首页 > 最新文献

... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security最新文献

英文 中文
The Effect of Intellectual Capital on Organizational Performance: The Mediating Role of Knowledge Sharing 智力资本对组织绩效的影响:知识共享的中介作用
B. Obeidat, A. Abdallah, N. Aqqad, Abdel Hakeem Oqlah M. Akhoershiedah, M. Maqableh
Understanding the various effects that exist among intellectual capital, knowledge sharing, and organizational performance is the main purpose of this study. Data were gathered from 356 employees working in manufacturing companies in Jordan. In order to test the hypotheses of this study, the approach suggested by [1] was undertaken. The results of the analysis revealed that intellectual capital had a positive effect on organizational performance and knowledge sharing. The results also showed that knowledge sharing had a positive effect on organizational performance. Finally, it was found that knowledge sharing had a positive mediating effect on the relationship between intellectual capital and organizational performance. The findings of this study thus provide many benefits for researchers and practitioners despite the presence of some limitations.
了解知识资本、知识共享和组织绩效之间存在的各种效应是本研究的主要目的。数据收集自356名在约旦制造公司工作的员工。为了检验本研究的假设,我们采用了[1]提出的方法。分析结果表明,智力资本对组织绩效和知识共享具有正向影响。结果还表明,知识共享对组织绩效有正向影响。最后,研究发现知识共享对智力资本与组织绩效之间的关系具有正向中介作用。因此,尽管存在一些局限性,本研究的发现为研究人员和从业人员提供了许多好处。
{"title":"The Effect of Intellectual Capital on Organizational Performance: The Mediating Role of Knowledge Sharing","authors":"B. Obeidat, A. Abdallah, N. Aqqad, Abdel Hakeem Oqlah M. Akhoershiedah, M. Maqableh","doi":"10.4236/CN.2017.91001","DOIUrl":"https://doi.org/10.4236/CN.2017.91001","url":null,"abstract":"Understanding the various effects that exist among intellectual capital, knowledge sharing, and organizational performance is the main purpose of this study. Data were gathered from 356 employees working in manufacturing companies in Jordan. In order to test the hypotheses of this study, the approach suggested by [1] was undertaken. The results of the analysis revealed that intellectual capital had a positive effect on organizational performance and knowledge sharing. The results also showed that knowledge sharing had a positive effect on organizational performance. Finally, it was found that knowledge sharing had a positive mediating effect on the relationship between intellectual capital and organizational performance. The findings of this study thus provide many benefits for researchers and practitioners despite the presence of some limitations.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"40 1","pages":"1-27"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74617028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
An Integrated Model of Job Involvement, Job Satisfaction and Organizational Commitment: A Structural Analysis in Jordan’s Banking Sector 工作投入、工作满意度和组织承诺的综合模型:约旦银行业的结构分析
A. Abdallah, B. Obeidat, N. Aqqad, Marwa Na’el Khalil Al Janini, Samer Eid Dahiyat
The purpose of this research is to investigate the interrelationships among the three behavioural constructs of job involvement, job satisfaction and organizational commitment. Accordingly, a structural model is developed to delineate the interactions among these constructs and explore the mediating effect of job satisfaction on the relationship between job involvement and organizational commitment. A questionnaire-based survey was designed to test the aforementioned model based on a dataset of 315 employees working in twelve out of twenty six banks operating in the capital city of Jordan, Amman. The model and posited hypotheses were tested using structural equation modelling analysis. The results indicated that job involvement positively and significantly affects job satisfaction and organizational commitment. Additionally, job satisfaction proved to be positively related to organizational commitment. Furthermore, job satisfaction positively and significantly partially mediated the relationship between job involvement and organizational commitment.
