Pub Date : 2022-08-31DOI: 10.17762/ijcnis.v14i2.5462
Dr. Arun Kumar Marandi, G. Jethava, A. Rajesh, Sachin Gupta, Shrddha Sagar, Sonia Sharma
A multiple slot fractal antenna design has been determined communication efficiency and its multi-function activities. High-speed small communication devices have been required for future smart chip applications, so that researchers have been employed new and creative antenna design. Antennas are key part in communication systems, those are used to improve communication parameters like gain, efficiency, and bandwidth. Consistently, modern antennas design with high bandwidth and gain balancing is very difficult, therefore an adaptive antenna array chip design is required. In this research work a coaxial fed antenna with fractal geometry design has been implemented for Wi-Fi and Radio altimeter application. The fractal geometry has been taken with multiple numbers of slots in the radiating structure for uncertain applications. The coaxial feeding location has been selected based on the good impedance matching condition (50 Ohms). The overall dimension mentioned for antenna are approximately 50X50X1.6 mm on FR4 substrate and performance characteristic analysis is performed with change in substrate material presented in this work. Dual-band resonant frequency is being emitted by the antenna with resonance at 3.1 and 4.3 GHz for FR4 substrate material and change in the resonant bands is obtained with change in substrate. The proposed Antenna is prototyped on Anritsu VNA tool and presented the comparative analysis like VSWR 12%, reflection coefficient 9.4%,3D-Gain 6.2% and surface current 9.3% had been improved.
{"title":"Cognitive Computing for Multimodal Sentiment Sensing and Emotion Recognition Fusion Based on Machine Learning Techniques Implemented by Computer Interface System","authors":"Dr. Arun Kumar Marandi, G. Jethava, A. Rajesh, Sachin Gupta, Shrddha Sagar, Sonia Sharma","doi":"10.17762/ijcnis.v14i2.5462","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5462","url":null,"abstract":"A multiple slot fractal antenna design has been determined communication efficiency and its multi-function activities. High-speed small communication devices have been required for future smart chip applications, so that researchers have been employed new and creative antenna design. Antennas are key part in communication systems, those are used to improve communication parameters like gain, efficiency, and bandwidth. Consistently, modern antennas design with high bandwidth and gain balancing is very difficult, therefore an adaptive antenna array chip design is required. In this research work a coaxial fed antenna with fractal geometry design has been implemented for Wi-Fi and Radio altimeter application. The fractal geometry has been taken with multiple numbers of slots in the radiating structure for uncertain applications. The coaxial feeding location has been selected based on the good impedance matching condition (50 Ohms). The overall dimension mentioned for antenna are approximately 50X50X1.6 mm on FR4 substrate and performance characteristic analysis is performed with change in substrate material presented in this work. Dual-band resonant frequency is being emitted by the antenna with resonance at 3.1 and 4.3 GHz for FR4 substrate material and change in the resonant bands is obtained with change in substrate. The proposed Antenna is prototyped on Anritsu VNA tool and presented the comparative analysis like VSWR 12%, reflection coefficient 9.4%,3D-Gain 6.2% and surface current 9.3% had been improved.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115789065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-31DOI: 10.17762/ijcnis.v14i2.5463
Daxa Vekariya, M. Kannan, Sachin Gupta, P. Muthusamy, Rohini Mahajan, Arvind Kumar Pandey
A fundamental component of cloud computers from a business perspective is that users are allowed to use any desire and pay with a product that desire. Its cloud services were accessible anytime and anywhere consumers needed them. As a result, consumers are free to purchase whatever IT services they want, and they don't have to worry about how easy things can be managed. The remote server is used in a new information storage computing architecture that is considered an Internet generation. Ensuring security, material at resource providers' sites is a challenge that must be addressed in cloud technology. Thus, rather than reliance on a single provider for knowledge storing, this research implies developing construction for protection of knowledge stockpiling with a variation of operations, in which knowledge is scrambled and divided into numerous cipher frames and distributed across a large number of provider places. This support was applied to provide greater security, scalability, or reliability that was suggested according to the new structure. This paper, presented an encoded model for the cloud environment to improve security. The proposed model comprises the parity metadata for the database management provision to the provider. In the developed encoder chunks parity is not stored within the single resources with the provision of the available information chunks. The constructed security architecture in the RAID layer increases the dependability of the data with the deployment of the RAID 10 deployment. The developed RAID-based encoder chunks exhibit improved efficiency for the higher uptime at a minimal cost.
