• Home
  • Login
  • Register

HOME / ENGINEERING AND TECHNOLOGY / INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND INFORMATION SECURITY (IJCNIS) / Volume 9 / ISSUE NO 1

INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND INFORMATION SECURITY (IJCNIS)

SEPCS: Prolonging Stability Period of Wireless Sensor Networks using Compressive Sensing

Author(s): Dina Omar, Ahmed Khedr

Keyword(s): Cluster-based, Compressive sensing, Stability period, Network lifetime, Wireless sensor networks

Abstract | Download PDF | Website Link

Modified SHA1: A Hashing Solution to Secure Web Applications through Login Authentication

Author(s): Esmael Verano Maliberan

Keyword(s): SHA1, hashing, client-server communication, modified SHA1, hacking, brute force, rainbow table

Abstract | Download PDF | Website Link

A Rate Control Model of MPEG-4 Encoder for Video Transmission over Wireless Sensor Network

Author(s): Farizah Yunus, Nor-Syahidatul N. Ismail, Sharifah H. S. Ariffin, S. K. Syed-Yusof

Keyword(s): IEEE 802.15.4 standard, Wireless Sensor Network (WSN), MPEG-4, Rate control, Video encoding, Quantization scale, Frame rate and Group of Picture (GOP)

Abstract | Download PDF | Website Link

Artificial Neural Networks, Support Vector Machine And Energy Detection For Spectrum Sensing Based On Real Signals

Author(s): Mohammed Saber, Abdessamad El Rharras, Rachid Saadane, Hatim Kharraz Aroussi, Mohammed Wahbi

Keyword(s): Cognitive radio, spectrum sensing, energy detection, artificial neural networks (ANN), support vector machine (SVM), Raspberry Pi 3, 433 MHz Wireless transmitter, RTL-SDR

Abstract | Download PDF | Website Link

New Anomaly Network Intrusion Detection System in Cloud Environment Based on Optimized Back Propagation Neural Network Using Improved Genetic Algorithm

Author(s): Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El omri, Mohamed Rida

Keyword(s): Cloud Computing, Network intrusion detection system, Anomaly detection, Back propagation neural network, Optimization, Genetic algorithm

Abstract | Download PDF | Website Link

ZigBee Healthcare Monitoring System for Ambient Assisted Living Environments

Author(s): Bongisizwe Erasmus Buthelezi, Maredi Mphahlele, Deon Deon Du Plessis, Solly Maswikaneng, Topside Mathonsi

Keyword(s): NTRP, ZTR, Healthcare Monitoring Systems, Ambient Assisted Living

Abstract | Download PDF | Website Link

A Novel Secure Patient Data Transmission through Wireless Body Area Network: Health Tele-Monitoring

Author(s): A Basnet, Abeer Alsadoon, P.W.C Prasad, Omar Hisham Alsadoon, Linh Pham

Keyword(s): Data encryption, Advanced Encryption Standard, Elliptic Curve Cryptography, energy consumption, wireless body area network

Abstract | Download PDF | Website Link

Workload Cluster Balance Algorithm to Improve Wireless Sensor Network Performance

Author(s): Ahmed Jedidi

Keyword(s): Wireless sensor network, Cluster, Lifetime, Residual energy, Routing, Balance workload

Abstract | Download PDF | Website Link

Image Encryption and Decryption Using Chua’s Circuits

Author(s): Mohammed Abdullah Alsaedi

Keyword(s): Chaos, Chua circuit, Decryption, Encryption, Image processing

Abstract | Download PDF | Website Link

Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method

Author(s): Deris Stiawan, Diky Aryandi, Ahmad Heryanto, Tri Wanda Septian, Farkhana Muchtar

Keyword(s): online game, deep packet inspection, Bloom filter, traffic classification, behavior analytics, feature extraction, visualization

Abstract | Download PDF | Website Link

A Distance-Based Data-Mule Scheduling Technique for Lesser Nodal Delay in Wireless Sensor Network

Author(s): Felomino P. Alba, Enrique D. Festijo, Ruji P. Medina

Keyword(s): Data-mule scheduling, Wireless sensor network, Nodal delay, Queuing delay, Distance vector routing, Network layer

Abstract | Download PDF | Website Link

Traffic congestion prevention system

Author(s): Hamza Toulni, Mounia Miyara, Benayad Nsiri, Mohcine Boudhane

Keyword(s): Vehicular Ad-hoc Networks, traffic flow, traffic information systems, SUMO

Abstract | Download PDF | Website Link

Application-based authentication on an inter-VM traffic in a Cloud environment

Author(s): Karim Benzidane, Sâad Khoudali, Leila Fetjah, Said Jai Andaloussi, Abderrahim Sekkaki

Keyword(s): Cloud Computing, Security, Inter-VM, DPI, DPDK, Blockchain, Inter-VM traffic, Virtualization