本研究的目的是探讨工作投入、工作满意度和组织承诺三个行为构念之间的相互关系。在此基础上,本文建立了一个结构模型来描述这些构式之间的相互作用,并探讨了工作满意度在工作投入与组织承诺关系中的中介作用。一项基于问卷的调查旨在测试上述模型,该模型基于在约旦首都安曼运营的26家银行中的12家银行工作的315名员工的数据集。采用结构方程模型分析对模型和假设进行了检验。结果表明,工作投入对工作满意度和组织承诺有显著的正向影响。此外,工作满意度与组织承诺正相关。此外,工作满意度在工作投入与组织承诺的关系中具有显著的正向中介作用。
{"title":"An Integrated Model of Job Involvement, Job Satisfaction and Organizational Commitment: A Structural Analysis in Jordan’s Banking Sector","authors":"A. Abdallah, B. Obeidat, N. Aqqad, Marwa Na’el Khalil Al Janini, Samer Eid Dahiyat","doi":"10.4236/CN.2017.91002","DOIUrl":"https://doi.org/10.4236/CN.2017.91002","url":null,"abstract":"The purpose of this research is to investigate the interrelationships among the three behavioural constructs of job involvement, job satisfaction and organizational commitment. Accordingly, a structural model is developed to delineate the interactions among these constructs and explore the mediating effect of job satisfaction on the relationship between job involvement and organizational commitment. A questionnaire-based survey was designed to test the aforementioned model based on a dataset of 315 employees working in twelve out of twenty six banks operating in the capital city of Jordan, Amman. The model and posited hypotheses were tested using structural equation modelling analysis. The results indicated that job involvement positively and significantly affects job satisfaction and organizational commitment. Additionally, job satisfaction proved to be positively related to organizational commitment. Furthermore, job satisfaction positively and significantly partially mediated the relationship between job involvement and organizational commitment.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"22 1","pages":"28-53"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73804159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Network coding cooperation performance analysis in wireless network over a lossy channel, M users and a destination scenario 无线网络在有损信道、M用户和目标场景下的网络编码协作性能分析
Mohamed El-Hihi, Hani H. Attar, A. Solyman, L. Stanković
Network coding (NC), introduced at the turn of the century, enables nodes in a network to combine data algebraically before either sending or forwarding them. Random network coding has gained popularity over the years by combining the received packet randomly before forwarding them, resulting in a complex Jordan Gaussian Elimination (JGE) decoding process. The effectiveness of random NC is through cooperation among nodes. In this paper, we propose a simple, low-complexity cooperative protocol that exploits NC in a deterministic manner resulting in improved diversity, data rate, and less complex JGE decoding process. The proposed system is applied over a lossy wireless network. The scenario under investigation is as follows: M users must send their information to a common destination D and to exchange the information between each others, over erasure channels; typically the channels between the users and the destination are worse than the channels between users. It is possible to significantly reduce the traffic among users and destination, achieving significant bandwidth savings, by combining packets from different users in simple, deterministic ways without resorting to extensive header information before being forwarded to the destination and the M users. The key problem we try to address is how to efficiently combine the packets at each user while exploiting user cooperation and the probability of successfully recovering information from all users at D with k 1 to 10ˉ4, because of the proposed combining algorithm that enables the nodes to generate additional unique linear equations to broadcast rather than repeating the same ones via ARQ. Moreover, the number of the transmitted packets in each cooperative stage dropped from M (M - 1) to just M packets, resulting to 2 M packets instead 2 (M2 - 1) when three stages of transmission system are used instead of one stage (two cooperative stages).
网络编码(NC)是在世纪之交引入的,它使网络中的节点能够在发送或转发数据之前对数据进行代数组合。多年来,随机网络编码在转发之前随机组合接收到的数据包,导致复杂的乔丹高斯消去(JGE)解码过程,从而得到了广泛的应用。随机NC的有效性是通过节点间的协作实现的。在本文中,我们提出了一种简单,低复杂度的合作协议,该协议以确定性的方式利用NC,从而提高了多样性,数据速率和更简单的JGE解码过程。该系统应用于有耗无线网络。所研究的场景如下:M用户必须将他们的信息发送到一个共同的目的地D,并通过擦除通道在彼此之间交换信息;通常,用户和目的地之间的通道比用户之间的通道差。通过以简单、确定的方式组合来自不同用户的数据包,而不需要在转发到目的地和M个用户之前使用大量的报头信息,可以显著减少用户和目的地之间的流量,从而显著节省带宽。我们试图解决的关键问题是如何在利用用户合作的同时有效地组合每个用户的数据包,以及成功从k 1到10 k 4的D处所有用户恢复信息的概率,因为所提出的组合算法使节点能够生成额外的唯一线性方程来广播,而不是通过ARQ重复相同的方程。并且,每个合作阶段的传输数据包数量从M (M - 1)下降到M (M2 - 1),当使用三个阶段的传输系统而不是一个阶段(两个合作阶段)时,产生2m数据包而不是2 (M2 - 1)。