{"title":"Analysis of Computer Network Security Storage System Based on Cloud Computing Environment","authors":"Daxa Vekariya, M. Kannan, Sachin Gupta, P. Muthusamy, Rohini Mahajan, Arvind Kumar Pandey","doi":"10.17762/ijcnis.v14i2.5463","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5463","url":null,"abstract":"A fundamental component of cloud computers from a business perspective is that users are allowed to use any desire and pay with a product that desire. Its cloud services were accessible anytime and anywhere consumers needed them. As a result, consumers are free to purchase whatever IT services they want, and they don't have to worry about how easy things can be managed. The remote server is used in a new information storage computing architecture that is considered an Internet generation. Ensuring security, material at resource providers' sites is a challenge that must be addressed in cloud technology. Thus, rather than reliance on a single provider for knowledge storing, this research implies developing construction for protection of knowledge stockpiling with a variation of operations, in which knowledge is scrambled and divided into numerous cipher frames and distributed across a large number of provider places. This support was applied to provide greater security, scalability, or reliability that was suggested according to the new structure. This paper, presented an encoded model for the cloud environment to improve security. The proposed model comprises the parity metadata for the database management provision to the provider. In the developed encoder chunks parity is not stored within the single resources with the provision of the available information chunks. The constructed security architecture in the RAID layer increases the dependability of the data with the deployment of the RAID 10 deployment. The developed RAID-based encoder chunks exhibit improved efficiency for the higher uptime at a minimal cost.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132750775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-31DOI: 10.17762/ijcnis.v14i2.5483
M. Al-Shabi
The so-called Black Hole Attack is among the most perilous and widespread security attacks in MANET nets, researchers have been tasked with developing strategies to detect it. Two of these methods are the Intrusion Detection System AODV (IDSAODV) as well as the Extended AODV. The present paper attempts to investigate the impact of a Black Hole Attack on the functionality of the network in the existence of single or more attackers. It also evaluates the Extended AODV and IDSAODV in a net in order to see how effectively they could detect and mitigate the attack. For the aim of evaluating its performance, the researchers utilized Throughput, Normalized Routing Load (NRL), and Packet Delivery Ratio (PDR). The comprehensive simulation results show that the IDSAODV application decreased the effect of the attacks. However, it raised the rate of packet delivery to sixty eight percent at the identical time. Reverse AODV, on the other hand, provided superior outcomes, with a PDR of 100%, but also resulted in an exceedingly higher NRL than the IDSAODV. Likewise, the simulation findings demonstrated that the attacking node's position tormented the IDSAODV's functionality.