Abstract | Download PDF | Website Link

A Hybrid Algorithm for Reliable and Energy-efficient Data Gathering in Wireless Sensor Networks

Author(s): Mohammed Falah Abood Salman, Leili Farzinvash

Keyword(s): Wireless sensor network, data gathering, reliability, Energy efficiency, clustering, intrusion detection system

Abstract | Download PDF | Website Link

Blockchain & Multi-Agent System: A New Promising Approach for Cloud Data Integrity Auditing with Deduplication

Author(s): Mohamed El Ghazouani, Moulay Ahmed El Kiram, Latifa Er-Rajy

Keyword(s): Blockchain, Integrity, Public Auditing, Deduplication, Multi-Agent Systems

Abstract | Download PDF | Website Link

Dynamic Detection of Software Defects Using Supervised Learning Techniques

Author(s): Alaa Al-Nusirat, Feras Hanandeh, Mohammad Kamel Kharabsheh, Mahmoud Al-Ayyoub, Nahla Al-dhfairi

Keyword(s): Software defects prediction, machine learning, Artificial Neural network, supervised classifiers

Abstract | Download PDF | Website Link

Dexterity for Channel Capacity Enhancement in MU-MIMO by Abrogating Interference

Author(s): Dalveer Kaur, Neeraj Kumar

Keyword(s): MU-MIMO, Linde–Lyold’s, Bernoulli distribution, channel capacity, interference, Bayes decision, Floyd Warshell, RASTA mean subtraction

Abstract | Download PDF | Website Link

CDS-MIP: CDS-based Multiple Itineraries Planning for mobile agents in wireless sensor network

Author(s): Rafat Ahmed Alhanani, Jaafar Abouchabaka, Rafalia Najat

Keyword(s): Multi-Agent, Itinerary, data aggregation, Connected Dominating set, Wireless sensor network

Abstract | Download PDF | Website Link

Evaluation of DoS attacks on Commercial Wi-Fi-Based UAVs

Author(s): Gabriel Vasconcelos, Rodrigo S. Miani, Vitor C. Guizilini, Jefferson R. Souza

Keyword(s): UAVs, Network security, Denial of service attacks, Wi-Fi

Abstract | Download PDF | Website Link

A New Variant of Game Theory Based Decision Making (GTDM) Algorithm Routing Protocols to Improve Energy Efficiency on Vehicular Delay Tolerant Network (VDTN)

Author(s): Muhammad Biben Triadi, Doan Perdana, Rendy Munadi, Li Wenzao

Keyword(s): VDTN, Energy efficiency, WDM, NVGTDM, GTDM, Epidemic, PRoPHET

Abstract | Download PDF | Website Link

A NOVEL SIMPLE AND HIGHLY SECURE METHOD FOR DATA ENCRYPTION-DECRYPTION

Author(s): Amjad Y. Hendi, Majed O. Dwairi, Ziad A. Al-Qadi, Mohamed S. Soliman

Keyword(s): AES, DES, LED, encryption time, decryption time, security level

Abstract | Download PDF | Website Link

Smart Relay Selection Scheme Based on Fuzzy Logic with Optimal Power Allocation and Adaptive Data Rate Assignment

Author(s): Nayab Taj, Mohammad Haseeb Zafar, Shakeel Ahmad Waqas, Humaira Rehman, Madini O Alassafi

Keyword(s): Relay Selection, Power Allocation, Fuzzy logic, Cooperative Networks, Adaptive Data Rate

Abstract | Download PDF | Website Link

Efficient and Secure ECDSA Algorithm and its Applications: A Survey

Author(s): Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang

Keyword(s): ECDSA, coordinate system, fault attack, scalar multiplication, Security

Abstract | Download PDF | Website Link

Review on Leakage Resilient Key Exchange Security Model

Author(s): Zheng Wei Clement Chan, Chai Wen Chuah, Janaka Alawatugoda

Keyword(s): Leakage-resilient cryptography, Key exchange protocol, Security models, Leakage attacks, Side-channel attacks, Leakage resilience

Abstract | Download PDF | Website Link

IMPLEMENTATION AND OPTIMIZATION OF RWP MOBILITY MODEL IN WSNS UNDER TOSSIM SIMULATOR

Author(s): Lyamine Guezouli, Kamel Barka, Souheila Bouam, Abdelmadjid Zidani

Keyword(s): Mobility Model, Wireless sensor network, Random Waypoint, Routing

Abstract | Download PDF | Website Link

A New Method of User Association in Wireless Mesh Networks

Author(s): G Vijaya Kumar, C Shoba Bindu

Keyword(s): Wireless Mesh Networks, AP selection, User association

Abstract | Download PDF | Website Link

EEPR-OLSR: an Energy Efficient and Path Reliability protocol for proactive MANET routing

