首页 > 最新文献

Journal of Computer Networks and Communications最新文献

英文 中文
Long Range Based IoT Search and Rescue System, a Human-Computer Interaction Preliminary Study and Implementation 远程物联网搜救系统——人机交互的初步研究与实现
IF 2 Q1 Computer Science Pub Date : 2022-11-11 DOI: 10.37256/cnc.1120231753
Christos Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado
Nowadays, IoT has been introduced in different aspects of our lives giving solutions to several problems, one of which is the Search and Rescue (SAR) operations. People that suffer from dementia or people with disease in the autism spectrum tend to elope from their caretaker’s attention, a fact that can lead to serious problems. Thus, a system that takes into consideration of the multiple requirements is of paramount importance. In this paper, a LoRa based SAR system is proposed in order to help in the localization of people with high risk of going missing. In contrast to most of the related systems, in this research article a different approach has been followed. Instead of focusing on the technology, in our approach a human-centered design has been used, leveraging the knowledge of Human-Computer Interaction (HCI) domain. Thus, the technologies used, are an outcome of the initial study. Finally, the system is evaluated using heuristic evaluation and questionnaires.
如今,物联网已经被引入到我们生活的各个方面,解决了许多问题,其中之一就是搜救(SAR)操作。患有痴呆症或自闭症的人往往会从照顾者的注意力中溜走,这可能会导致严重的问题。因此,考虑到多种需求的系统是至关重要的。本文提出了一种基于LoRa的SAR系统,以帮助定位高风险失踪人员。与大多数相关系统不同,本文采用了一种不同的方法。而不是专注于技术,在我们的方法中,以人为中心的设计已经被使用,利用人机交互(HCI)领域的知识。因此,所使用的技术是最初研究的结果。最后,采用启发式评价法和问卷调查法对系统进行评价。
{"title":"Long Range Based IoT Search and Rescue System, a Human-Computer Interaction Preliminary Study and Implementation","authors":"Christos Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado","doi":"10.37256/cnc.1120231753","DOIUrl":"https://doi.org/10.37256/cnc.1120231753","url":null,"abstract":"Nowadays, IoT has been introduced in different aspects of our lives giving solutions to several problems, one of which is the Search and Rescue (SAR) operations. People that suffer from dementia or people with disease in the autism spectrum tend to elope from their caretaker’s attention, a fact that can lead to serious problems. Thus, a system that takes into consideration of the multiple requirements is of paramount importance. In this paper, a LoRa based SAR system is proposed in order to help in the localization of people with high risk of going missing. In contrast to most of the related systems, in this research article a different approach has been followed. Instead of focusing on the technology, in our approach a human-centered design has been used, leveraging the knowledge of Human-Computer Interaction (HCI) domain. Thus, the technologies used, are an outcome of the initial study. Finally, the system is evaluated using heuristic evaluation and questionnaires.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86570100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Linear and Non-Linear Precoders for Massive MIMO Systems 大规模MIMO系统的节能线性和非线性预编码器
IF 2 Q1 Computer Science Pub Date : 2020-08-30 DOI: 10.47277/ijcncs/8(8)1
S. H. Sackey, Michael Ansong, S. N. Kofie, Abdul Karim Armahy
The term Massive MIMO means, Massive multiple input multiple output also known as (large-scale antenna system, very large MIMO). Massive Multiple-Input-MultipleOutput (MIMO) is the major key technique for the future Fifth Generation (5G) of mobile wireless communication network due to its characteristics, elements and advantages. Massive MIMO will be comprised of five major elements; antennas, electronic components, network architectures, protocols and signal processing. We realize that precoding technique is a processing technique that utilizes Channel State Information Technique (CSIT) by operating on the signals before transmitting them. This technique varies base on the type of CSIT and performance criterion. Precoding technique is the last digital processing block at the transmitting side. In this paper, linear and non-linear Precoding technique was reviewed and we proposed two techniques under each that is Minimum Mean Square Error (MMSE), Block Diagonalization (BD), Tomlinson-Harashima (TH) and Dirty paper coding (DPC). Four Precoding techniques: MMSE, BD, DPC and TH were used in the studies to power consumption, energy efficiency and area throughput for single-cell and multi-cell scenarios. In comparing the proposed techniques, in terms of energy efficiency and area throughput, reuse factor (Reuse 4) performs better than other techniques when there is an imperfect CSI is used
