. The primary aim of ad hoc networks is to call for the energy-constrained protocols. Energy consumption evaluation methodology is set up for the protocol consideration in different mobile network. AODV routing protocol carry out well on assessment of energy consumption for the mobile ad hoc network with high node mobility. Nodes in MANET networks are basically battery operated, and thus have way in to a limited amount of energy. This process recommended an Energy based Ad-Hoc on-Demand Routing algorithm that balances energy among nodes so that a minimum energy level is maintained among nodes and the lifetime of network is enhanced. This paper, aim on increasing the prolonged existence of node in the network in our proposed algorithm, QS (QoS Scheme for MANET’s), addresses the issue of energy consumption in a manner fair to all network nodes. In our proposed scheme “energy aware routing” QS is suggested to use. The QS makes sure the connected and neighboring nodes to use it as forwarding node. Also, it checks the node with higher energy to make it applicant for forwarding purpose. From a functional point of view, QS can be consisting of two main units: One of these units deal with the energy conservation operation. This is done through uphold the nodes’ threshold energy levels to minimize the packet loss due to link breaks. The other aspect of the algorithm takes care of connectivity using routing protocol. It helps to guarantee the routing protocol makes routing decisions that serve a specific goal. The construct of network scenarios and performance study is done on NS-2.34 to simulate both the AODV and AODV-Sleep under the similar scenario. This paper also compares and analyzes the simulation results with a popular on-demand routing protocol AODV to show the utility of this algorithm. From this simulation one finds that the overall MANET’s efficiency is maximized.

Keywords

References

[[[[[[[[
[[1]  C. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers,” in ACM SIGCOMM'94 Conference on Communications Architectures, Protocols and Applications, 1994, pp. 234-244, 1994.
 
[[2]  D.B. Johnson and D.A. Maltz, “Dynamic source routing in ad hoc wireless networks,” in Mobile Computing, Imielinski and Korth, Eds. Kluwer Academic Publishers, vol. 353. pp. 153-181, 1996.
 
[[3]  C. Perkins, E. Belding-Royer and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” RFC 3561 (Experimental), Jul. 2003.
 
[[4]  Tripti nema, Akhilesh waoo, PS. Patheja, Sanjay Sharma, “Energy based AODV Routing Algorithm with Sleep Mode in MANETs” International Journal of Computer Applications (0975-8887) vol.58, No.19, November 2012.
 
[[5]  Roopal Lakhwani, Sakshi Suhane Anand Motwani, “Agent based AODV Protocol to Detect and Remove Black Hole Attacks” International Journal of Computer Applications (0975-8887) vol.59, No.8, pp. 35-39, December 2012.
 
Show More References
[6]  J. Li, D. Cordes, and J. Zhang, "Power-aware routing protocols in ad hoc wireless networks," IEEE Trans. Wireless Commun., pp. 69-81, Dec. 2005.
 
[7]  Tripti nema, Akhilesh waoo, PS. Patheja, Sanjay Sharma, “Energy Efficient Adaptive Routing Algorithm in MANET with Sleep Mode”, International Journal of Advanced Computer Research, vol.2, Issue 6, pp.431, 2012.
 
[8]  Tai Hieng Tie, Chong Eng Tan, Sei Ping Lau “Alternate Link Maximum Energy Level Ad Hoc Distance Vector Scheme for Energy Efficient Ad Hoc Networks Routing” International Conference on Computer and Communication Engineering (ICCCE 2010), pp.1-6, 11-13 May 2010.
 
[9]  Sanjay Kumar Dhurandher, Sudip Misra, Mohammad S. Obaidat, Vikrant Bansal, Prithvi Singh, Vikas Punia “An Energy-Efficient On-Demand Routing Algorithm for Mobile Ad-Hoc Networks”, International Conference on Computer and Communication Engineering, pp. 995-961, Aug. 31 2008-Sept. 3 2008.
 
[10]  Sofian Hamad, Hadi Noureddine and Hamed Al-Raweshidy, “LSEA: Link Stability and Energy Aware for Efficient Routing in Mobile Ad Hoc Network”, Wireless Personal Multimedia Communications (WPMC), 14th International Symposium on 2011, pp. 1-5, Oct. 2011.
 
[11]  Björn Skubic, Alexander Lindström, Einar In de Betou, and Ioanna Pappa” Energy saving potential of cyclic sleep in optical access systems”2011 IEEE online conference on Green communication, pp. 124-127, March 30, 2011.
 
[12]  Dr. K. Kathiravan , V. Divya , Dr. S. Thamarai Selvi ,“ Energy Efficient Integrated Routing Protocol for MANETs”, Fifth International Conference on Mobile Ad-hoc and Sensor Networks, pp.340-346, 2009.
 
[13]  Dr Chandra Shekar Reddy Putta , Dr K.Bhanu Prasad , Dilli Ravilla, Murali Nath R.S, M.L.Ravi Chandra “ Performance of Ad hoc Network Routing Protocols in IEEE 802.11”ICCCT, pp. 371-376, Sep. 2010.
 
Show Less References

Article

Fleet & Convoy Management Using VANET


Journal of Computer Networks. 2013, 1(1), 1-9
DOI: 10.12691/jcn-1-1-1
Copyright © 2013 Science and Education Publishing

Cite this paper:
Asim Rasheed, Haleemah Zia, Farhan Hashmi, Umair Hadi, Warda Naim, Sana Ajmal. Fleet & Convoy Management Using VANET. Journal of Computer Networks. 2013; 1(1):1-9. doi: 10.12691/jcn-1-1-1.