{"title":"Performance Ameliorations of AODV by Black Hole Attack Detection Utilizing IDSAODV as Well as Reverse AODV","authors":"M. Al-Shabi","doi":"10.17762/ijcnis.v14i2.5483","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5483","url":null,"abstract":"The so-called Black Hole Attack is among the most perilous and widespread security attacks in MANET nets, researchers have been tasked with developing strategies to detect it. Two of these methods are the Intrusion Detection System AODV (IDSAODV) as well as the Extended AODV. The present paper attempts to investigate the impact of a Black Hole Attack on the functionality of the network in the existence of single or more attackers. It also evaluates the Extended AODV and IDSAODV in a net in order to see how effectively they could detect and mitigate the attack. For the aim of evaluating its performance, the researchers utilized Throughput, Normalized Routing Load (NRL), and Packet Delivery Ratio (PDR). The comprehensive simulation results show that the IDSAODV application decreased the effect of the attacks. However, it raised the rate of packet delivery to sixty eight percent at the identical time. Reverse AODV, on the other hand, provided superior outcomes, with a PDR of 100%, but also resulted in an exceedingly higher NRL than the IDSAODV. Likewise, the simulation findings demonstrated that the attacking node's position tormented the IDSAODV's functionality.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128438472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-31DOI: 10.17762/ijcnis.v14i2.5484
Sneha R. Deshmukh, V. Raisinghani
The Internet of things (IoT) comprises things interconnected through the internet with unique identities. Congestion management is one of the most challenging tasks in networks. The Constrained Application Protocol (CoAP) is a low-footprint protocol designed for IoT networks and has been defined by IETF. In IoT networks, CoAP nodes have limited network and battery resources. The CoAP standard has an exponential backoff congestion control mechanism. This backoff mechanism may not be adequate for all IoT applications. The characteristics of each IoT application would be different. Further, the events such as unnecessary retransmissions and packet collision caused due to links with high losses and packet transmission errors may lead to network congestion. Various congestion handling algorithms for CoAP have been defined to enrich the performance of IoT applications. Our paper presents a comprehensive survey on the evolution of the congestion control mechanism used in IoT networks. We have classified the protocols into RTO-based, queue-monitoring, and rate-based. We review congestion avoidance protocols for CoAP networks and discuss directions for future work.
{"title":"A Survey on Congestion Control Protocols for CoAP","authors":"Sneha R. Deshmukh, V. Raisinghani","doi":"10.17762/ijcnis.v14i2.5484","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5484","url":null,"abstract":"The Internet of things (IoT) comprises things interconnected through the internet with unique identities. Congestion management is one of the most challenging tasks in networks. The Constrained Application Protocol (CoAP) is a low-footprint protocol designed for IoT networks and has been defined by IETF. In IoT networks, CoAP nodes have limited network and battery resources. The CoAP standard has an exponential backoff congestion control mechanism. This backoff mechanism may not be adequate for all IoT applications. The characteristics of each IoT application would be different. Further, the events such as unnecessary retransmissions and packet collision caused due to links with high losses and packet transmission errors may lead to network congestion. Various congestion handling algorithms for CoAP have been defined to enrich the performance of IoT applications. Our paper presents a comprehensive survey on the evolution of the congestion control mechanism used in IoT networks. We have classified the protocols into RTO-based, queue-monitoring, and rate-based. We review congestion avoidance protocols for CoAP networks and discuss directions for future work.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114473802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-16DOI: 10.17762/ijcnis.v13i1.4923
K. Alissa, Bashar A. Aldeeb, H. A. Alshehri, S. A. Dahdouh, B. M. Alsubaie, Afnan M. Alghamdi, M. Alsmadi
Institutions struggle to protect themselves from threats and cybercrime. Therefore, they devote much attention to improving information security infrastructures. Users’ behaviors were explored via a traditional questionnaire research instrument in a data collocate process. The questionnaire explores users’ behaviors theoretically, so the respondents’ answers to the questionnaire are insufficiently reliable, and the responses might not reflect actual behavior based on the human bias when facing theoretical problems. This study aims to solve unreliable responses to the questionnaire by developing a simulated intelligent instrument to measure users’ behaviors toward cybersecurity policies in an experimental study using gamification.