大规模MIMO这个术语的意思是,大规模多输入多输出也被称为(大规模天线系统,超大型MIMO)。海量多输入多输出(Massive multi - input - multioutput, MIMO)由于其特点、构成要素和优势,是未来第五代(5G)移动无线通信网络的主要关键技术。大规模MIMO将由五大要素组成;天线,电子元件,网络架构,协议和信号处理。我们认识到预编码技术是利用信道状态信息技术(CSIT)在信号发送前对其进行操作的一种处理技术。这种技术根据CSIT的类型和性能标准而有所不同。预编码技术是发送端的最后一个数字处理模块。本文对线性和非线性预编码技术进行了综述,提出了最小均方误差(MMSE)、块对角化(BD)、Tomlinson-Harashima (TH)和脏纸编码(DPC)两种预编码技术。四种预编码技术:MMSE、BD、DPC和TH在研究中被用于单蜂窝和多蜂窝场景的功耗、能源效率和面积吞吐量。在比较所提出的技术时,就能源效率和面积吞吐量而言,当使用不完美的CSI时,重用因子(重用4)比其他技术表现更好
{"title":"Energy Efficient Linear and Non-Linear Precoders for Massive MIMO Systems","authors":"S. H. Sackey, Michael Ansong, S. N. Kofie, Abdul Karim Armahy","doi":"10.47277/ijcncs/8(8)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(8)1","url":null,"abstract":"The term Massive MIMO means, Massive multiple input multiple output also known as (large-scale antenna system, very large MIMO). Massive Multiple-Input-MultipleOutput (MIMO) is the major key technique for the future Fifth Generation (5G) of mobile wireless communication network due to its characteristics, elements and advantages. Massive MIMO will be comprised of five major elements; antennas, electronic components, network architectures, protocols and signal processing. We realize that precoding technique is a processing technique that utilizes Channel State Information Technique (CSIT) by operating on the signals before transmitting them. This technique varies base on the type of CSIT and performance criterion. Precoding technique is the last digital processing block at the transmitting side. In this paper, linear and non-linear Precoding technique was reviewed and we proposed two techniques under each that is Minimum Mean Square Error (MMSE), Block Diagonalization (BD), Tomlinson-Harashima (TH) and Dirty paper coding (DPC). Four Precoding techniques: MMSE, BD, DPC and TH were used in the studies to power consumption, energy efficiency and area throughput for single-cell and multi-cell scenarios. In comparing the proposed techniques, in terms of energy efficiency and area throughput, reuse factor (Reuse 4) performs better than other techniques when there is an imperfect CSI is used","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48503049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Man in the Middle Attacks: Analysis, Motivation and Prevention 中路进攻:分析、动机与预防
IF 2 Q1 Computer Science Pub Date : 2020-07-31 DOI: 10.47277/ijcncs/8(7)1
D. Javeed, U. MohammedBadamasi, C. Ndubuisi, F. Soomro, M. Asif
Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it. The malware in such scenario mainly monitors and have the ability to change the information which is classified onsly to these two users. Mainly it is knows as a protocol to an unauthorized user within the system who can access as well as change the information of the system without leaving any trace to the existing users. This issue is critical. This paper aims to the understanding of the MITM and to understand its different categories. Finally this paper aims to present some of mechanism for the prevention of such attacks and to identify some of the future research directions in such area
计算机系统和应用程序日益进步,随着这一领域的进步,催生了新的网络攻击。中间人攻击(MITM)就是其中之一。外部人员或第三方进入两个在线用户之间的攻击,而两个用户都不知道。这种情况下的恶意软件主要监控并有能力更改与这两个用户相同的信息。它主要是作为系统内未经授权的用户的协议,该用户可以访问和更改系统的信息,而不会给现有用户留下任何痕迹。这个问题至关重要。本文旨在了解MITM及其不同类别。最后,本文旨在介绍一些预防此类攻击的机制,并确定该领域未来的一些研究方向
