Computer Science & Communications
Permanent URI for this collection
Browse
Recent Submissions
Item Enhancing Multi-Factor Authentication in Modern Computing(2017-07) Iwuoha, Obioha2; Emmanuel, Nwabueze1; Ekwonwune, EmmanuelMost network service providers like MTN Nigeria, currently use two-factor authentication for their 4G wireless networks. This exposes the network subscribers to identify theft and users data to security threats like snooping, sniffing, spoofing and phishing. There is need to curb these problems with the use of an enhanced multi-factor authentication approach. The objective of this work is to create a multi-factor authentication software for a 4G wireless network. Multi-factor authentication involves user’s knowledge factor, user’s possession factor and user’s inherence factor; that is who the user is to be presented before system access can be granted. The research methodologies used for this work include Structured System Analysis and Design Methodology, SSADM and Prototyping. The result of this work will be a Multi-factor authentications software. This software was designed with programming languages like ASP. NET, C# and Microsoft SQL Server for the database.Item Towards the Development of Best Data Security for Big Data(Communication Network, 2017-11) Yuan, TianBig data is becoming a well-known buzzword and in active use in many areas. Because of the velocity, variety, and volume of big data, security and privacy issues are magnified, which results in the traditional protection mechanisms for structured small scale data are inadequate for big data. Sensitivities around big data security and privacy are a hurdle that organizations need to overcome. In this paper, we review the current data security in big data and analysis its feasibilities and obstacles. Besides, we also introduced intelligent analytics to enhance security with the proposed security intelligence model. This research aims to summarize, organize and classify the information available in the literature to identify any gaps in current research and suggest areas for scholars and security researchers for further investigation.Item Practical Approaches to Securing an IT Environment(Communication and Network, 2017-11) John C, Fuller; Cofie, Penrose; Warsame H, Ali; Emmanuel S., KolawoleThere are a number of IT Security journals available in the literature but none of these research papers have practically specified approaches to secure the IT environment at large. In this paper, more emphases will be laid on the practical ways to secure our IT environments and with some useful real-life scenarios. In today, securing our IT environment has become the key factor in the industry due to an increasing number of attackers invading and stealing the intellectual properties; thereby, rendering most IT industries to go out of businesses. They may find that understanding and translating IT security recommendations to implementable practices can be overwhelming. While this is a worthwhile and important task, there are also more practical ways to ensure you are using IT security best practices in your business. Therefore, the need to properly secure our IT environments in order to mitigate those attacks by using the right tools in all IT domains will be fully discussed in this research. This paper will focus more on protection of LAN-WAN Domain as a use case.Item Intelligent and Predictive Vehicular Networks(Scientific Research Publishing, 2014-05) Chintu, Schmidt S.; Anthony, Richard; Roshanaei, Maryam; Ierotheou, ConstantinosSeeking shortest travel times through smart algorithms may not only optimize the travel times but also reduce carbon emissions, such as CO2, CO and Hydro-Carbons. It can also result in reduced driver frustrations and can increase passenger expectations of consistent travel times, which in turn points to benefits in overall planning of day schedules. Fuel consumption savings are another benefit from the same. However, attempts to elect the shortest path as an assumption of quick travel times, often work counter to the very objective intended and come with the risk of creating a “Braess Paradox” which is about congestion resulting when several drivers attempt to elect the same shortest route. The situation that arises has been referred to as the price of anarchy! We propose algorithms that find multiple shortest paths between an origin and a destination. It must be appreciated that these will not yield the exact number of Kilometers travelled, but favourable weights in terms of travel times so that a reasonable allowable time difference between the multiple shortest paths is attained when the same Origin and Destinations are considered and favourable responsive routes are determined as variables of traffic levels and time of day. These routes are selected on the paradigm of route balancing, re-routing algorithms and traffic light intelligence all coming together to result in optimized consistent travel times whose benefits are evenly spread to all motorist, unlike the Entropy balanced k shortest paths (EBkSP) method which favours some motorists on the basis of urgency. This paper proposes a Fully Balanced Multiple-Candidate shortest path (FBMkP) by which we model in SUMO to overcome the computational overhead of assigning priority differently to each travelling vehicle using intelligence at intersections and other points on the vehicular network. The FBMkP opens up traffic by fully balancing the whole network