{"title":"Network coding cooperation performance analysis in wireless network over a lossy channel, M users and a destination scenario","authors":"Mohamed El-Hihi, Hani H. Attar, A. Solyman, L. Stanković","doi":"10.4236/CN.2016.84023","DOIUrl":"https://doi.org/10.4236/CN.2016.84023","url":null,"abstract":"Network coding (NC), introduced at the turn of the century, enables nodes in a network to combine data algebraically before either sending or forwarding them. Random network coding has gained popularity over the years by combining the received packet randomly before forwarding them, resulting in a complex Jordan Gaussian Elimination (JGE) decoding process. The effectiveness of random NC is through cooperation among nodes. In this paper, we propose a simple, low-complexity cooperative protocol that exploits NC in a deterministic manner resulting in improved diversity, data rate, and less complex JGE decoding process. The proposed system is applied over a lossy wireless network. The scenario under investigation is as follows: M users must send their information to a common destination D and to exchange the information between each others, over erasure channels; typically the channels between the users and the destination are worse than the channels between users. It is possible to significantly reduce the traffic among users and destination, achieving significant bandwidth savings, by combining packets from different users in simple, deterministic ways without resorting to extensive header information before being forwarded to the destination and the M users. The key problem we try to address is how to efficiently combine the packets at each user while exploiting user cooperation and the probability of successfully recovering information from all users at D with k 1 to 10ˉ4, because of the proposed combining algorithm that enables the nodes to generate additional unique linear equations to broadcast rather than repeating the same ones via ARQ. Moreover, the number of the transmitted packets in each cooperative stage dropped from M (M - 1) to just M packets, resulting to 2 M packets instead 2 (M2 - 1) when three stages of transmission system are used instead of one stage (two cooperative stages).","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"70 1","pages":"257-280"},"PeriodicalIF":0.0,"publicationDate":"2016-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88532260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
SegAuth: A Segment-based Approach to Behavioral Biometric Authentication. segath:基于片段的行为生物识别认证方法。
Pub Date : 2016-10-01 Epub Date: 2017-02-23 DOI: 10.1109/CNS.2016.7860464
Yanyan Li, Mengjun Xie, Jiang Bian

Many studies have been conducted to apply behavioral biometric authentication on/with mobile devices and they have shown promising results. However, the concern about the verification accuracy of behavioral biometrics is still common given the dynamic nature of behavioral biometrics. In this paper, we address the accuracy concern from a new perspective-behavior segments, that is, segments of a gesture instead of the whole gesture as the basic building block for behavioral biometric authentication. With this unique perspective, we propose a new behavioral biometric authentication method called SegAuth, which can be applied to various gesture or motion based authentication scenarios. SegAuth can achieve high accuracy by focusing on each user's distinctive gesture segments that frequently appear across his or her gestures. In SegAuth, a time series derived from a gesture/motion is first partitioned into segments and then transformed into a set of string tokens in which the tokens representing distinctive, repetitive segments are associated with higher genuine probabilities than those tokens that are common across users. An overall genuine score calculated from all the tokens derived from a gesture is used to determine the user's authenticity. We have assessed the effectiveness of SegAuth using 4 different datasets. Our experimental results demonstrate that SegAuth can achieve higher accuracy consistently than existing popular methods on the evaluation datasets.

在移动设备上应用行为生物识别认证已经进行了许多研究,并显示出有希望的结果。然而,鉴于行为生物识别技术的动态特性,对其验证准确性的担忧仍然普遍存在。在本文中,我们从一个新的角度来解决准确性问题-行为片段,即一个手势的片段而不是整个手势作为行为生物识别认证的基本构建块。基于这种独特的视角,我们提出了一种新的行为生物识别认证方法,称为SegAuth,它可以应用于各种基于手势或运动的认证场景。segath可以通过关注每个用户在手势中频繁出现的独特手势片段来实现高精度。在segath中,来自手势/动作的时间序列首先被划分为片段,然后转换为一组字符串令牌,其中代表独特的重复片段的令牌比那些在用户中常见的令牌具有更高的真实概率。从手势派生的所有标记中计算出的总体真实分数用于确定用户的真实性。我们使用4个不同的数据集评估了segath的有效性。实验结果表明,segath在评价数据集上可以获得比现有流行方法更高的一致性精度。
{"title":"SegAuth: A Segment-based Approach to Behavioral Biometric Authentication.","authors":"Yanyan Li,&nbsp;Mengjun Xie,&nbsp;Jiang Bian","doi":"10.1109/CNS.2016.7860464","DOIUrl":"https://doi.org/10.1109/CNS.2016.7860464","url":null,"abstract":"<p><p>Many studies have been conducted to apply behavioral biometric authentication on/with mobile devices and they have shown promising results. However, the concern about the verification accuracy of behavioral biometrics is still common given the dynamic nature of behavioral biometrics. In this paper, we address the accuracy concern from a new perspective-behavior segments, that is, segments of a gesture instead of the whole gesture as the basic building block for behavioral biometric authentication. With this unique perspective, we propose a new behavioral biometric authentication method called SegAuth, which can be applied to various gesture or motion based authentication scenarios. SegAuth can achieve high accuracy by focusing on each user's distinctive gesture segments that frequently appear across his or her gestures. In SegAuth, a time series derived from a gesture/motion is first partitioned into segments and then transformed into a set of string tokens in which the tokens representing distinctive, repetitive segments are associated with higher genuine probabilities than those tokens that are common across users. An overall genuine score calculated from all the tokens derived from a gesture is used to determine the user's authenticity. We have assessed the effectiveness of SegAuth using 4 different datasets. Our experimental results demonstrate that SegAuth can achieve higher accuracy consistently than existing popular methods on the evaluation datasets.