{"title":"Man in the Middle Attacks: Analysis, Motivation and Prevention","authors":"D. Javeed, U. MohammedBadamasi, C. Ndubuisi, F. Soomro, M. Asif","doi":"10.47277/ijcncs/8(7)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(7)1","url":null,"abstract":"Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it. The malware in such scenario mainly monitors and have the ability to change the information which is classified onsly to these two users. Mainly it is knows as a protocol to an unauthorized user within the system who can access as well as change the information of the system without leaving any trace to the existing users. This issue is critical. This paper aims to the understanding of the MITM and to understand its different categories. Finally this paper aims to present some of mechanism for the prevention of such attacks and to identify some of the future research directions in such area","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44006369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Tampering Reveal Technique for Iris Images 虹膜图像的篡改显示技术
IF 2 Q1 Computer Science Pub Date : 2020-06-30 DOI: 10.47277/ijcncs/8(6)1
Rasha Thabit, J. Ali, Doaa Subhi
Nowadays, many biometric based security systems depend on the iris images for authentication because of their features and ease of use. However, storing and sharing these sensitive images through open access networks will expose them to tampering. In order to ensure the safety of the iris images, this paper presents a new tampering reveal technique based on watermarking in the transform domain. In the proposed technique, the iris region is selected and isolated using interactive segmentation process (ISA). The authentication bits have been generated from the iris region (IR) and embedded in the Slantlet transform coefficients of the remaining part of the iris image which has been named as non-iris region (NIR). The use of ISA ensures the intactness of IR because it has been excluded from the embedding process. Several experiments have been conducted to test the visual quality, capacity, payload, and the tampering reveal performance. The experiments proved the ability of the proposed technique to reveal and localize any tampering in IR, in addition, the difference between the original iris image and the watermarked iris image is imperceptible
目前,许多基于生物特征的安全系统由于其特点和易用性而依赖虹膜图像进行身份验证。然而,通过开放访问网络存储和共享这些敏感图像会使它们受到篡改。为了保证虹膜图像的安全性,本文提出了一种新的基于变换域水印的篡改揭示技术。在所提出的技术中,使用交互式分割过程(ISA)来选择和隔离虹膜区域。已从虹膜区域(IR)生成认证比特,并将其嵌入虹膜图像的已被命名为非虹膜区域(NIR)的剩余部分的Slantlet变换系数中。ISA的使用确保了IR的完整性,因为它已被排除在嵌入过程之外。已经进行了几个实验来测试视觉质量、容量、有效载荷和篡改揭示性能。实验证明了所提出的技术能够揭示和定位IR中的任何篡改,此外,原始虹膜图像和带水印虹膜图像之间的差异是不可察觉的
{"title":"Tampering Reveal Technique for Iris Images","authors":"Rasha Thabit, J. Ali, Doaa Subhi","doi":"10.47277/ijcncs/8(6)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(6)1","url":null,"abstract":"Nowadays, many biometric based security systems depend on the iris images for authentication because of their features and ease of use. However, storing and sharing these sensitive images through open access networks will expose them to tampering. In order to ensure the safety of the iris images, this paper presents a new tampering reveal technique based on watermarking in the transform domain. In the proposed technique, the iris region is selected and isolated using interactive segmentation process (ISA). The authentication bits have been generated from the iris region (IR) and embedded in the Slantlet transform coefficients of the remaining part of the iris image which has been named as non-iris region (NIR). The use of ISA ensures the intactness of IR because it has been excluded from the embedding process. Several experiments have been conducted to test the visual quality, capacity, payload, and the tampering reveal performance. The experiments proved the ability of the proposed technique to reveal and localize any tampering in IR, in addition, the difference between the original iris image and the watermarked iris image is imperceptible","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43096220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Community Development Training with Eco-print Training Wukirsari Village, Sleman District, Indonesia 印尼Sleman地区Wukirsari村的社区发展培训
