International Journal of Computer Networks and Communications Security

Volume 5, Issue 12, December 2017

 

 

Standard Transcranial Direct Current Stimulation (tDCS) Model
 

Standard Transcranial Direct Current Stimulation (tDCS) Model

Pages: 264-270 (7) | [Full Text] PDF (624 KB)
MU Sourav, A Rahman, AA Mamun, FM Alamgir
Student of Electrical & Electronic Engineering, East West University, Dhaka, Bangladesh
Graduated from Electrical & Electronic Engineering, East West University, Dhaka, Bangladesh
Faculty of Electrical & Electronic Engineering, East West University, Dhaka, Bangladesh

Abstract -
TDCS, the Transcranial Direct Current Stimulation is a non-invasive, painless brain stimulation treatment. It was originally developed to help patients who suffer from brain injuries or psychiatric conditions like major depressive disorder. We made advance tDCS device that can pass a little amount of current ranging between 0.1-2.5 mA at a voltage range ±0.064 voltage within the brain scalps as well as store the stimulation data in real time. In this device, we introduced a flexible headband which can easily fit everyones head. This headband consists of two electrodes by which current is passed through the brain. We have developed an android application to control the current flow of the device smartly. It can be add new dimension in neurostimulation process.
 
Index Terms - Transcranial Direct Current Stimulation, tDCS, neurostimulation, electrodes, flexible headband, LM334, tDCS android app, MATLAB

Citation - MU Sourav, A Rahman, AA Mamun, FM Alamgir. "Standard Transcranial Direct Current Stimulation (tDCS) Model." International Journal of Computer Networks and Communications Security 5, no. 12 (2017): 264-270.

Simulation-Based Proportional Study of Routing Protocols for MANET
 

Simulation-Based Proportional Study of Routing Protocols for MANET

Pages: 271-276 (6) | [Full Text] PDF (1.24 MB)
F Ahmed, FM Alamgir
Graduate Teaching Assistant, Department of Electrical and Electronic Engineering, East West University, Dhaka, Bangladesh
Senior Lecturer, Department of Electrical and Electronic Engineering, East West University, Dhaka, Bangladesh

Abstract -
Wireless ad-hoc networks lately increased huge research consideration because of their huge capability of uses in numerous fields. Multihop routing is an imperative viewpoint which decides, to a substantial degree, the general execution of the system. A number of routing protocols have been proposed for routing in wireless ad-hoc networks with the focus on optimizing different aspects of the network routing. This paper focuses on studying two popular protocols for wireless networks: Ad-hoc On-Demand Distance Vector (AODV) and Optimized Link-State Routing (OLSR). The two protocols belong to different classes of routing categorization. The technical aspects of the two protocols is studied while highlighting the differences between the two and simulation-based performance comparison of the two protocols is carried out under varying traffic, mobility and network conditions using the Network Simulator.
 
Index Terms - Wireless Ad-hoc network, routing protocol, Network Simulator, AODV, OLSR

Citation - F Ahmed, FM Alamgir. "Simulation-Based Proportional Study of Routing Protocols for MANET." International Journal of Computer Networks and Communications Security 5, no. 12 (2017): 271-276.

Detection and Defense against Distributed Denial of Service Attack Using Packet Filtration in Wireless Sensor Networks
 

Detection and Defense against Distributed Denial of Service Attack Using Packet Filtration in Wireless Sensor Networks

Pages: 277-284 (8) | [Full Text] PDF (445 KB)
TA Ahanger, A Aljumah
College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Saudi Arabia

Abstract -
Ranging from household to health to battlefield plays a significant role in many useful applications. Due to the distinctive feature of region and selforganizing, WSN (regarded as resource constraint type of network), is formed by a group of sensor nodes to detect physical phenomenon like light, heat, pressure with processing ability. Due to their resource constraint characteristics of limited memory and energy they are vulnerable to many cyber threats and attacks. The most common possible threat is DDoS. These attacks flood target with plentiful fake packets in order to drain the battery, prevent the genuine packets to pass thru and thwart the legitimate user to get the desired response. In this research article, we propose a detection and defense mechanism using packet filtration which deploys mitigation constraints to save the wireless sensor networks from the causes of DDoS.
 
Index Terms - DDoS, WSN, Cyber Attack

Citation - TA Ahanger, A Aljumah. "Detection and Defense against Distributed Denial of Service Attack Using Packet Filtration in Wireless Sensor Networks." International Journal of Computer Networks and Communications Security 5, no. 12 (2017): 277-284.