International Journal of Computer Networks and Communications Security

Volume 3, Issue 6, June 2015

 

 

 

Control and Modeling of Wind Turbines Using Genetic Algorithms and Support Vector Machines for Regression

Pages: 235-243 (9) | [Full Text] PDF (926 KB)
L Rajae and B Ismail
Department of computer science, LESSI Laboratory, University of sidi Mohammed ben Abdellah, Faculty of sciences Dhar Mehraz, Fez, Morocco

Abstract -
In this work, a hybrid approach based on the Support Vector machines (SVM) and genetic algorithms (GA) is developed. The SVM are learning machines that can perform binary classification and real value function approximation (regression estimation) tasks. This tool of the artificial intelligence founded on the theory of the statistical learning was selected for its great capacity of training and generalization. Since its difficult to fund an explicit relation between such conditions and parameters, the SVM are used to approximate this relation, through their training from examples. To optimize the configuration of our approach, namely the structure which gives us the most precise result in terms of error of prediction, we used the genetic algorithms for the choice of hyper-parameters of the SVM.
 
Index Terms - Variable Speed wind Turbine, Sliding Mode Control, Genetic Algorithm, Support Vector Machines

Citation - L Rajae and B Ismail. "Control and Modeling of Wind Turbines Using Genetic Algorithms and Support Vector Machines for Regression." International Journal of Computer Networks and Communications Security 3, no. 6 (2015): 235-243.

 

Review: Advantages and Disadvantages of Mikrotik Nstreme Protocols on Wireless Networks

Pages: 244-247 (4) | [Full Text] PDF (471 KB)
NCC GHORBANI
Sama Technical and Vocational Training College, Islamic Azad University, Branch Of Omidiyeh, khoozestan, Iran

Abstract -
Today, Wireless communication has a special place in the communications, as well as between the different methods, such as wired and optical communications, etc. is important and Some of the things that makes this enormous growth is more affordable than some of these methods, portability, installation and rapid implementation, quality and no need for physical but this method also has its own problems, is still, If at this stage we ignore some security problems, lack of communication bandwidth is a major problem facing the problem of distance communication also seen higher, In this regard, the researchers also found several solutions have been proposed, some of which follow the general protocol and some specifically for Wi-Fi connection is created between a manufacturer of products, this article reviews the nstreme protocol that created by mikrotik and comparison it by 802.11 protocol and flaws and strengths of each expressed.
 
Index Terms - Mikrotik, Polling, Nstreme, 802.11, CSMA/CA, Mac Polling

Citation - NCC GHORBANI. "Review: Advantages and Disadvantages of Mikrotik Nstreme Protocols on Wireless Networks." International Journal of Computer Networks and Communications Security 3, no. 6 (2015): 244-247.

 

Generate Quantum Key by Using Quantum Shift Register

Pages: 248-252 (5) | [Full Text] PDF (267 KB)
RZ KHALAF and AA ABDULLAH
Department of Mathematics, Eastern Mediterranean University, North Cyprus, Turkey
Department of Computer, Eastern Mediterranean University, North Cyprus, Turkey

Abstract -
In this paper we introduce a new fashion of quantum LFSR-based stream cipher. The basic component of LFSR based stream cipher is the LFSR (linear feedback shift register), so we describe how to build a quantum LFSR using the basic quantum gates. We have shown in our paper that this linear complexity ,period and statistical properties are identical with the classic case .We suggest a quantum stream cipher algorithm which can be built and worked in the quantum environment.
 
Index Terms - Quantum Computation, Quantum Cryptography, Quantum Shift Register, Linear Feedback Shift Register, Stream Cipher

Citation - RZ KHALAF and AA ABDULLAH. "Generate Quantum Key by Using Quantum Shift Register." International Journal of Computer Networks and Communications Security 3, no. 6 (2015): 248-252.