IF 2 Q1 Computer Science Pub Date : 2020-04-30 DOI: 10.47277/ijcncs/8(4)1
T. Mardiana, A. Warsiki, Sucahyo Heriningsih
This community empowerment aims to explore the natural potential of the village of Wukirsari, Sleman Regency, as well as develop the villages creative economy through ecoprint training, as a vehicle for the villages creative economy based on leaf potential. The training method using various references and empowering the community to make ecoprints was followed by 15 mothers who were representatives of the joint business group. The results of this community empowerment produce village potential namely leaves, and training approaches by studying the conditions and rural life of, with, and by village communities. The concept of the ecoprint training approach emphasizes community involvement in all activities. The community is involved in the planners and implementers of the ecoprint training program and not just as an audience in ecoprint making training. The results of the ecoprint training are expected to increase the creative economy that has the potential to be developed by villagers, as a form of participation in building village businesses, and to be able to provide welfare for the residents of their village
这项社区赋权计划旨在探索Sleman Regency Wukirsari村的自然潜力,并通过生态打印培训发展村庄创意经济,作为基于树叶潜力的村庄创意经济的载体。该培训方法利用各种参考资料并授权社区制作生态印本,15名母亲参加了培训,她们是联合商业集团的代表。这种赋予社区权力的结果是通过研究乡村社区的条件和农村生活来产生乡村潜力,即树叶和培训方法。生态印本培训方法的概念强调社区参与所有活动。社区参与生态打印培训计划的规划和实施,而不仅仅是作为生态打印制作培训的受众。预计生态印本培训的结果将增加有潜力由村民发展的创意经济,作为参与建设乡村企业的一种形式,并能够为他们的村庄居民提供福利
{"title":"Community Development Training with Eco-print Training Wukirsari Village,\u0000 Sleman District, Indonesia","authors":"T. Mardiana, A. Warsiki, Sucahyo Heriningsih","doi":"10.47277/ijcncs/8(4)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(4)1","url":null,"abstract":"This community empowerment aims to explore the natural potential of the\u0000 village of Wukirsari, Sleman Regency, as well as develop the villages\u0000 creative economy through ecoprint training, as a vehicle for the villages\u0000 creative economy based on leaf potential. The training method using various\u0000 references and empowering the community to make ecoprints was followed by 15\u0000 mothers who were representatives of the joint business group. The results of\u0000 this community empowerment produce village potential namely leaves, and\u0000 training approaches by studying the conditions and rural life of, with, and\u0000 by village communities. The concept of the ecoprint training approach\u0000 emphasizes community involvement in all activities. The community is\u0000 involved in the planners and implementers of the ecoprint training program\u0000 and not just as an audience in ecoprint making training. The results of the\u0000 ecoprint training are expected to increase the creative economy that has the\u0000 potential to be developed by villagers, as a form of participation in\u0000 building village businesses, and to be able to provide welfare for the\u0000 residents of their village","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47374924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cyber-attacks on Saudi Arabia Environment 对沙特阿拉伯环境的网络攻击
IF 2 Q1 Computer Science Pub Date : 2020-03-31 DOI: 10.47277/ijcncs/8(3)1
Rawan Abdulaziz Al-Mulhim, Lama Alzamil, Fay Mohammed Al-Dossary
Even though cyber-attacks can’t be compared to a nuclear attack but they both pose a serious threat to national and international security. As we witness today cyberwarfare is increasing and Saudi Arabia has become a major target of Cyber-attacks as a result of its economic and digital revolution, high technology adoption and the growth of the gas and oil industry. This paper presents, a case study of the cyber-attacks on the Saudi environment. We focused on two specific malwares Shamoon and Mamba Ransomware. It also explores their methodologies and structure for future defense.
