Pub Date : 2020-09-02DOI: 10.30534/ijccn/2020/05922019
Reo J Mathew
This paper portrays a novel idea for aiding the visually impaired individuals to navigate indoors freely without depending on anyone but only by using a Smartphone. The system has been developed in such a way that it is feasible on any android device, having a depth sensing image sensor. The application makes use of an Indoor Positioning System (IPS), that can use different types of sensory information to locate objects or people inside a large complex. Navigating indoors is the most challenging. It is purely an application for the android Smartphone which uses Augmented reality (AR) and the visually impaired obtains navigation instructions in the form of audio. This can help provide step by step walking independently.The proposed system works with AR Core by Google, with the help of unity engine to process the images in augmented reality to detect the obstacles while navigating indoor and sends an audio message to the user to help him/her to navigate.
{"title":"Indoor Navigation System for Visually Impaired using Real Time 3D Depth Sensing Sensor","authors":"Reo J Mathew","doi":"10.30534/ijccn/2020/05922019","DOIUrl":"https://doi.org/10.30534/ijccn/2020/05922019","url":null,"abstract":"This paper portrays a novel idea for aiding the visually impaired individuals to navigate indoors freely without depending on anyone but only by using a Smartphone. The system has been developed in such a way that it is feasible on any android device, having a depth sensing image sensor. The application makes use of an Indoor Positioning System (IPS), that can use different types of sensory information to locate objects or people inside a large complex. Navigating indoors is the most challenging. It is purely an application for the android Smartphone which uses Augmented reality (AR) and the visually impaired obtains navigation instructions in the form of audio. This can help provide step by step walking independently.The proposed system works with AR Core by Google, with the help of unity engine to process the images in augmented reality to detect the obstacles while navigating indoor and sends an audio message to the user to help him/her to navigate.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126156176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-02DOI: 10.30534/ijccn/2020/06922019
S. Suresh
Floods are one of the most common natural disasters that affects humanity. Unless we take the proper precautions, it will endanger human life itself. Flood prediction using IoT enabled sensor network and machine learning outlines a very efficient way to properly understand and manage floods. This technology can be used to evaluate the risk of flooding, there by speeding up precautionary measures. IoT is a network of computing devices with unique identifiers which helps transferring data across the devices without interaction between human and computers. By using different sensors, information about various environmental conditions were collected and transfer it to google sheet with the help of IoT technology. The client can analyse the data in the form of dataset from a remote device and predict the risk of flood.
{"title":"Flood Prediction Using IoT Enabled Sensor Network and Machine Learning","authors":"S. Suresh","doi":"10.30534/ijccn/2020/06922019","DOIUrl":"https://doi.org/10.30534/ijccn/2020/06922019","url":null,"abstract":"Floods are one of the most common natural disasters that affects humanity. Unless we take the proper precautions, it will endanger human life itself. Flood prediction using IoT enabled sensor network and machine learning outlines a very efficient way to properly understand and manage floods. This technology can be used to evaluate the risk of flooding, there by speeding up precautionary measures. IoT is a network of computing devices with unique identifiers which helps transferring data across the devices without interaction between human and computers. By using different sensors, information about various environmental conditions were collected and transfer it to google sheet with the help of IoT technology. The client can analyse the data in the form of dataset from a remote device and predict the risk of flood.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133715739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-02DOI: 10.30534/ijccn/2020/02922019
A. Mathew
Students are being evaluated based on the examinations conducted by various institutions or organizations, which test the knowledge of that person. Exams like Computerized Adaptive Testing (CAT), offers a computer based test that adapts the examinee's ability level. Some of the CAT exams include tags which help students to understand the questions. Tags are metadata used to identify or describe an item. There are three types of tags: Manual Tagging, Semi-Automatic tagging and Fully Automatic tagging. Earlier manual tagging was used to construct question banks. However it is time consuming and leads to many other consistency issues. A Semi-Automatic tagging facilitates human intervention to increase the accuracy of tagging. Fully automatic tagging gives a more promising result as compared with manual and semi-automatic tagging. This paper proposes a fully automated tagging system which uses Deep Neural Network and Natural Language Processing to generate tags from the derived knowledge unit. This paper also discusses LDA (Latent Dirichlet Allocation) which gives the relevance of each tag.
