International Journal of Computer Networks and Communications Security

Volume 1, Issue 5, October 2013

 

 

 

One Way Direction Communication Synchronization for WideMac Protocol in IR-UWB based WSN

Pages: 173-179 (7) | [Full Text] PDF (959 KB)
Anouar Darif, Rachid Saadane and Driss Aboutajdine
LRIT-GSCM Associated Unit to CNRST (URAC 29) FSR, Mohammed V-Agdal University, BP 1014 Rabat, Morocco
SIR2C2S/LASI-EHTP, Hassania School of Public Labors Km 7 El Jadida Road, B.P 8108, Casa-Oasis, Casablanca, Morocco

Abstract -
IR-UWB technology as a next generation of the IEEE802.15.4 standard is a promising solutions for WSN due to its various advantages such as its robustness to severe multipath fading even in indoor environments, its low cost and complexity, and low energy consumption. To implement such a solution, we need a suitable Mac protocol to exploit the specific features of this technology. WideMac was presented as a novel MAC protocol designed for wireless sensor networks using impulse radio ultra wide band transceivers due to its low power consumption. Because of the luck of synchronization in this protocol, this paper will present a solution for the synchronization problem when there is only one way direction communication.
 
Index Terms - WSN, IEEE802.15.4A, IR-UWB, WideMac, Synchronization, Packets delivery
 

Biometric(s) Detection and Steganography

Pages: 180-88 (9) | [Full Text] PDF (3.51 MB)
Sara Kh. Ayoub and Dr. Ahmed S. Nori
Computer Science Dept. College of Computer Science and Mathematics Iraq, Mosul, Mosul University

Abstract -
The term (biometrics) is derived from the Greek words bio means (life) and metric means (to measure). In this paper, a detailed experimental study of physiology biometrics (face, iris) detection, face detection algorithms based on “Skin Color” has been made. Three color spaces RGB, YCbCr and HSI are of main concern. We have compared the algorithms based on these color spaces and have combined them to get a new skin color based face detection algorithm which gives higher accuracy. Use morphology for iris detection, after detection extract feature use PCA algorithm and steganography using Logical exclusive-XOR.
 
Index Terms - Biometric, Detection, Feature Extraction, Steganography
 

A Study on Analysis of SMS Classification Using TF-IDF weighting

Pages: 189-194 (6) | [Full Text] PDF (2.18 MB)
Dr. Ghayda A. Al-Talib and Hind S. Hassan
Dept. of Computer Sciences, College of Mathematics and Computer sciences, University of Mosul, Mosul, Iraq

Abstract -
SMS classifying technology has important significance to assist people in dealing with SMS messages. Although sms classification can be performed with little or no effort by people, it still remains difficult for computers. Machine learning offers a promising approach to the design of algorithms for training computer programs to efficiently and accurately classify short text message data.. In this paper we introduce a weighting method based on statistical estimation of the importance of a word for an SMS categorization problem, which will classify Mobile SMS into predefined classes such as occasions, friendship, sales etc. All sms are converted into text documents. After preprocessing vector space model is prepared and weight is assigned to each term. This weighting method based on statistical estimation of the importance of a word for an SMS categorization problem. The experiments reported in the paper shows that this weighting method improves significantly the classification accuracy as measured on many categorization tasks.
 
Index Terms - Data Mining, text Classification, SMS, vector space model, TF-IDF Technique
 

E-Learning-Based Trainings for Expenditure Treasurers

Pages: 195-200 (6) | [Full Text] PDF (455 KB)
Rahmawati and Mila Mumpuni
A Lecturer at economics Faculty Sebelas Maret University Surakarta, Indonesia
A Trainer at the Finance Education and Training Center, Indonesia

Abstract -
The fulfillment of the functional personnel as Expenditure Treasurers becomes the target of not only central government offices but also local government offices. The legal foundation of the reform of the government’s financial management making a treasurer a functional position opens an opportunity for the development of a civil servant’s career. The pattern of trainings for expenditure treasurers in education and training centers is still oriented to classroom learning. The target of fulfilling functional personnel through training in terms of quantity and quality has to be attained immediately. The development of information technology in the field of education makes information-technology-based training patterns possible. An e-learning model can become a form of training for treasures in the future. The advantages of e-learning serve as an attempt to minimize the pattern that has been applied in the training so far. E-learning can be only a dream if there is no willingness on the part of the participants, instructors, and education and training institutions to change the training pattern. However, it can be the best solution in the future as an efficient and effective training pattern.
 
Index Terms - Education and Training, Expenditure Treasurer, E-learning
 

Analysis the MAC Protocol of IEEE 802.11 Wireless LAN

Pages: 201-209 (9) | [Full Text] PDF (1.4 MB)
Md. Mizanur Rahman, Farhana Enam
Department of ICE, University of Rajshahi, Bangladesh
Assistant Professor, Department of ICE, University of Rajshahi, Bangladesh

Abstract -
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. The architecture of the IEEE 802.11 WLAN is designed to support a network where most decision making is distributed to the mobile striation. The first, IEEE Standard 802.11a, is an orthogonal frequency domain multiplexing (OFDM) radio in the UNII bands, delivering up to 54 Mbps data rates. The second, IEEE Standard 802.11b is an extension to the DSSS PHY in the 2.4 GHz band, delivering up to 11 Mbps data rates. In this Project study the main emphasis has been given to the MAC layer of the Wireless LAN IEEE 802.11 MAC Protocol. Also the physical layer of the Wireless LAN IEEE 802.11 MAC Protocol has been described. The implementation of the Wireless IEEE 802.11 MAC Protocol is observed through a simulation.
 
Index Terms - WLAN, MAC Protocol, CSMA/CD, MAC Frame Format, IEEE802.11