{"title":"Developing a simulated intelligent instrument to measure user behavior toward cybersecurity policies","authors":"K. Alissa, Bashar A. Aldeeb, H. A. Alshehri, S. A. Dahdouh, B. M. Alsubaie, Afnan M. Alghamdi, M. Alsmadi","doi":"10.17762/ijcnis.v13i1.4923","DOIUrl":"https://doi.org/10.17762/ijcnis.v13i1.4923","url":null,"abstract":"Institutions struggle to protect themselves from threats and cybercrime. Therefore, they devote much attention to improving information security infrastructures. Users’ behaviors were explored via a traditional questionnaire research instrument in a data collocate process. The questionnaire explores users’ behaviors theoretically, so the respondents’ answers to the questionnaire are insufficiently reliable, and the responses might not reflect actual behavior based on the human bias when facing theoretical problems. This study aims to solve unreliable responses to the questionnaire by developing a simulated intelligent instrument to measure users’ behaviors toward cybersecurity policies in an experimental study using gamification.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128907606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-15DOI: 10.17762/ijcnis.v14i1.5216
Q. Hamarsheh, O. Daoud, M. Al-Akaidi, A. Damati, Mohammed J. Baniyounis
Vehicle-to-Vehicle communication is one of the more emerging technologies in the 21st century from either the comfortable transportation or safer transportation point of view. Vehicle-to-Vehicle communication has one crucial factor, which is the huge information to be shared among vehicles, such as the position, the road data. In such situation, the accurate information sharing process is the most important factor in order to make the vehicles operating in the most feasible way. This work proposes a more robust vehicle communication system to make the existing vehicle transportation system more efficient. In this paper, we propose a fast frequency hopping orthogonal frequency division multiplexing to mitigate the Doppler spread effect on our previously published clustering benchmark. This benchmark contains both of a clustering weighting factor based stage and a multiparallel processing stage. This is in addition to modify the PHY layer of the existing IEEE 802.11p standard in order to impose Multiple Input Multiple Output for higher throughput purposes.The results show a noticeable stability compared to our previously published work. Furthermore, the results are almost exceeds the achieved results from the Lower-ID Distributed Clustering Algorithm (DCA) from both of the speed and communication range.
{"title":"Robust Vehicular Communications Using the Fast-Frequency-Hopping-OFDM Technology and the MIMO Spatial Multiplexing","authors":"Q. Hamarsheh, O. Daoud, M. Al-Akaidi, A. Damati, Mohammed J. Baniyounis","doi":"10.17762/ijcnis.v14i1.5216","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5216","url":null,"abstract":"Vehicle-to-Vehicle communication is one of the more emerging technologies in the 21st century from either the comfortable transportation or safer transportation point of view. Vehicle-to-Vehicle communication has one crucial factor, which is the huge information to be shared among vehicles, such as the position, the road data. In such situation, the accurate information sharing process is the most important factor in order to make the vehicles operating in the most feasible way. This work proposes a more robust vehicle communication system to make the existing vehicle transportation system more efficient. In this paper, we propose a fast frequency hopping orthogonal frequency division multiplexing to mitigate the Doppler spread effect on our previously published clustering benchmark. This benchmark contains both of a clustering weighting factor based stage and a multiparallel processing stage. This is in addition to modify the PHY layer of the existing IEEE 802.11p standard in order to impose Multiple Input Multiple Output for higher throughput purposes.The results show a noticeable stability compared to our previously published work. Furthermore, the results are almost exceeds the achieved results from the Lower-ID Distributed Clustering Algorithm (DCA) from both of the speed and communication range.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126930941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-15DOI: 10.17762/ijcnis.v14i1.5221
Inad A. Aljarrah, Eman M. Alshare
Recent single image super resolution (SISR) studies were conducted extensively on small upscaling factors such as x2 and x4 on remote sensing images, while less work was conducted on large factors such as the factor x8 and x16. Owing to the high performance of the generative adversarial networks (GANs), in this paper, two GAN’s frameworks are implemented to study the SISR on the residual remote sensing image with large magnification under x8 scale factor, which is still lacking acceptable results. This work proposes a modified version of the residual dense network (RDN) and then it been implemented within GAN framework which named RDGAN. The second GAN framework has been built based on the densely sampled super resolution network (DSSR) and we named DSGAN. The used loss function for the training employs the adversarial, mean squared error (MSE) and the perceptual loss derived from the VGG19 model. We optimize the training by using Adam for number of epochs then switching to the SGD optimizer. We validate the frameworks on the proposed dataset of this work and other three remote sensing datasets: the UC Merced, WHU-RS19 and RSSCN7. To validate the frameworks, we use the following image quality assessment metrics: the PSNR and the SSIM on the RGB and the Y channel and the MSE. The RDGAN evaluation values on the proposed dataset were 26.02, 0.704, and 257.70 for PSNR, SSIM and the MSE, respectively, and the DSGAN evaluation on the same dataset yielded 26.13, 0.708 and 251.89 for the PSNR, the SSIM, and the MSE.