</p>","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"2016 ","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/CNS.2016.7860464","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"35053029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Role of Knowledge Management Infrastructure in Enhancing Job Satisfaction at Aqaba Five Star Hotels in Jordan 知识管理基础设施在提升约旦亚喀巴五星级酒店工作满意度中的作用
R. Masa’deh
The aim of this research is to explore the role of Knowledge Management (KM) infrastructure (organizational culture, organizational structure and information technology) in enhancing job satisfaction at Aqaba five star hotels located in Jordan. A total of 216 questionnaires containing 33 items were used to collect information from the respondents. Multiple regression analysis was conducted to test the research hypotheses. Results of the current study revealed that there is a significant positive impact of KM infrastructure on job satisfaction and these results are in line with the results of the previous studies mentioned in the literature, and also revealed that the dimensions of KM infrastructure that has the highest effect on job satisfaction are organizational culture followed by information technology; whereas the variable of organizational structure has not significant impact on it. Results of T-test showed that there is no significant difference in the impact of KM infrastructure towards job satisfaction in favor of gender. In addition, results of ANOVA test found that there are significant differences in the impact of KM infrastructure on job satisfaction that can be attributed to age, educational level, and personal income.
本研究的目的是探讨知识管理(KM)基础设施(组织文化、组织结构和信息技术)在提高约旦亚喀巴五星级酒店员工工作满意度中的作用。问卷共216份,共33项。采用多元回归分析对研究假设进行检验。本研究结果显示,知识管理基础设施对工作满意度有显著的正向影响,这一结果与文献中先前的研究结果一致,也表明知识管理基础设施对工作满意度影响最大的维度是组织文化,其次是信息技术;而组织结构变量对其影响不显著。t检验结果显示,知识基础设施对工作满意度的影响在性别上没有显著差异。此外,方差分析结果发现,KM基础设施对工作满意度的影响存在显著差异,这可以归因于年龄、教育水平和个人收入。
{"title":"The Role of Knowledge Management Infrastructure in Enhancing Job Satisfaction at Aqaba Five Star Hotels in Jordan","authors":"R. Masa’deh","doi":"10.4236/CN.2016.84021","DOIUrl":"https://doi.org/10.4236/CN.2016.84021","url":null,"abstract":"The aim of this research is to explore the role of Knowledge Management (KM) infrastructure (organizational culture, organizational structure and information technology) in enhancing job satisfaction at Aqaba five star hotels located in Jordan. A total of 216 questionnaires containing 33 items were used to collect information from the respondents. Multiple regression analysis was conducted to test the research hypotheses. Results of the current study revealed that there is a significant positive impact of KM infrastructure on job satisfaction and these results are in line with the results of the previous studies mentioned in the literature, and also revealed that the dimensions of KM infrastructure that has the highest effect on job satisfaction are organizational culture followed by information technology; whereas the variable of organizational structure has not significant impact on it. Results of T-test showed that there is no significant difference in the impact of KM infrastructure towards job satisfaction in favor of gender. In addition, results of ANOVA test found that there are significant differences in the impact of KM infrastructure on job satisfaction that can be attributed to age, educational level, and personal income.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"10 1","pages":"219-240"},"PeriodicalIF":0.0,"publicationDate":"2016-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81925459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
A Novel Review on Security and Routing Protocols in MANET MANET中安全与路由协议的新进展
Muhammad Kashif Nazir, R. Rehman, Atif Nazir
The origin of Mobile ad hoc network (MANET) was started in 1970 as packet radio network (PRNET), later on different researches were made on it in different ages. MANET works under no fixed infrastructure in which every node works likes a router that stores and forwards packet to final destination. Due to its dynamic topology, MANET can be created anywhere, anytime. As there are limited resources in MANET so it faces many problems such as security, limited bandwidth, range and power constraints. Due to this, many new routing protocols are proposed. This article examines different techniques to manage congestion control, security issues, different layers attacks, routing protocols and challenges that are faced by MANET.