Author(s): Abdelkabir Sahnoun, Ahmed Habbani, Jamal El Abbadi

Keyword(s): Energy Efficient, MANET, Olsr, Path Reliability

Abstract | Download PDF | Website Link

Performance Enhancement of Wearable Antenna Using High Impedance Surfaces

Author(s): Shahid Bashir, M Salman Khan, Khadim Ullah Jan, Sadiq Ullah

Keyword(s): Body Area Networks, Wearable antenna, High Impedance surface, Specific Absorption Rate, EBG, AMC

Abstract | Download PDF | Website Link

Enhanced Handover Mechanism in Long Term Evolution (LTE) Networks

Author(s): Mohsin Khan, Majid Ashraf, Haseeb Zafar, Tufail Ahmad

Keyword(s): Femtocell, Handover, interference, Macro-cell, Hand-In, Mobility Management

Abstract | Download PDF | Website Link

Cross Layered Network Condition Aware Mobile-Wireless Multimedia Sensor Network Routing Protocol for Mission Critical Communication

Author(s): A.Ajina , Mydhili K.Nair

Keyword(s): Wireless Multimedia Sensor Network, Cross Layer Architecture, Network Condition Aware Routing Protocol, QoS, Mission Critical Communication

Abstract | Download PDF | Website Link

Missing Internet Traffic Reconstruction using Compressive Sampling

Author(s): Indrarini Dyah Irawati, Andriyan Bayu Suksmono, Ian Joseph Matheus Edward

Keyword(s): missing traffic, compressive sampling, reconstruction, link sensitivity, time sensitivity

Abstract | Download PDF | Website Link

CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism

Author(s): Azuan Ahmad, Norbik Bashah Idris, Mohd Nazri Kama

Keyword(s): Cloud Computing, Information Security, Artificial Immune System, intrusion detection, dendritic cell

Abstract | Download PDF | Website Link

Impact of Environmental Influences on Multilevel Modulation Formats at the Signal Transmission in the Optical Transmission Medium

Author(s): Rastislav Róka, Pavol Šalík

Keyword(s): optical transmission medium, environmental influences, multilevel modulation formats

Abstract | Download PDF | Website Link

Optimal Path Pair Routes through Multi-Criteria Weights in Ad Hoc Network Using the Genetic Algorithm

Author(s): Nyoman Gunantara, Agus Dharma

Keyword(s): Multi-criteria optimization, scalarization, Varying weights, Genetic algorithm, Computing time

Abstract | Download PDF | Website Link

ADVANCED RANDOM TIME QUEUE BLOCKING WITH TRAFFIC PREDICTION FOR DEFENSE OF LOW-RATE DOS ATTACKS AGAINST APPLICATION SERVERS

Author(s): R.Kavitha , Dr.G.Padmavath

Keyword(s): Low-rate denial-of-service, Spatial Similarity Metric, IRTQB, Traffic prediction, Attack efficiency, Application server

Abstract | Download PDF | Website Link

Wireless DF Relaying with Beamforming for an Unmanned Aircraft System over κ−μ Fading Channels

Author(s): Ramesh Kumar, Ayaz Hussain, Abdul Aziz, Inwhee Joe

Keyword(s): Unmanned aircraft system, drone relay, dual-hop system, decode-and-forward relaying, outage probability, κ–μ fading channels

Abstract | Download PDF | Website Link

Extending Monitoring Area of Production Plant Using Synchronized Relay Node Message Scheduling

Author(s): Doan Perdana, Favian Dewanta, Ig Prasetya Dwi Wibawa

Keyword(s): Low rate, Wireless sensor network, Extending Monitoring Area, Relay nodes

Abstract | Download PDF | Website Link

Review on Radio Resource Allocation Optimization in LTE/LTE-Advanced using Game Theory

Author(s): Sanaa Oulaourf, Abdelfatteh Haidine, Abdelhak Aqqal, Hassan Ouahmane

Keyword(s): Game Theory, LTE/LTE-Advanced, 4G, Resource allocation, Optimization

Abstract | Download PDF | Website Link

cat

x

Top 10 Authors of the Journal

  • Abdessamad El Rharras
  • Mohammed Saber
  • Rachid Saadane
  • Hatim Kharraz Aroussi
  • Mohammed Wahbi
  • Sâad Khoudali
  • Karim Benzidane
  • Said Jai Andaloussi
  • Abderrahim Sekkaki
  • Leila Fetjah

About PRDB.pk

Pakistan Research Database helps individuals, professionals and institutions to access all research published in Pakistan at one platform.

  • Blog
  • CareerGuidance
  • eAdmissions
  • About Us
  • Work for PRDB
  • Contact Us
  • Privacy Policy
  • Copyright Policy
  • End User Terms