{"title":"Improved Residual Dense Network for Large Scale Super-Resolution via Generative Adversarial Network","authors":"Inad A. Aljarrah, Eman M. Alshare","doi":"10.17762/ijcnis.v14i1.5221","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5221","url":null,"abstract":"Recent single image super resolution (SISR) studies were conducted extensively on small upscaling factors such as x2 and x4 on remote sensing images, while less work was conducted on large factors such as the factor x8 and x16. Owing to the high performance of the generative adversarial networks (GANs), in this paper, two GAN’s frameworks are implemented to study the SISR on the residual remote sensing image with large magnification under x8 scale factor, which is still lacking acceptable results. This work proposes a modified version of the residual dense network (RDN) and then it been implemented within GAN framework which named RDGAN. The second GAN framework has been built based on the densely sampled super resolution network (DSSR) and we named DSGAN. The used loss function for the training employs the adversarial, mean squared error (MSE) and the perceptual loss derived from the VGG19 model. We optimize the training by using Adam for number of epochs then switching to the SGD optimizer. We validate the frameworks on the proposed dataset of this work and other three remote sensing datasets: the UC Merced, WHU-RS19 and RSSCN7. To validate the frameworks, we use the following image quality assessment metrics: the PSNR and the SSIM on the RGB and the Y channel and the MSE. The RDGAN evaluation values on the proposed dataset were 26.02, 0.704, and 257.70 for PSNR, SSIM and the MSE, respectively, and the DSGAN evaluation on the same dataset yielded 26.13, 0.708 and 251.89 for the PSNR, the SSIM, and the MSE.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122106749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-15DOI: 10.54039/ijcnis.v14i1.5161
Sani Makusidi Suleiman, D. S. Shuaibu, S. A. Babale
Wireless communication technologies are rapidly being adopted and developed by countries all over the world as a strategy for sustaining a digital economy. This has proven very useful for economic recovery from the crises brought about by the COVID-19 pandemic of the year 2020. The latency and coverage area of a wireless network are two major areas that are always seeking improvement. The High Altitude Platform communication technology can provide improvement in speed and coverage area for 4G cellular systems. This work investigated the effect of positioning High Altitude Platforms on the latency and coverage of 4G cellular Systems. A quantitative approach was used in the methodology of this paper. A HAP model showing a single platform flying in a circular trajectory over Base Transceiver Stations BTSs and serving as a relay mobile station was presented. A detailed simulation algorithm for the HAP and results for the simulation were given. Results showed that using the HAP as a relay mobile station in a network can give a latency reduction of up to 58.9%. Also, the altitude of the HAP directly affects the angle of reception which was found to improve the coverage.
{"title":"Investigating the effect of High Altitude Platform Positioning on Latency and Coverage of 4G Cellular Systems","authors":"Sani Makusidi Suleiman, D. S. Shuaibu, S. A. Babale","doi":"10.54039/ijcnis.v14i1.5161","DOIUrl":"https://doi.org/10.54039/ijcnis.v14i1.5161","url":null,"abstract":"Wireless communication technologies are rapidly being adopted and developed by countries all over the world as a strategy for sustaining a digital economy. This has proven very useful for economic recovery from the crises brought about by the COVID-19 pandemic of the year 2020. The latency and coverage area of a wireless network are two major areas that are always seeking improvement. The High Altitude Platform communication technology can provide improvement in speed and coverage area for 4G cellular systems. This work investigated the effect of positioning High Altitude Platforms on the latency and coverage of 4G cellular Systems. A quantitative approach was used in the methodology of this paper. A HAP model showing a single platform flying in a circular trajectory over Base Transceiver Stations BTSs and serving as a relay mobile station was presented. A detailed simulation algorithm for the HAP and results for the simulation were given. Results showed that using the HAP as a relay mobile station in a network can give a latency reduction of up to 58.9%. Also, the altitude of the HAP directly affects the angle of reception which was found to improve the coverage.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-15DOI: 10.17762/ijcnis.v14i1.5266
M. Shatnawi, Batool Alazzam
The reliability and quality of software programs remains to be an important and challenging aspect of software design. Software developers and system operators spend huge time on assessing and overcoming expected and unexpected errors that might affect the users’ experience negatively. One of the major concerns in developing software problems is the bug reports, which contains the severity and priority of these defects. For a long time, this task was performed manually with huge effort and time consumptions by system operators. Therefore, in this paper, we present a novel automatic assessment tool using Machine Learning algorithms, for assessing bugs’ reports based on several features such as hardware, product, assignee, OS, component, target milestone, votes, and versions. The aim is to build a tool that automatically classifies software bugs according to the severity and priority of the bugs and makes predictions based on the most representative features and bug report text. To perform this task, we used the Multi-Nominal Naive Bayes, Random Forests Classifier, Bagging, Ada Boosting, SVC, KNN, and Linear SVM Classifiers and Natural Language Processing techniques to analyze the Eclipse dataset. The approach shows promising results for software bugs’ detection and prediction.