移动自组织网络(MANET)起源于1970年的分组无线网络(PRNET),后来在不同的时代对其进行了不同的研究。MANET在没有固定基础设施的情况下工作,其中每个节点都像路由器一样存储和转发数据包到最终目的地。由于其动态拓扑结构,MANET可以随时随地创建。由于MANET的资源有限,因此它面临着许多问题,如安全性,有限的带宽,范围和功率的限制。因此,人们提出了许多新的路由协议。本文研究了管理拥塞控制的不同技术、安全问题、不同层的攻击、路由协议和MANET面临的挑战。
{"title":"A Novel Review on Security and Routing Protocols in MANET","authors":"Muhammad Kashif Nazir, R. Rehman, Atif Nazir","doi":"10.4236/CN.2016.84020","DOIUrl":"https://doi.org/10.4236/CN.2016.84020","url":null,"abstract":"The origin of Mobile ad hoc network (MANET) was started in 1970 as packet radio network (PRNET), later on different researches were made on it in different ages. MANET works under no fixed infrastructure in which every node works likes a router that stores and forwards packet to final destination. Due to its dynamic topology, MANET can be created anywhere, anytime. As there are limited resources in MANET so it faces many problems such as security, limited bandwidth, range and power constraints. Due to this, many new routing protocols are proposed. This article examines different techniques to manage congestion control, security issues, different layers attacks, routing protocols and challenges that are faced by MANET.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"68 7","pages":"205-218"},"PeriodicalIF":0.0,"publicationDate":"2016-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72424155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Physical Layer Deterministic Network Coding Using PUM Turbo Codes over AWGN Channel, N Nodes through a Base Station Scenario 通过基站场景,在AWGN信道、N节点上使用PUM Turbo码的物理层确定性网络编码
Hani H. Attar
Network Coding (NC) is a recent technique which is used to improve the transmission data rate and the power efficiency. These goals are obtained by combining data together before transmitting them, resulting to less transmitted data that carry the same amount of information. NC research work over the physical layer and the upper layers are popular and needed to be more investigated. In this paper, we propose a practical system of large-number of connected multi-source network coding (LMSNC), at the physical layer that exploits the broadcast nature of the wireless channel, using the practical and bandwidth-efficient schemes decode-and-forward (DF) and then compare it with Amplify and Forward (AF). The theoretical analysis and the simulation results show the effect of the noise when it cumulates in AF system and how DF is solving this severe default. Moreover, we consider the MSNC for Small-number of connected sources (SMSNC) and the two-way communication setup where two users exchange their information over an intermediate network node (ideally called Base Station), as two reference cases to compare with. With SMSNC, the number of necessary downlink transmissions from the intermediate node to the users is reduced, and thus the throughput is increased. Simulation results obtained using high-performance non-binary turbo codes, based on Partial Unit Memory (PUM) codes (4, 2, 1, 4) and (8, 4, 3, 8); confirm that combining PUM Turbo Code (PUMTC) and NC in the proposed MSNC setup gives almost the same BER performance as that for SMSNC at the small number of processing steps mainly when PUMTC (8, 4, 3, 8) is performed, which is required to retrieve the received coded messages. In the scenario of AF, combining packets results to cumulate the noise, which justifies the reason we decided to increase the number of transmitted coded messages in the network, i.e., the BER performance improves when sending extra coded messages. Finally, the possibility for a trade-off among BER, data rate and the number of transmitted coded messages is shown for LMSNC through graphics and simulation results.