尽管网络攻击不能与核攻击相提并论,但它们都对国家和国际安全构成了严重威胁。正如我们今天所看到的那样,网络战正在增加,由于其经济和数字革命、高科技的采用以及天然气和石油行业的发展,沙特阿拉伯已成为网络攻击的主要目标。本文介绍了一个针对沙特环境的网络攻击案例。我们专注于两个特定的恶意软件Shamoon和Mamba勒索软件。它还探讨了他们未来防御的方法和结构。
{"title":"Cyber-attacks on Saudi Arabia Environment","authors":"Rawan Abdulaziz Al-Mulhim, Lama Alzamil, Fay Mohammed Al-Dossary","doi":"10.47277/ijcncs/8(3)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(3)1","url":null,"abstract":"Even though cyber-attacks can’t be compared to a nuclear attack but they both pose a serious threat to national and international security. As we witness today cyberwarfare is increasing and Saudi Arabia has become a major target of Cyber-attacks as a result of its economic and digital revolution, high technology adoption and the growth of the gas and oil industry. This paper presents, a case study of the cyber-attacks on the Saudi environment. We focused on two specific malwares Shamoon and Mamba Ransomware. It also explores their methodologies and structure for future defense.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47217888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Hybrid Dragonfly Algorithm with Modified Conjugate Gradient Method 一种改进共轭梯度法的混合蜻蜓算法
IF 2 Q1 Computer Science Pub Date : 2020-02-29 DOI: 10.47277/ijcncs/8(2)2
Layth Riyadh Khaleel, Ban Ahmed Mitras Prof.
Dragonfly Algorithm (DA) is a meta-heuristic algorithm, It is a new algorithm proposed by Mirjalili in (2015) and it simulate the behavior of dragonflies in their search for food and migration. In this paper, a modified conjugate gradient algorithm is proposed by deriving new conjugate coefficient. The sufficient descent and the global convergence properties for the proposed algorithm are proved. Novel hybrid algorithm of the dragonfly (DA) was proposed with modified conjugate gradient Algorithm which develops the elementary society that is randomly generated as the primary society for the dragonfly optimization algorithm using the characteristics of the modified conjugate gradient algorithm. The efficiency of the hybrid algorithm was measured by applying it to (10) of the optimization functions of high measurement with different dimensions and the results of the hybrid algorithm were very good in comparison with the original algorithm.
蜻蜓算法(Dragonfly Algorithm, DA)是一种元启发式算法,是Mirjalili(2015)提出的一种模拟蜻蜓觅食和迁徙行为的新算法。本文通过推导新的共轭系数,提出了一种改进的共轭梯度算法。证明了该算法的充分下降性和全局收敛性。利用改进共轭梯度算法的特点,将随机生成的初级社会作为蜻蜓优化算法的初级社会,提出了一种新的蜻蜓混合算法(DA)。将混合算法应用于不同维数的高测量优化函数(10),测试了混合算法的效率,与原算法相比,混合算法的结果非常好。
{"title":"A Novel Hybrid Dragonfly Algorithm with Modified Conjugate Gradient Method","authors":"Layth Riyadh Khaleel, Ban Ahmed Mitras Prof.","doi":"10.47277/ijcncs/8(2)2","DOIUrl":"https://doi.org/10.47277/ijcncs/8(2)2","url":null,"abstract":"Dragonfly Algorithm (DA) is a meta-heuristic algorithm, It is a new algorithm proposed by Mirjalili in (2015) and it simulate the behavior of dragonflies in their search for food and migration. In this paper, a modified conjugate gradient algorithm is proposed by deriving new conjugate coefficient. The sufficient descent and the global convergence properties for the proposed algorithm are proved. Novel hybrid algorithm of the dragonfly (DA) was proposed with modified conjugate gradient Algorithm which develops the elementary society that is randomly generated as the primary society for the dragonfly optimization algorithm using the characteristics of the modified conjugate gradient algorithm. The efficiency of the hybrid algorithm was measured by applying it to (10) of the optimization functions of high measurement with different dimensions and the results of the hybrid algorithm were very good in comparison with the original algorithm.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45212044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Development of Trend Analysis of Scoring for Good Corporate Governance based on the Decree of the Ministry of State Owned Enterprises Number SK-16/S.MBU/2012 in State Owned Banks that Went Public in the Period 2013-2018 基于国有企业部令SK-16/S的良好公司治理评分趋势分析的发展2013-2018年上市国有银行MBU/2012
IF 2 Q1 Computer Science Pub Date : 2020-02-29 DOI: 10.47277/IJCNCS/8(2)1
Hks Negara Di Purnamasari, B. Khaleel
The aims of this research is to evaluate the development of Trend Analysis of Good Corporate Governance Scoring based on the Decree of the Ministry of State Owned Enterprises Number SK-16/S.MBU/2012 in SOEs that went public in the next period of the earlier study in 2012, i.e. 2013-2018 (the latest financial statement at the moment). In this study we employed a population sample of SOEs in banking sector that are listed in BEI for the period 2012-2018. Therefore, this period of study is expected to reflect the actual condition on a more consistent basis from year to year. Publicly traded SOEs are selected because every company that has made public offering is required to publish its annual report in order to make its Annual Report more accessible. We can conclude that the development of scoring for Good Corporate Governance—based on the Decree of the Ministry of State Owned Enterprises Number SK16/S.MBU/2012 in State Owned Banks that went public in the period 2013-2018—follows an upward trend that put them into the Excellent category.