so as to benefit every motorist. Whereas the EBkSP reserves some routes for cars on high priority, our algorithm distributes the benefits of smart routing to all vehicles on the network and serves the road side units such as induction loops and detectors from having to remember the urgency of each vehicle. Instead, detectors and induction loops simply have to poll the destination of the vehicle and not any urgency factor. The minimal data being processed significantly reduce computational times and the benefits all vehicles. The multiple-candidate shortest paths selected on the basis of current traffic status on each possible route increase the efficiency. Routes are fewer than vehicles so possessing weights of routes is smarter than processing individual vehicle weights. This is a multi-objective function project where improving one factor such as travel times improves many more cost, social and environmental factors.Item Implicit, Context Management Systems for Mobile Health Services(Scientific Research Publishing, 2015-03) Farahmandian, Vahid; Asosheh, AbbasObjectives: In this paper data flow and executive model of Mobile Health services risk management by the use of context aware systems are provided. Materials and Methods: Mobile health (M-Health) refers to using portable electronic devices having application for delivering health services and patient’s information management. M-Health can offer various services remotely in prevention, detection, control, and treatment of disease or in the conditions of disaster for a patient or an environment. These services can have more acceptable quality by the help of Context Aware Systems which are defined as the capacity of computing equipment for detection, feeling, interpreting, and replying to user’s local environmental aspects and computing equipment itself. In this paper, executive model is offered for managing services of M-Health based on context aware systems. One of the supplies of developing a context aware system is having a clear and well-defined definition of context and developing appropriate context information provider. In order to deliver high quality and well-managed M-Health services in the form of context aware systems, having clinical risk management plan is necessary. Conclusions: M-Health services need to develop appropriate communication strategies for interacting with stockholders at each stage of clinical risk management process. Risks, which are primarily resides in service providers, communicating channels or service receiver sides, can be well identified and managed using clinical risk management, M-Health and context aware systems. Thereby, these systems can offer qualified and precise services.Item The Possibility of Using RFID System to Automate and Integrate the Attendance of Professors and Students in the Classroom(Scientific Research Publishing, 2016-11) Meghdadi, Majid; Azar, Ahad A.One of the most important goals followed in most systems is to increase efficiency, reduce errors and enhance ease of data entry tasks such as better services in organizations. Therefore, the use of intelligent tools is of the most important requirements for a management system in order to collect complete and accurate data and create complete information. In management, use of new technologies is recommended to have smart systems and reduce human errors. This study aimed to investigate “professors and students attendance system using RFID” and research population consists of professors and students. Findings show that, as attendance checking system in universities and schools is done through the class list and checking attendance of students needs to spend time and energy so it leads to a waste of valuable time and energy of professors to teach. Therefore, it is essential to use efficient and modern systems, because with the design and implementation of RFID attendance system and replacing the traditional system, time and energy waste could be avoided and attendance system could be promoted to an intelligent and integrated one. The designed system includes a number of hours of presence and absence, delays and rush to pay the salaries of professors at the University with its automatic identification through radio frequency. This system aims to create changes in this area and it is economic in whole.Item A Self-Learning Diagnosis Algorithm Based on Data Clustering(Scientific Research Publishing, 2016-08) Tretyakov, DmitryThe article describes an approach to building a self-learning diagnostic algorithm. The self-learning algorithm creates models of the object under consideration. The models are formed periodically through a certain time period. The model includes a set of functions that can describe whole object, or a part of the object, or a specified functionality of the object. Thus, information about fault location can be obtained. During operation of the object the algorithm collects data received from sensors. Then the algorithm creates samples related to steady state operation. Clustering of those samples is used for the functions definition. Values of the functions in the centers of clusters are stored in the computer’s memory. To illustrate the considered approach, its application to the diagnosis of turbomachines is described.Item Motion Planning System for Bin Picking Using 3-D Point Cloud(Scientific Research Publishing, 2016-08) Hikizu, Masatoshi; Mikami, Shu; Seki, HiroakiIn this paper, we propose a motion planning system for