网络编码(NC)是一种用于提高传输数据速率和功率效率的新技术。这些目标是通过在传输之前将数据组合在一起,从而使传输的数据较少,但携带的信息量相同。在物理层和上层的数控研究工作是流行的,需要更多的研究。在本文中,我们提出了一个实用的系统,大量连接的多源网络编码(LMSNC),在物理层利用无线信道的广播性质,使用实用和带宽高效的解码和转发(DF)方案,然后与放大和转发(AF)进行比较。理论分析和仿真结果显示了噪声在自动对焦系统中积累时的影响,以及DF如何解决这种严重的默认情况。此外,我们考虑了用于少量连接源的MSNC (SMSNC)和双向通信设置,其中两个用户通过中间网络节点(理想情况下称为基站)交换他们的信息,作为两个参考案例进行比较。使用SMSNC,减少了从中间节点到用户的必要下行传输次数,从而提高了吞吐量。基于部分单元存储器(PUM)码(4,2,1,4)和(8,4,3,8)的高性能非二进制turbo码的仿真结果;在MSNC设置中,结合PUM Turbo Code (PUMTC)和NC,在少量处理步骤下,主要是在执行PUMTC(8,4,3,8)时,获得与SMSNC几乎相同的误码率性能,这需要检索接收到的编码消息。在AF场景中,将分组结果组合在一起会累积噪声,这就是我们决定增加网络中传输的编码消息数量的原因,即发送额外的编码消息会提高BER性能。最后,通过图形和仿真结果显示了LMSNC在误码率、数据速率和传输编码报文数之间进行权衡的可能性。
{"title":"Physical Layer Deterministic Network Coding Using PUM Turbo Codes over AWGN Channel, N Nodes through a Base Station Scenario","authors":"Hani H. Attar","doi":"10.4236/CN.2016.84022","DOIUrl":"https://doi.org/10.4236/CN.2016.84022","url":null,"abstract":"Network Coding (NC) is a recent technique which is used to improve the transmission data rate and the power efficiency. These goals are obtained by combining data together before transmitting them, resulting to less transmitted data that carry the same amount of information. NC research work over the physical layer and the upper layers are popular and needed to be more investigated. In this paper, we propose a practical system of large-number of connected multi-source network coding (LMSNC), at the physical layer that exploits the broadcast nature of the wireless channel, using the practical and bandwidth-efficient schemes decode-and-forward (DF) and then compare it with Amplify and Forward (AF). The theoretical analysis and the simulation results show the effect of the noise when it cumulates in AF system and how DF is solving this severe default. Moreover, we consider the MSNC for Small-number of connected sources (SMSNC) and the two-way communication setup where two users exchange their information over an intermediate network node (ideally called Base Station), as two reference cases to compare with. With SMSNC, the number of necessary downlink transmissions from the intermediate node to the users is reduced, and thus the throughput is increased. Simulation results obtained using high-performance non-binary turbo codes, based on Partial Unit Memory (PUM) codes (4, 2, 1, 4) and (8, 4, 3, 8); confirm that combining PUM Turbo Code (PUMTC) and NC in the proposed MSNC setup gives almost the same BER performance as that for SMSNC at the small number of processing steps mainly when PUMTC (8, 4, 3, 8) is performed, which is required to retrieve the received coded messages. In the scenario of AF, combining packets results to cumulate the noise, which justifies the reason we decided to increase the number of transmitted coded messages in the network, i.e., the BER performance improves when sending extra coded messages. Finally, the possibility for a trade-off among BER, data rate and the number of transmitted coded messages is shown for LMSNC through graphics and simulation results.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"17 1","pages":"241-256"},"PeriodicalIF":0.0,"publicationDate":"2016-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81701226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Web Threats Detection and Prevention Framework Web威胁检测和预防框架
Osama Rababah, A. K. Hwaitat, S. Manaseer, H. Fakhouri, R. Halaseh
The rapid advancement in technology and the increased number of web applications with very short turnaround time caused an increased need for protection from vulnerabilities that grew due to decision makers overlooking the need to be protected from attackers or software developers lacking the skills and experience in writing secure code. Structured Query Language (SQL) Injection, cross-site scripting (XSS), Distributed Denial of service (DDos) and suspicious user behaviour are some of the common types of vulnerabilities in web applications by which the attacker can disclose the web application sensitive information such as credit card numbers and other confidential information. This paper proposes a framework for the detection and prevention of web threats (WTDPF) which is based on preventing the attacker from gaining access to confidential data by studying his behavior during the action of attack and taking preventive measures to reduce the risks of the attack and as well reduce the consequences of such malicious action. The framework consists of phases which begin with the input checking phase, signature based action component phase, alert and response phases. Additionally, the framework has a logging functionality to store and keep track of any action taking place and as well preserving information about the attacker IP address, date and time of the attack, type of the attack, and the mechanism the attacker used. Moreover, we provide experimental results for different kinds of attacks, and we illustrate the success of the proposed framework for dealing with and preventing malicious actions.