{"title":"Prediction of Question Tags Based on LDA and Deep Neural Network","authors":"A. Mathew","doi":"10.30534/ijccn/2020/02922019","DOIUrl":"https://doi.org/10.30534/ijccn/2020/02922019","url":null,"abstract":"Students are being evaluated based on the examinations conducted by various institutions or organizations, which test the knowledge of that person. Exams like Computerized Adaptive Testing (CAT), offers a computer based test that adapts the examinee's ability level. Some of the CAT exams include tags which help students to understand the questions. Tags are metadata used to identify or describe an item. There are three types of tags: Manual Tagging, Semi-Automatic tagging and Fully Automatic tagging. Earlier manual tagging was used to construct question banks. However it is time consuming and leads to many other consistency issues. A Semi-Automatic tagging facilitates human intervention to increase the accuracy of tagging. Fully automatic tagging gives a more promising result as compared with manual and semi-automatic tagging. This paper proposes a fully automated tagging system which uses Deep Neural Network and Natural Language Processing to generate tags from the derived knowledge unit. This paper also discusses LDA (Latent Dirichlet Allocation) which gives the relevance of each tag.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122998181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-02DOI: 10.30534/ijccn/2020/04922019
Anandu N Anandu Shimon
A Resume is an inevitable thing for a jobseeker, It helps an employer to validate the aspirant without looking at his face. So it is very important to create it very neatly by including all your details. Consequently, it needs to be updated with all your skills and experiences and these are also variable factors, therefore you have to change it frequently to keep it updated. It also needs to keep safe and remember to take it for all the interviews you are going to attend. of digital now everything getting into its digital format then why not your resumes. It's time to forget about old paper resumes/CVs and it helps to
{"title":"Digital Resume - Personal Website Builder","authors":"Anandu N Anandu Shimon","doi":"10.30534/ijccn/2020/04922019","DOIUrl":"https://doi.org/10.30534/ijccn/2020/04922019","url":null,"abstract":"A Resume is an inevitable thing for a jobseeker, It helps an employer to validate the aspirant without looking at his face. So it is very important to create it very neatly by including all your details. Consequently, it needs to be updated with all your skills and experiences and these are also variable factors, therefore you have to change it frequently to keep it updated. It also needs to keep safe and remember to take it for all the interviews you are going to attend. of digital now everything getting into its digital format then why not your resumes. It's time to forget about old paper resumes/CVs and it helps to","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134553854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-02DOI: 10.30534/ijccn/2020/01922019
Magdi Mohammed Mohammed Ahmed Hamoda
ABSTRACT Data security and computer hardware is a type of technology known as information security, which is applied to computers and networks. The goal of computer security includes protecting information, data, and the characteristics of scientific knowledge from theft, change, or natural disasters, while information and data can remain productive and available to targeted users. Computer system security terms mean the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering, or collapsing as a result of unauthorized or unreliable activities, and unplanned events, respectively, to solve information security problems on networks. Via the website. We must get to know what is related to the concept, and that information, data and device security is a type of technology known as information security, which is applied to computers and networks. The goal of computer security includes protecting scientific information, data, and scientific knowledge from theft, modification, or natural disasters, while information and data can remain productive and available to targeted users. Computer system security terms mean the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering, or collapsing as a result of unauthorized or unreliable activities, and unplanned events, respectively, to solve information security problems on networks. Via the website. We must get to know what is related to the concept and the basic structure of the social network site and other related social networks. Usually the social services network in the internet area indicates: the network address, the social network service and software, and the social network site. These three things are clearly interconnected and indispensable. It is combined to create a platform for users to communicate information.[1] .
{"title":"Problems in Information Security in Network Sites and Solutions","authors":"Magdi Mohammed Mohammed Ahmed Hamoda","doi":"10.30534/ijccn/2020/01922019","DOIUrl":"https://doi.org/10.30534/ijccn/2020/01922019","url":null,"abstract":" ABSTRACT Data security and computer hardware is a type of technology known as information security, which is applied to computers and networks. The goal of computer security includes protecting information, data, and the characteristics of scientific knowledge from theft, change, or natural disasters, while information and data can remain productive and available to targeted users. Computer system security terms mean the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering, or collapsing as a result of unauthorized or unreliable activities, and unplanned events, respectively, to solve information security problems on networks. Via the website. We must get to know what is related to the concept, and that information, data and device security is a type of technology known as information security, which is applied to computers and networks. The goal of computer security includes protecting scientific information, data, and scientific knowledge from theft, modification, or natural disasters, while information and data can remain productive and available to targeted users. Computer system security terms mean the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering, or collapsing as a result of unauthorized or unreliable activities, and unplanned events, respectively, to solve information security problems on networks. Via the website. We must get to know what is related to the concept and the basic structure of the social network site and other related social networks. Usually the social services network in the internet area indicates: the network address, the social network service and software, and the social network site. These three things are clearly interconnected and indispensable. It is combined to create a platform for users to communicate information.[1] .","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130736797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-02DOI: 10.30534/ijccn/2020/03922019
Gargy Ponnachan
A well monitored sustainable city enhances the lifestyle of the citizens by meeting their own needs with minimal natural resource consumption. The wireless sensor network plays an important role in collecting, processing and analyzing the corresponding information. We propose a system to monitor a city using various IoT enabled wireless sensor networks. With the help of IoT, smart city monitoring can be made possible through real-time monitoring, ubiquitous sensing and intelligent information processing. For best services, to exchange and communicate information IoT embedded systems can be used. It defines a customized design of IoT based monitoring devices. The sensors we use in the system efficiently monitor the city and collect information. The whole system is designed such that it helps in enhancing the condition of a city in many aspects.These information are used to predict upcoming environmentalconditions.