本研究的目的是基于国有企业部令SK-16/S来评估良好公司治理评分趋势分析的发展。2012年前期研究下一阶段上市国企的MBU/2012,即2013-2018年(目前最新的财务报表)。在本研究中,我们采用了2012-2018年期间在BEI上市的银行业国有企业的人口样本。因此,预计这一时期的研究将在每年更一致的基础上反映实际情况。之所以选择公开上市的国有企业,是因为每一家公开发行股票的公司都必须公布其年度报告,以使其年度报告更容易获取。我们可以得出结论:良好公司治理评分的发展——基于国有企业部令第SK16/S号。2013-2018年期间上市的国有银行的MBU/2012指数呈上升趋势,属于优秀类别。
{"title":"The Development of Trend Analysis of Scoring for Good Corporate Governance based on the Decree of the Ministry of State Owned Enterprises Number SK-16/S.MBU/2012 in State Owned Banks that Went Public in the Period 2013-2018","authors":"Hks Negara Di Purnamasari, B. Khaleel","doi":"10.47277/IJCNCS/8(2)1","DOIUrl":"https://doi.org/10.47277/IJCNCS/8(2)1","url":null,"abstract":"The aims of this research is to evaluate the development of Trend Analysis of Good Corporate Governance Scoring based on the Decree of the Ministry of State Owned Enterprises Number SK-16/S.MBU/2012 in SOEs that went public in the next period of the earlier study in 2012, i.e. 2013-2018 (the latest financial statement at the moment). In this study we employed a population sample of SOEs in banking sector that are listed in BEI for the period 2012-2018. Therefore, this period of study is expected to reflect the actual condition on a more consistent basis from year to year. Publicly traded SOEs are selected because every company that has made public offering is required to publish its annual report in order to make its Annual Report more accessible. We can conclude that the development of scoring for Good Corporate Governance—based on the Decree of the Ministry of State Owned Enterprises Number SK16/S.MBU/2012 in State Owned Banks that went public in the period 2013-2018—follows an upward trend that put them into the Excellent category.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42767531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study to Validate the Performance of Flooding Based Distributed Denial of Service Attacks 基于洪水的分布式拒绝服务攻击性能验证研究
IF 2 Q1 Computer Science Pub Date : 2020-01-31 DOI: 10.47277/ijcncs/8(1)1
S. Singh, Ea Bhandari, Kk Saluja, A. L. Sangal
Network technology has experienced explosive growth in the past decades. The generally accepted viewpoint in the security world is that no system or network is totally protected which makes network security an important concern. The work done in this paper focuses on Distributed Denial of Service Attacks (DDoS) where legitimate users are prevented from accessing network services. Distributed Denial of Service (DDoS) Attacks has been increasingly found to be disturbing the normal working of organizations causing billions of rupees of losses. Organizations are trying their best to reduce their losses from these systems. The focus of this paper is to providing our results of experiments in this regard for flooding based DDoS attacking in the simulation environment with NS2.35. This paper point out that the bandwidth may be more easily flooded by UDP-type attacking than by TCP-type one at different attack strength. In this paper we done the validation of DropTail and RED queue under the flooding based DDoS attack, which is better for the legitimate user under the flooding attack.