技术的快速发展和周转时间非常短的web应用程序数量的增加导致对漏洞保护的需求增加,这是由于决策者忽视了对攻击者或缺乏编写安全代码的技能和经验的软件开发人员的保护需求而增加的。结构化查询语言(SQL)注入、跨站脚本(XSS)、分布式拒绝服务(DDos)和可疑用户行为是web应用程序中一些常见的漏洞类型,攻击者可以通过这些漏洞泄露web应用程序的敏感信息,如信用卡号码和其他机密信息。本文提出了一种web威胁检测与预防框架(WTDPF),该框架通过研究攻击者在攻击过程中的行为,防止攻击者获取机密数据,并采取预防措施,以降低攻击的风险,减少恶意行为的后果。该框架由以下几个阶段组成:输入检查阶段、基于签名的动作组件阶段、警报和响应阶段。此外,该框架还具有日志记录功能,用于存储和跟踪正在发生的任何操作,并保存有关攻击者的IP地址、攻击日期和时间、攻击类型以及攻击者使用的机制的信息。此外,我们还提供了针对不同类型攻击的实验结果,并说明了所提出的框架在处理和防止恶意行为方面的成功。
{"title":"Web Threats Detection and Prevention Framework","authors":"Osama Rababah, A. K. Hwaitat, S. Manaseer, H. Fakhouri, R. Halaseh","doi":"10.4236/cn.2016.83017","DOIUrl":"https://doi.org/10.4236/cn.2016.83017","url":null,"abstract":"The rapid advancement in technology and the increased number of web applications with very \u0000short turnaround time caused an increased need for protection from vulnerabilities that grew due \u0000to decision makers overlooking the need to be protected from attackers or software developers \u0000lacking the skills and experience in writing secure code. Structured Query Language (SQL) Injection, \u0000cross-site scripting (XSS), Distributed Denial of service (DDos) and suspicious user behaviour \u0000are some of the common types of vulnerabilities in web applications by which the attacker can \u0000disclose the web application sensitive information such as credit card numbers and other confidential \u0000information. This paper proposes a framework for the detection and prevention of web \u0000threats (WTDPF) which is based on preventing the attacker from gaining access to confidential \u0000data by studying his behavior during the action of attack and taking preventive measures to reduce \u0000the risks of the attack and as well reduce the consequences of such malicious action. The \u0000framework consists of phases which begin with the input checking phase, signature based action \u0000component phase, alert and response phases. Additionally, the framework has a logging functionality \u0000to store and keep track of any action taking place and as well preserving information about \u0000the attacker IP address, date and time of the attack, type of the attack, and the mechanism the attacker \u0000used. Moreover, we provide experimental results for different kinds of attacks, and we illustrate \u0000the success of the proposed framework for dealing with and preventing malicious actions.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"439 1","pages":"170-178"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82878377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Decentralized Traffic Control Using Agents in Ethernet Passive Optical Networks (EPON) 以太网无源光网络(EPON)中基于代理的分散流量控制
S. Sadon, H. M. Hizan, T. Kanesan, R. Mohamad
Traditionally, allocating of Ethernet Passive Optical Network (EPON) bandwidth schemes relied on a centralized architecture where their Optical Line Terminal (OLT) is the sole intelligent device with the capability for the arbitration of bandwidth based on time-division access for the upstream shared channel. However, any breakdown in the OLT bandwidth allocation will affect the allotment for Optical Network Units (ONUs). Few researches had dealt with a decentralized approach for the EPON and most of the solutions proposed involved additional cost by adding new complex devices to the original architecture. This paper proposes an intelligent decentralized mechanism in EPON that enhances the network performance using intelligent agents specification based on the IEEE 802.3 ah standards in the foundation for intelligent physical agent which is compatible with an Internet Protocol (IP)-based network. Specifically, this paper proposes a novel distributed scheme that supports differentiated services and ensures QoS for both Inter-and Intra- ONU allocation. The proposed mechanism introduces a unique direct communication between the ONUs supported by identical dynamic bandwidth allocation algorithms running simultaneously in each ONU. In addition to being fully distributed, the proposed scheme is asynchronous, scalable, and dynamic with flexibility and reliability in handling data, voice and video.
传统的以太网无源光网络(EPON)带宽分配依赖于一种集中式架构,其光线路终端(OLT)是唯一具有基于上游共享信道分时接入的带宽仲裁能力的智能设备。但是,OLT带宽分配中的任何故障都会影响光网络单元(onu)的分配。很少有研究涉及EPON的分散式方法,并且提出的大多数解决方案都涉及通过在原始架构中添加新的复杂设备来增加成本。本文提出了一种基于IEEE 802.3 ah标准的EPON智能去中心化机制,该机制在兼容基于Internet协议(IP)的网络的智能物理代理的基础上,利用智能代理规范提高网络性能。具体而言,本文提出了一种新的分布式方案,该方案既支持差异化业务,又保证了ONU间和ONU内分配的QoS。该机制引入了一种独特的ONU之间的直接通信方式,并通过在每个ONU中同时运行的相同动态带宽分配算法来支持。该方案除完全分布式外,还具有异步、可扩展和动态的特点,在处理数据、语音和视频方面具有灵活性和可靠性。