{"title":"An Assessment of Eclipse Bugs' Priority and Severity Prediction Using Machine Learning","authors":"M. Shatnawi, Batool Alazzam","doi":"10.17762/ijcnis.v14i1.5266","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5266","url":null,"abstract":"The reliability and quality of software programs remains to be an important and challenging aspect of software design. Software developers and system operators spend huge time on assessing and overcoming expected and unexpected errors that might affect the users’ experience negatively. One of the major concerns in developing software problems is the bug reports, which contains the severity and priority of these defects. For a long time, this task was performed manually with huge effort and time consumptions by system operators. Therefore, in this paper, we present a novel automatic assessment tool using Machine Learning algorithms, for assessing bugs’ reports based on several features such as hardware, product, assignee, OS, component, target milestone, votes, and versions. The aim is to build a tool that automatically classifies software bugs according to the severity and priority of the bugs and makes predictions based on the most representative features and bug report text. To perform this task, we used the Multi-Nominal Naive Bayes, Random Forests Classifier, Bagging, Ada Boosting, SVC, KNN, and Linear SVM Classifiers and Natural Language Processing techniques to analyze the Eclipse dataset. The approach shows promising results for software bugs’ detection and prediction.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128422679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-15DOI: 10.17762/ijcnis.v14i1.5262
H. Alabdulrazzaq, M. Alenezi
With the advancement of the Internet, many individuals and organizations have started to use it to store and send personal or business information. Some of this information is highly confidential and that, in turn, raises an issue of data privacy and confidentiality. Major advances in the Internet have also aided intruders in getting unauthorized access to confidential information. Information Security is the art of securing data from illegitimate access while ensuring integrity, availability, and confidentiality of data. Information Security is achieved through cryptographic encryption and decryption algorithms. Encryption hides confidential information by converting it to an unreadable form while the reverse process of retrieving data from the unreadable or encrypted form is known as decryption. Many cryptographic algorithms exist today and selecting which one to use depends on several factors and measures. This paper conducts a comparison of the encryption speed for five different cryptographic symmetric block-cipher algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. The simulation is done using Python with various text file sizes. The results show that Blowfish outperforms the rest of the algorithms that were tested.
{"title":"Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish","authors":"H. Alabdulrazzaq, M. Alenezi","doi":"10.17762/ijcnis.v14i1.5262","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5262","url":null,"abstract":"With the advancement of the Internet, many individuals and organizations have started to use it to store and send personal or business information. Some of this information is highly confidential and that, in turn, raises an issue of data privacy and confidentiality. Major advances in the Internet have also aided intruders in getting unauthorized access to confidential information. Information Security is the art of securing data from illegitimate access while ensuring integrity, availability, and confidentiality of data. Information Security is achieved through cryptographic encryption and decryption algorithms. Encryption hides confidential information by converting it to an unreadable form while the reverse process of retrieving data from the unreadable or encrypted form is known as decryption. Many cryptographic algorithms exist today and selecting which one to use depends on several factors and measures. This paper conducts a comparison of the encryption speed for five different cryptographic symmetric block-cipher algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. The simulation is done using Python with various text file sizes. The results show that Blowfish outperforms the rest of the algorithms that were tested.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115242751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}