在过去的几十年里,网络技术经历了爆炸式的增长。安全界普遍接受的观点是,没有一个系统或网络是完全受保护的,这使得网络安全成为一个重要问题。本文所做的工作集中在分布式拒绝服务攻击(DDoS)上,即阻止合法用户访问网络服务。分布式拒绝服务(DDoS)攻击越来越多地被发现干扰组织的正常工作,造成数十亿卢比的损失。各组织正在尽最大努力减少这些系统造成的损失。本文的重点是提供我们在NS2.35模拟环境中进行基于洪水的DDoS攻击的实验结果。本文指出,在不同的攻击强度下,UDP类型的攻击比TCP类型的攻击更容易淹没带宽。在本文中,我们对基于洪泛的DDoS攻击下的DropTail和RED队列进行了验证,这对洪泛攻击下的合法用户更有利。
{"title":"Study to Validate the Performance of Flooding Based Distributed Denial of Service Attacks","authors":"S. Singh, Ea Bhandari, Kk Saluja, A. L. Sangal","doi":"10.47277/ijcncs/8(1)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(1)1","url":null,"abstract":"Network technology has experienced explosive growth in the past decades. The generally accepted viewpoint in the security world is that no system or network is totally protected which makes network security an important concern. The work done in this paper focuses on Distributed Denial of Service Attacks (DDoS) where legitimate users are prevented from accessing network services. Distributed Denial of Service (DDoS) Attacks has been increasingly found to be disturbing the normal working of organizations causing billions of rupees of losses. Organizations are trying their best to reduce their losses from these systems. The focus of this paper is to providing our results of experiments in this regard for flooding based DDoS attacking in the simulation environment with NS2.35. This paper point out that the bandwidth may be more easily flooded by UDP-type attacking than by TCP-type one at different attack strength. In this paper we done the validation of DropTail and RED queue under the flooding based DDoS attack, which is better for the legitimate user under the flooding attack.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41835560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Issues of 5th Generation Technology: A Review 第五代技术安全问题综述
IF 2 Q1 Computer Science Pub Date : 2020-01-01 DOI: 10.47277/ijcncs/8(9)1
A. Younas
In the 20th century, communication placed an important role in our life, whereas 5G technology is known to be the central area for future networking infrastructure. However, with the high pace of gigantic assaults and protection issues, users and other organizations are not quite sure of the security parameters. In this article, we spotlight the elementary security doubts of 5G Technology. A large portion of the data based on literature and studies released by famous networking giants. Consequently, the paper can illuminate it peruses on what is required from 5G Technology and what are fundamental issues in accomplishing those objects
在20世纪,通信在我们的生活中扮演着重要的角色,而5G技术被认为是未来网络基础设施的核心领域。然而,随着大规模攻击和保护问题的快速发展,用户和其他组织并不十分确定安全参数。在本文中,我们将重点关注5G技术的基本安全问题。很大一部分数据基于著名网络巨头发布的文献和研究。因此,本文可以阐明它对5G技术的要求以及实现这些目标的基本问题
{"title":"Security Issues of 5th Generation Technology: A Review","authors":"A. Younas","doi":"10.47277/ijcncs/8(9)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(9)1","url":null,"abstract":"In the 20th century, communication placed an important role in our life, whereas 5G technology is known to be the central area for future networking infrastructure. However, with the high pace of gigantic assaults and protection issues, users and other organizations are not quite sure of the security parameters. In this article, we spotlight the elementary security doubts of 5G Technology. A large portion of the data based on literature and studies released by famous networking giants. Consequently, the paper can illuminate it peruses on what is required from 5G Technology and what are fundamental issues in accomplishing those objects","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70809793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer Networks and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1