

Control and Modeling of Wind Turbines Using Genetic Algorithms and Support Vector Machines for Regression |
Pages: 235-243 (9) | [Full Text] PDF (926 KB) |
L Rajae and B Ismail |
Department of computer science, LESSI Laboratory, University of sidi Mohammed ben Abdellah, Faculty of sciences Dhar Mehraz, Fez, Morocco |
Abstract - In this work, a hybrid approach based on the Support Vector machines (SVM) and genetic algorithms (GA) is developed. The SVM are learning machines that can perform binary classification and real value function approximation (regression estimation) tasks. This tool of the artificial intelligence founded on the theory of the statistical learning was selected for its great capacity of training and generalization. Since its difficult to fund an explicit relation between such conditions and parameters, the SVM are used to approximate this relation, through their training from examples. To optimize the configuration of our approach, namely the structure which gives us the most precise result in terms of error of prediction, we used the genetic algorithms for the choice of hyper-parameters of the SVM. |
Index Terms - Variable Speed wind Turbine, Sliding Mode Control, Genetic Algorithm, Support Vector Machines |
C itation - L Rajae and B Ismail. "Control and Modeling of Wind Turbines Using Genetic Algorithms and Support Vector Machines for Regression." International Journal of Computer Networks and Communications Security 3, no. 6 (2015): 235-243. |
Review: Advantages and Disadvantages of Mikrotik Nstreme Protocols on Wireless Networks |
Pages: 244-247 (4) | [Full Text] PDF (471 KB) |
NCC GHORBANI |
Sama Technical and Vocational Training College, Islamic Azad University, Branch Of Omidiyeh, khoozestan, Iran |
Abstract - Today, Wireless communication has a special place in the communications, as well as between the different methods, such as wired and optical communications, etc. is important and Some of the things that makes this enormous growth is more affordable than some of these methods, portability, installation and rapid implementation, quality and no need for physical but this method also has its own problems, is still, If at this stage we ignore some security problems, lack of communication bandwidth is a major problem facing the problem of distance communication also seen higher, In this regard, the researchers also found several solutions have been proposed, some of which follow the general protocol and some specifically for Wi-Fi connection is created between a manufacturer of products, this article reviews the nstreme protocol that created by mikrotik and comparison it by 802.11 protocol and flaws and strengths of each expressed. |
Index Terms - Mikrotik, Polling, Nstreme, 802.11, CSMA/CA, Mac Polling |
C itation - NCC GHORBANI. "Review: Advantages and Disadvantages of Mikrotik Nstreme Protocols on Wireless Networks." International Journal of Computer Networks and Communications Security 3, no. 6 (2015): 244-247. |
Generate Quantum Key by Using Quantum Shift Register |
Pages: 248-252 (5) | [Full Text] PDF (267 KB) |
RZ KHALAF and AA ABDULLAH |
Department of Mathematics, Eastern Mediterranean University, North Cyprus, TurkeyDepartment of Computer, Eastern Mediterranean University, North Cyprus, Turkey |
Abstract - In this paper we introduce a new fashion of quantum LFSR-based stream cipher. The basic component of LFSR based stream cipher is the LFSR (linear feedback shift register), so we describe how to build a quantum LFSR using the basic quantum gates. We have shown in our paper that this linear complexity ,period and statistical properties are identical with the classic case .We suggest a quantum stream cipher algorithm which can be built and worked in the quantum environment. |
Index Terms - Quantum Computation, Quantum Cryptography, Quantum Shift Register, Linear Feedback Shift Register, Stream Cipher |
C itation - RZ KHALAF and AA ABDULLAH. "Generate Quantum Key by Using Quantum Shift Register." International Journal of Computer Networks and Communications Security 3, no. 6 (2015): 248-252. |
Optimal Scheduling In Cloud Computing Environment Using the Bee Algorithm |
Pages: 253-258 (6) | [Full Text] PDF (324 KB) |
N HESABIAN, HHS JAVADI |
Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Boroujerd, IranDepartment of Computer Engineering, Boroujerd Branch, Islamic Azad University, Boroujerd, IranDepartment of Applied Mathematics, Faculty of Mathematics and Computer Science, Shahed University, Tehran, Iran |