Correspondence to: Asim Rasheed, . Email:

Abstract

In this paper, a Fleet/Convoy Management System, based on the GeoNet architecture for Vehicular Ad-hoc Network (VANET) is discussed and implemented. Fleet or convoy management is a special case of VANET, where nodes require communication to same type of other nodes as well as to backend server. Critical applications have been identified which are required for improving the load management and overall efficiency of such networks. The design is based on four major applications of location update, enabling vehicles to chat with each other using text and voice and providing emergency alarms through broadcast. The geographical locations of the nodes are continuously updated and displayed graphically on local dynamic maps. A test bed for the model has been developed, discussed and used for performance analysis.

Keywords

References

[[[[[[[[[[[[[[[[[[[[[
[[1]  Moez Jerbi, Sidi Mohammed Senouci, Mohammed Cherif, Yacine Ghamri “Vehicular Communications Networks: Current Trends and Challenges” Book Chapter in “Next Generation Mobile Networks and Ubiquitous Computing” IGI Global, 2010.
 
[[2]  Jeffrey Miller “Vehicle to Vehicle to Infrastructure (V2V2I) Intelligent Transportation System Architecture” IEEE Intelligent Vehicles Symposium, 2008.
 
[[3]  Jose´ Santa, Antonio Moragon´ and Antonio F. Gomez-Skarmet “Experimental Evaluation of a Novel Vehicular Communication Paradigm Based on Cellular Networks” 2008 IEEE Intelligent Vehicles Symposium Eindhoven University of Technology Eindhoven, The Netherlands, June 4-6, 2008
 
[[4]  Tamer Nadeem, Pravin Shankar, Liviu Iftode, “A comparative study of data dissemination models for VANETs”, in: Third Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, San Jose, 2006.
 
[[5]  Böhm and M. Jonsson, “Handover in IEEE 802.11p-based Delay-Sensitive Vehicle-to-Infrastructure Communication”, Research Report IDE - 0924, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad University, Sweden, 2009.
 
Show More References
[6]  GeoNet. “Final GeoNet Specification”. GeoNet Deliverable D2.2, January 2010.
 
[7]  J. Choi, Y. Khaled, M. Tsukada, and T. Ernst. “IPv6 support for VANET with geographical routing“. In Proc. of the ITST, Pukhet, Thailand, 2008
 
[8]  V. Gonzalez, A. L. Santos, C. Pinart, and F. Milagro, “Experimental demonstration of the viability of IEEE 802.11b based inter-vehicle communications,” in TridentCom 2008, March 2008.
 
[9]  Chien-Ming Chou, Chen-Yuan Li, Wei-Min Chien, and Kun-Chan Lan “A Feasibility Study on Vehicle-to-Infrastructure Communication: Wi-Fi vs. WiMAX”. Mobile Data Management 2009: 397-398
 
[10]  Toshiya Okabe, Takayuki Shizuno, Tsutomu Kitamura, Wireless LAN access network system for moving vehicles, in: 10th IEEE Symposium on Computers and Communications (ISCC05), La Manga del Mar Menor, 2005.
 
[11]  DSRC “The DSRC Project,”
 
[12]  http://www.leearmstrong.com/DSRC/DSRCHomeset.
 
[13]  Hannes Hartenstein and Kenneth P Laberteaux, Ed “VANET: Vehicular Applications and Inter-Networking Technologies” John Wiley & Sons, Ltd 2010.
 
[14]  Task Group p, IEEE P802.11p: Wireless Access in Vehicular Environments (WAVE), draft standard ed., IEEE Computer Society, 2006.
 
[15]  Committee SCC32, IEEE P1609.4 Standard for Wireless Access in Vehicular Environments (WAVE) - Multi-Channel Operation, draft standard ed., IEEE ITS Council, 2006.
 
[16]  Sajjad Akbar Mohammad, Asim Rasheed and Amir Qayyum, “VANET Architectures and Protocol Stacks: A Survey” Communication Technologies For Vehicles, Lecture Notes in Computer Science, 2011, Volume 6596/2011, 95-105
 
[17]  C2C “Car2Car Communication Consortium,”
 
[18]  http://www.car-to-car.org/
 
[19]  ETSI. “Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking and Data Transport; Part 6: Transmission of IPv6 Packets over Geo-Networking Protocols”. ETSI, December 2009.
 
[20]  TC204 WG16. “Intelligent Transport Systems – Communication for Land Mobiles (CALM) – Architecture”. ISO FDIS specification 21217, ISO, October 2009. (www.calm.hu).
 
[21]  CO-OPerative SystEms for Intelligent Road Safety, 2006 (http://www.coopers-ip.eu).
 
[22]  SAFESPOT Integrated Project, 2006 (http://www.safespot-eu.org)
 
[23]  CVIS Project for Intelligent Co-operative System, 2006 (http://www.cvisproject.org).
 
[24]  European ITS Communication Architecture - Overall Framework - Proof of Concept Implementation. Draft Version 2.0, COMeSafety Specific Support Action, 2008.
 
[25]  SE-cure VE-hicle COM-munication, SEVECOM, 2006 (http://www.sevecom.org).
 
[26]  Imran Khan and Amir Qayyum, “Performance evaluation of AODV and OLSR in highly fading vehicular ad hoc network environments” 13th IEEE International Multi-topic Conference (2009).
 
Show Less References