{"title":"Optimizing Sensor Network in Sustainable City","authors":"Gargy Ponnachan","doi":"10.30534/ijccn/2020/03922019","DOIUrl":"https://doi.org/10.30534/ijccn/2020/03922019","url":null,"abstract":"A well monitored sustainable city enhances the lifestyle of the citizens by meeting their own needs with minimal natural resource consumption. The wireless sensor network plays an important role in collecting, processing and analyzing the corresponding information. We propose a system to monitor a city using various IoT enabled wireless sensor networks. With the help of IoT, smart city monitoring can be made possible through real-time monitoring, ubiquitous sensing and intelligent information processing. For best services, to exchange and communicate information IoT embedded systems can be used. It defines a customized design of IoT based monitoring devices. The sensors we use in the system efficiently monitor the city and collect information. The whole system is designed such that it helps in enhancing the condition of a city in many aspects.These information are used to predict upcoming environmentalconditions.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132647489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-25DOI: 10.30534/IJCCN/2019/017812019
Dhiman Ritika
Breeze is a new Android Application which provides a common, easy to use platform for college students for better interaction with fellow students, faculty and administration. This work has unique and helpful feature of queries, where students can put up their queries and anyone can answer their queries. For keeping a check over inappropriate posts a feature of report is also provided which tells admin about inappropriate posts and actions could be taken over it accordingly. It also provides user a help option which helps user with any information regarding labs, faculty and lecture halls. Breeze also provides a platform where user can view daily updates of his attendance and syllabus. Breeze app works fluently as it is based on online database system firebase. It has secure login features, and also allows login through Facebook and Google. It also provides basic features like changing password, changing profile picture, retrieving forgotten password. In all, it is an all in one application which has all the features to solve the basic problems of college students.
{"title":"Developing a New Android App for College Management System","authors":"Dhiman Ritika","doi":"10.30534/IJCCN/2019/017812019","DOIUrl":"https://doi.org/10.30534/IJCCN/2019/017812019","url":null,"abstract":"Breeze is a new Android Application which provides a common, easy to use platform for college students for better interaction with fellow students, faculty and administration. This work has unique and helpful feature of queries, where students can put up their queries and anyone can answer their queries. For keeping a check over inappropriate posts a feature of report is also provided which tells admin about inappropriate posts and actions could be taken over it accordingly. It also provides user a help option which helps user with any information regarding labs, faculty and lecture halls. Breeze also provides a platform where user can view daily updates of his attendance and syllabus. Breeze app works fluently as it is based on online database system firebase. It has secure login features, and also allows login through Facebook and Google. It also provides basic features like changing password, changing profile picture, retrieving forgotten password. In all, it is an all in one application which has all the features to solve the basic problems of college students.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129851100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-31DOI: 10.30534/ijccn/2018/02742018
Ewit
Wireless Sensor Networks (WSNs) are the foremost module of IoT that gather information from the surroundings and send the data to the destinations. A wide Varity of devices can be included in the IOT. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being front-and-center as much of the collected information will be exposed to a wide and often unknown audience. Majority of the existing mechanisms are highly recursive that is actually not feasible for a resource-constraint node to execute for a longer run. Therefore, it will lead to an excessive shortening of resource from the sensor node thereby degrading both communication and security standard. The adversaries acts very differently in wireless sensor networks (WSN) and it has never been checked how they behave when they slipped to internet communication channel. Hence, a robust security scheme is required for securing both gateway node as well as sensor node from being prone to ever increasing level of threats in IoT network and its respective applications. The main aim of this paper is to introduce a secure communication system in IoT.