{"title":"Decentralized Traffic Control Using Agents in Ethernet Passive Optical Networks (EPON)","authors":"S. Sadon, H. M. Hizan, T. Kanesan, R. Mohamad","doi":"10.4236/CN.2016.83019","DOIUrl":"https://doi.org/10.4236/CN.2016.83019","url":null,"abstract":"Traditionally, allocating of Ethernet Passive Optical Network (EPON) bandwidth schemes relied on \u0000a centralized architecture where their Optical Line Terminal (OLT) is the sole intelligent device \u0000with the capability for the arbitration of bandwidth based on time-division access for the upstream \u0000shared channel. However, any breakdown in the OLT bandwidth allocation will affect the \u0000allotment for Optical Network Units (ONUs). Few researches had dealt with a decentralized approach \u0000for the EPON and most of the solutions proposed involved additional cost by adding new \u0000complex devices to the original architecture. This paper proposes an intelligent decentralized \u0000mechanism in EPON that enhances the network performance using intelligent agents specification \u0000based on the IEEE 802.3 ah standards in the foundation for intelligent physical agent which is \u0000compatible with an Internet Protocol (IP)-based network. Specifically, this paper proposes a novel \u0000distributed scheme that supports differentiated services and ensures QoS for both Inter-and Intra- \u0000ONU allocation. The proposed mechanism introduces a unique direct communication between the \u0000ONUs supported by identical dynamic bandwidth allocation algorithms running simultaneously in \u0000each ONU. In addition to being fully distributed, the proposed scheme is asynchronous, scalable, \u0000and dynamic with flexibility and reliability in handling data, voice and video.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"103 1","pages":"193-203"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87905356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense ARP (Address Resolution Protocol,地址解析协议):欺骗攻击及防御建议
G. A. Sukkar, Ramzi R. Saifan, Sufian M Khwaldeh, M. Maqableh, I. Jafar
Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the process of establishing these networks. Nevertheless, security-wise precautions were not taken in some of them. In this paper, we expose some of the vulnerability that exists in a commonly and widely used network protocol, the Address Resolution Protocol (ARP) protocol. Effectively, we will implement a user friendly and an easy-to-use tool that exploits the weaknesses of this protocol to deceive a victim’s machine and a router through creating a sort of Man-in-the-Middle (MITM) attack. In MITM, all of the data going out or to the victim machine will pass first through the attacker’s machine. This enables the attacker to inspect victim’s data packets, extract valuable data (like passwords) that belong to the victim and manipulate these data packets. We suggest and implement a defense mechanism and tool that counters this attack, warns the user, and exposes some information about the attacker to isolate him. GNU/Linux is chosen as an operating system to implement both the attack and the defense tools. The results show the success of the defense mechanism in detecting the ARP related attacks in a very simple and efficient way.
网络已经成为当今世界不可分割的一部分。易于部署、低成本和高数据速率是它们受欢迎的重要原因。有许多专为简化建立这些网络的过程而定制的协议。然而,其中一些国家并没有采取明智的安全预防措施。在本文中,我们揭示了一个普遍和广泛使用的网络协议,地址解析协议(ARP)协议中存在的一些漏洞。实际上,我们将实现一个用户友好且易于使用的工具,利用该协议的弱点,通过创建一种中间人(MITM)攻击来欺骗受害者的机器和路由器。在MITM中,所有流出或到达受害机器的数据都将首先通过攻击者的机器。这使得攻击者能够检查受害者的数据包,提取属于受害者的有价值的数据(如密码)并操纵这些数据包。我们建议并实现一种防御机制和工具来对抗这种攻击,警告用户,并公开有关攻击者的一些信息以隔离他。选择GNU/Linux作为操作系统来实现攻击和防御工具。实验结果表明,该防御机制能够以一种简单有效的方式检测出ARP相关的攻击。
{"title":"Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense","authors":"G. A. Sukkar, Ramzi R. Saifan, Sufian M Khwaldeh, M. Maqableh, I. Jafar","doi":"10.4236/CN.2016.83012","DOIUrl":"https://doi.org/10.4236/CN.2016.83012","url":null,"abstract":"Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the process of establishing these networks. Nevertheless, security-wise precautions were not taken in some of them. In this paper, we expose some of the vulnerability that exists in a commonly and widely used network protocol, the Address Resolution Protocol (ARP) protocol. Effectively, we will implement a user friendly and an easy-to-use tool that exploits the weaknesses of this protocol to deceive a victim’s machine and a router through creating a sort of Man-in-the-Middle (MITM) attack. In MITM, all of the data going out or to the victim machine will pass first through the attacker’s machine. This enables the attacker to inspect victim’s data packets, extract valuable data (like passwords) that belong to the victim and manipulate these data packets. We suggest and implement a defense mechanism and tool that counters this attack, warns the user, and exposes some information about the attacker to isolate him. GNU/Linux is chosen as an operating system to implement both the attack and the defense tools. The results show the success of the defense mechanism in detecting the ARP related attacks in a very simple and efficient way.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"3 1","pages":"118-130"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89925716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1