bin picking using 3-D point cloud. The situation that the objects are put miscellaneously like the inside in a house is assumed. In the home, the equipment which makes an object stand in line doesn’t exist. Therefore the motion planning system which considered a collision problem becomes important. In this paper, Information on the objects is measured by a laser range finder (LRF). The information is used as 3-D point cloud, and the objects are recognized by model-base. We propose search method of a grasping point for two-fingered robotic hand, and propose search method of a path to approach the grasping point without colliding with other objects.Item An Intelligent Sensor Based System for Real Time Heart Rate Monitoring (HRM)(Scientific Research Publishing, 2016-05) Farin, Nusrat J.; Sharif, S. M. A.; Mobin, IftekharulA method and apparatus for monitoring heart rate of the heart using a wearable system is designed and implemented in this paper. A heart rate receives from heart beat signals and stores the data to a database and after a time period this method can determine an idle heart rate of the monitoring body. This idle heart rate is compared with the stored data and can determine the normal and abnormal heart rate variability. After the certain time period this system can detect the heart rate and also can send a signal to the user in time of abnormalities. Consequent estimations of heart rate variability are contrasted with this.Item Based on Adaptive Backstepping Error Control for Permanent Magnet Synchronous Motor(Scientific Research Publishing, 2016-05) Jiang, Hua; Lin, Da; Liu, Yongchun; Song, HongPermanent Magnet Synchronous Motor (PMSM) displays chaotic phenomenon when PMSM in power on or power off. At present, there are many methods to control chaos in PMSM. However, there appears oscillation in course of control chaos in PMSM, which has an effect on practical application. This paper proposes error control based on adaptive backstepping to control chaos in PMSM; an error control item is added in each step virtual control design which has control effect of unknown dynamical error on system. This scheme can eliminate oscillation in course of control chaos. Finally, the simulation results show the effectiveness of theoretical analysis.Item Interface for Intelligence Computing Design and Option of Technical Systems(Scientific Research Publishing, 2015-11) Mammadov, Javanshir; Tagiyeva, Tarana; Sveta, Akhmedova; Arzu, AliyevaAs a result of analysis of the existent methods and tools of computer aided design of the technical systems of many industrial areas, the primary purpose of the article that consists in the decision of different project problems within the framework of one programmatic system with the use of comfortable programmatic interface is certain. Architecture of the program interface for computer designing and option of technical systems of different industrial areas on the basis of stage-by-stage automated designing principles with using programmatic and informative supports is worked out. In the article, the problem of computer designing, searching and option of elements of manipulator for flexible manufacture module is considered. As a method of logical simulation of the problem, production model of designing procedures of the program interface and intelligence option of a manipulator, its technical parameters are developed. On the basis of algorithmic scheme of searching, the option of a manipulator from data base is worked out.Item Sigma-Point Filters in Robotic Applications(Scientific Research Publishing, 2015-08) Al-Shabi, MohammadSigma-Point Kalman Filters (SPKFs) are popular estimation techniques for high nonlinear system applications. The benefits of using SPKFs include (but not limited to) the following: the easiness of linearizing the nonlinear matrices statistically without the need to use the Jacobian matrices, the ability to handle more uncertainties than the Extended Kalman Filter (EKF), the ability to handle different types of noise, having less computational time than the Particle Filter (PF) and most of the adaptive techniques which makes it suitable for online applications, and having acceptable performance compared to other nonlinear estimation techniques. Therefore, SPKFs are a strong candidate for nonlinear industrial applications, i.e. robotic arm. Controlling a robotic arm is hard and challenging due to the system nature, which includes sinusoidal functions, and the dependency on the sensors’ number, quality, accuracy and functionality. SPKFs provide with a mechanism that reduces the latter issue in terms of numbers of required sensors and their sensitivity. Moreover, they could handle the nonlinearity for a certain degree. This could be used to improve the controller quality while reducing the cost. In this paper, some SPKF algorithms are applied to 4-DOF robotic arm that consists of one prismatic joint and three revolute joints (PRRR). Those include the Unscented Kalman Filter (UKF), the Cubature Kalman Filter (CKF), and the Central Differences Kalman Filter (CDKF). This study gives a study of those filters and their responses, stability, robustness, computational time, complexity and convergences in order to obtain the suitable filter for an experimental setup.Item Throughput Maximizing Frequency and Power Scheduling for Wireless Ad-Hoc Networks in the Low-SINR Regime(Scientific Research Publishing, 2012-07) Saberi, NahidWe study the problem of