Abstract - Cloud computing has made a fundamental change in the way of strange information and data and implementation of application progress. Everything is hosted on a cloud that is a set of several servers and computer, which can be accessed through internet instead of placing data and application programs on a personal computer. The challenge of cloud computing system is dedicating the resources to the system requests. Dedicating resources to the requests is a NP-complete problem due to requests and resource dynamics. In recent year, one of the most important and promising method to solve such problems is innovatin methods inspired from the nature. These methods are similar to the social or natural system. In this article, we want to use honeybee colony algorithm for resources scheduling. This algorithm is an optimization method based on swarm intelligence and intelligent behavior of honeybee population. Honeybee algorithm involves a group based on search algorithm. |
Index Terms - Cloud Computing, Scheduling, Resource Dedication, Honeybee Algorithm |
C itation - N HESABIAN, HHS JAVADI. "Optimal Scheduling In Cloud Computing Environment Using the Bee Algorithm." International Journal of Computer Networks and Communications Security 3, no. 6 (2015): 253-258. |
Illustrative Analysis of Throughput Variations for Indian Broadband Users |
Pages: 259-263 (5) | [Full Text] PDF (REMOVED) |
D Shekhawat, S Guha, T Prasad, N Goveas, B Deshpande |
Department of Computer Science & Information Systems, BITS Pilani - K K Birla Goa Campus, Goa, India - 403726 |
Abstract - Broadband Internet user base is growing at an exponential pace in India. The Internet service providers (ISPs) are bringing ever faster broadband service offering to market. The service expectations of aspiring users are outpacing the service offerings from ISPs. The market pressures are forcing ISPs to sell their service offerings more aggressively, resulting in a growing discrepancy between consumer expectations and service offerings from ISPs. This discrepancy is often evident in experienced vs offered Internet connection throughput. We analyze the throughput variations for Internet connections of Indian broadband users. We use network diagnostic test (NDT) data set provided by measurement lab (M-lab) for the analysis. Our analysis shows significant increase in maximum and average Internet connection throughput values. The uptrend in throughput is experienced by both rural and urban users. We also analyze per-ISP user throughput trends and find that most Indian ISPs meet the minimum broadband speed requirements set by the regulators. |
Index Terms - NDT, Measurement Lab, GMT, Throughput Analysis, ISP, BigQuery, Broadband, TRAI |
C itation - D Shekhawat, S Guha, T Prasad, N Goveas, B Deshpande. "Illustrative Analysis of Throughput Variations for Indian Broadband Users." International Journal of Computer Networks and Communications Security 3, no. 6 (2015): 259-263. |
Symmetric Key Encryption Using AES-GCM and External Key Derivation for Smart Phones |
Pages: 264-270 (7) | [Full Text] PDF (702 KB) |
AM Almorabea, MA Aslam |
King Abdulaziz University, Department of Information System, Jeddah, Saudi Arabia |
Abstract - Information is one of the most important resources for organizations as well as for individuals. Keeping the information (e.g. credit card information, images that represent organizational internal processes, organizational strategic documents etc.) secured from unauthorized resources is becoming one of the key challenges of the current age, especially when information is being exchanged very frequently over the Internet. For many years people are concern with privacy and security but with this revelation of information and the social networks privacy became real concern. One of the main reasons is that when we share the information (in the form of images or documents) with our known contacts then actually we are also sharing the information with the telecommunication companies and the company that provide the software. In this paper we present a symmetric key encryption based solution for information privacy and security. Our approach is based on Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) to ensure confidentiality and integrity of the encrypted information. We used several techniques regarding the key derivation function to ensure the strength of the key that will be used in the encryption process. Our encryption process makes use of nonce to randomize outputs at different stages of the encryption process and hence maximizing the security measures. We have also developed an application (i.e. Crypto Ghost) which is available as a standalone application as well as information security utility that works at backend of different information exchange applications and social media applications. We also present the security analysis of the encrypted information and the performance of the key derivation functions in limited resources like smart phones. |
Index Terms - Security, Cryptography, Symmetric Key, Encryption, AES GCM |
C itation - AM Almorabea, MA Aslam. "Symmetric Key Encryption Using AES-GCM and External Key Derivation for Smart Phones." International Journal of Computer Networks and Communications Security 3, no. 6 (2015): 264-270. |