{"title":"Secure Communication Between Sensors in IoT","authors":"Ewit","doi":"10.30534/ijccn/2018/02742018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/02742018","url":null,"abstract":" Wireless Sensor Networks (WSNs) are the foremost module of IoT that gather information from the surroundings and send the data to the destinations. A wide Varity of devices can be included in the IOT. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being front-and-center as much of the collected information will be exposed to a wide and often unknown audience. Majority of the existing mechanisms are highly recursive that is actually not feasible for a resource-constraint node to execute for a longer run. Therefore, it will lead to an excessive shortening of resource from the sensor node thereby degrading both communication and security standard. The adversaries acts very differently in wireless sensor networks (WSN) and it has never been checked how they behave when they slipped to internet communication channel. Hence, a robust security scheme is required for securing both gateway node as well as sensor node from being prone to ever increasing level of threats in IoT network and its respective applications. The main aim of this paper is to introduce a secure communication system in IoT.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129817628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-31DOI: 10.30534/IJCCN/2018/01742018
Saudi
{"title":"INTERNET OF THING (IoT): AN OVERVIWE BASED ON SECURITY CHALLENGE","authors":"Saudi","doi":"10.30534/IJCCN/2018/01742018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/01742018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114953178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-15DOI: 10.30534/ijccn/2018/01732018
Dr. V. Umadevi
An efficient design of network architecture for intrusion detection using Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism in MANET is provided. The construction of spanning tree using Tuning Tutte polynomial operation in mobile ad-hoc network improves the classification rate of abnormal nodes in MANET. The spanning tree based classification using breadth first search reduces the time complexity in detecting abnormal activities and significantly reduces the packet delay rate. To enhance the security level for different mobile nodes in ad hoc network, the Uninterrupted Bayesian Time Mobile algorithm is designed. Adaptive Boosting algorithm improves the resource utilization factor using probability of success and failure factor. Next, an Uninterrupted Bayesian Time Mobile (UBTM) is designed depending on the node class state to increase the trust accuracy rate. Hybrid Symmetric Cryptography Technique is provided based on the novel mixture of two symmetric cryptographic techniques using SP-AES algorithm and MD5-MAR for MANET. This technique reduces packet delay time and improves the true positive rate on abnormal activities in Mobile Ad Hoc Network.The experiments of intrusion detection system are conducted for Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism, Adaptive Boosting with Uninterrupted Bayesian Time Mobile (AB-UBTM) Networks, Hybrid Symmetric Cryptography Technique (HSCT) with the existing method named as Enhanced Adaptive ACKnowledgement (EAACK) illustrated by Elhadi M. Shakshuki., et al., 2013. Some of the parameter used for analyzing the intrusion in mobile networks was security, packet delay time, true positive rate, trust accuracy, resource utilization factor, classification sensitivity rate and multiclass error
{"title":"A Review on the Performance Analysis of EAACK, TSTMC, AB-UBTM and HSCT for Intrusion Detection in Mobile Ad-Hoc Network","authors":"Dr. V. Umadevi","doi":"10.30534/ijccn/2018/01732018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/01732018","url":null,"abstract":"An efficient design of network architecture for intrusion detection using Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism in MANET is provided. The construction of spanning tree using Tuning Tutte polynomial operation in mobile ad-hoc network improves the classification rate of abnormal nodes in MANET. The spanning tree based classification using breadth first search reduces the time complexity in detecting abnormal activities and significantly reduces the packet delay rate. To enhance the security level for different mobile nodes in ad hoc network, the Uninterrupted Bayesian Time Mobile algorithm is designed. Adaptive Boosting algorithm improves the resource utilization factor using probability of success and failure factor. Next, an Uninterrupted Bayesian Time Mobile (UBTM) is designed depending on the node class state to increase the trust accuracy rate. Hybrid Symmetric Cryptography Technique is provided based on the novel mixture of two symmetric cryptographic techniques using SP-AES algorithm and MD5-MAR for MANET. This technique reduces packet delay time and improves the true positive rate on abnormal activities in Mobile Ad Hoc Network.The experiments of intrusion detection system are conducted for Tuning Spanning Tree Multiclass Classifier (TSTMC) mechanism, Adaptive Boosting with Uninterrupted Bayesian Time Mobile (AB-UBTM) Networks, Hybrid Symmetric Cryptography Technique (HSCT) with the existing method named as Enhanced Adaptive ACKnowledgement (EAACK) illustrated by Elhadi M. Shakshuki., et al., 2013. Some of the parameter used for analyzing the intrusion in mobile networks was security, packet delay time, true positive rate, trust accuracy, resource utilization factor, classification sensitivity rate and multiclass error","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129916587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}