 

Optimal Scheduling In Cloud Computing Environment Using the Bee Algorithm

Pages: 253-258 (6) | [Full Text] PDF (324 KB)
N HESABIAN, HHS JAVADI
Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Boroujerd, Iran
Department of Computer Engineering, Boroujerd Branch, Islamic Azad University, Boroujerd, Iran
Department of Applied Mathematics, Faculty of Mathematics and Computer Science, Shahed University, Tehran, Iran

Abstract -
Cloud computing has made a fundamental change in the way of strange information and data and implementation of application progress. Everything is hosted on a cloud that is a set of several servers and computer, which can be accessed through internet instead of placing data and application programs on a personal computer. The challenge of cloud computing system is dedicating the resources to the system requests. Dedicating resources to the requests is a NP-complete problem due to requests and resource dynamics. In recent year, one of the most important and promising method to solve such problems is innovatin methods inspired from the nature. These methods are similar to the social or natural system. In this article, we want to use honeybee colony algorithm for resources scheduling. This algorithm is an optimization method based on swarm intelligence and intelligent behavior of honeybee population. Honeybee algorithm involves a group based on search algorithm.
 
Index Terms - Cloud Computing, Scheduling, Resource Dedication, Honeybee Algorithm

Citation - N HESABIAN, HHS JAVADI. "Optimal Scheduling In Cloud Computing Environment Using the Bee Algorithm." International Journal of Computer Networks and Communications Security 3, no. 6 (2015): 253-258.

 

Illustrative Analysis of Throughput Variations for Indian Broadband Users

Pages: 259-263 (5) | [Full Text] PDF (REMOVED)
D Shekhawat, S Guha, T Prasad, N Goveas, B Deshpande
Department of Computer Science & Information Systems, BITS Pilani - K K Birla Goa Campus, Goa, India - 403726

Abstract -
Broadband Internet user base is growing at an exponential pace in India. The Internet service providers (ISPs) are bringing ever faster broadband service offering to market. The service expectations of aspiring users are outpacing the service offerings from ISPs. The market pressures are forcing ISPs to sell their service offerings more aggressively, resulting in a growing discrepancy between consumer expectations and service offerings from ISPs. This discrepancy is often evident in experienced vs offered Internet connection throughput. We analyze the throughput variations for Internet connections of Indian broadband users. We use network diagnostic test (NDT) data set provided by measurement lab (M-lab) for the analysis. Our analysis shows significant increase in maximum and average Internet connection throughput values. The uptrend in throughput is experienced by both rural and urban users. We also analyze per-ISP user throughput trends and find that most Indian ISPs meet the minimum broadband speed requirements set by the regulators.
 
Index Terms - NDT, Measurement Lab, GMT, Throughput Analysis, ISP, BigQuery, Broadband, TRAI

Citation - D Shekhawat, S Guha, T Prasad, N Goveas, B Deshpande. "Illustrative Analysis of Throughput Variations for Indian Broadband Users." International Journal of Computer Networks and Communications Security 3, no. 6 (2015): 259-263.

 

Symmetric Key Encryption Using AES-GCM and External Key Derivation for Smart Phones

Pages: 264-270 (7) | [Full Text] PDF (702 KB)
AM Almorabea, MA Aslam
King Abdulaziz University, Department of Information System, Jeddah, Saudi Arabia

Abstract -
Information is one of the most important resources for organizations as well as for individuals. Keeping the information (e.g. credit card information, images that represent organizational internal processes, organizational strategic documents etc.) secured from unauthorized resources is becoming one of the key challenges of the current age, especially when information is being exchanged very frequently over the Internet. For many years people are concern with privacy and security but with this revelation of information and the social networks privacy became real concern. One of the main reasons is that when we share the information (in the form of images or documents) with our known contacts then actually we are also sharing the information with the telecommunication companies and the company that provide the software. In this paper we present a symmetric key encryption based solution for information privacy and security. Our approach is based on Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) to ensure confidentiality and integrity of the encrypted information. We used several techniques regarding the key derivation function to ensure the strength of the key that will be used in the encryption process. Our encryption process makes use of nonce to randomize outputs at different stages of the encryption process and hence maximizing the security measures. We have also developed an application (i.e. Crypto Ghost) which is available as a standalone application as well as information security utility that works at backend of different information exchange applications and social media applications. We also present the security analysis of the encrypted information and the performance of the key derivation functions in limited resources like smart phones.
 
Index Terms - Security, Cryptography, Symmetric Key, Encryption, AES GCM

Citation - AM Almorabea, MA Aslam. "Symmetric Key Encryption Using AES-GCM and External Key Derivation for Smart Phones." International Journal of Computer Networks and Communications Security 3, no. 6 (2015): 264-270.