frequency and power allocation and scheduling at a time-slotted cognitive ad-hoc wireless network, where cognitive nodes share a number of frequency bands and frequency reuse is allowed. In such a network the throughput maximization problem generally results in a mixed zero-one nonlinear non-convex problem. Interestingly, in the low-SINR regime, the power allocation policy that maximizes the total throughput follows an “on/off” strategy with maximum power usage in the “on” state. In this paper we show that the on/off strategy in the low-SINR regime is also optimal with respect to throughput when scheduling users over time and frequency subject to minimum SINR requirements. We show that these additional constraints will not change the optimum strategy, but may affect the set of “on” or “off” transmitters. Also we present an approach that transforms the mixed zero-one nonlinear problem to an equivalent mixed zero-one linear problem at the expense of extra variables.Item Wireless Hybrid QoS Architecture with an Enhancement of Fair Intelligent Congestion Control(Scientific Research Publishing, 2012-07) Zheng, Li; Hoang, Doan B.; Li, MingMore subtle and explicit QoS control mechanisms are required at the radio access level, even though the simple and scalable Differentiated Services (DiffServ) QoS control model is acceptable for the core of the network. At the radio access level, available resources are severely limited and the degree of traffic aggregation is not significant, thus rendering the DiffServ principles less effective. In this paper we present a suitable hybrid QoS architecture framework to address the problem. At the wireless access end, the local QoS mechanism is designed in the context of IEEE 802.11 WLAN with 802.11e QoS extensions; so streams of those session-based applications are admitted, established according to the traffic profile they require, and guaranteed. As the core in the Admission Control of the hybrid QoS architecture, the Fair Intelligent Congestion Control (FICC) algorithm is applied to provide fairness among traffic aggregates and control congestion at the bottleneck interface between the wireless link and the network core via mechanisms of packet scheduling, buffer management, feedback and adjustments. It manages effectively the overloading scenario by preventing traffic violation from uncontrolled traffic, and providing guarantee to the priority traffic in terms of guaranteed bandwidth allocation and specified delay.Item Energy-Efficient and Coverage-Aware Clustering in Wireless Sensor Networks(Scientific Research Publishing, 2012-07) Awad, Fahed; Taqieddin, Eyad; Seyam, AsmaaEnergy efficiency and sensing coverage are essential metrics for enhancing the lifetime and the utilization of wireless sensor networks. Many protocols have been developed to address these issues, among which, clustering is considered a key technique in minimizing the consumed energy. However, few clustering protocols address the sensing coverage metric. This paper proposes a general framework that addresses both metrics for clustering algorithms in wireless sensor networks. The proposed framework is based on applying the principles of Virtual Field Force on each cluster within the network in order to move the sensor nodes towards proper locations that maximize the sensing coverage and minimize the transmitted energy. Two types of virtual forces are used: an attractive force that moves the nodes towards the cluster head in order to reduce the energy used for communication and a repulsive force that moves the overlapping nodes away from each other such that their sensing coverage is maximized. The performance of the proposed mechanism was evaluated by applying it to the well-known LEACH clustering algorithm. The simulation results demonstrate that the proposed mechanism improves the performance of the LEACH protocol considerably in terms of the achieved sensing coverage, and the network lifetime.Item A Wideband Circularly Polarized Patch Antenna for 60 GHz Wireless Communications(Scientific Research Publishing, 2012-07) Zhou, Rongguo; Liu, Duixian; Xin, HaoThis paper presents the design of a fully packaged 60 GHz wideband patch antenna incorporating an air cavity and a fused silica superstrate. Circular polarization (CP) is realized by introducing a diagonal slot at the center of the square patch. By optimizing the patch and the slot dimensions, a high efficiency (>90%) microstrip fed CP antenna with an impedance bandwidth of 24% and a 6 dB axial ratio bandwidth of 21.5% is designed. A coplanar waveguide (CPW) to microstrip transition with λ/4-open-ended stubs are then designed to match the antenna to the CPW packaging interface. The experimental results of the final packaged antenna agree reasonably with the simulation results, demonstrating an impedance bandwidth of more than 26% and a 6 dB axial ratio bandwidth of 22.7%.Item Design of Low Power and High Speed CMOS Comparator for A/D Converter Application(Scientific Research Publishing, 2012-04) Yewale, Shubhara; Gamad, RadheshyamThis paper presents an improved method for design of CMOS comparator based on a preamplifier-latch circuit driven by a clock. Design is intended to be implemented in Sigma-delta Analog-to-Digital Converter (ADC). The main advantage of this design is capable to reduce power dissipation and increase speed of an ADC. The design is simulated in 0.18 μm CMOS Technology with Cadence environment. Proposed design exhibits good accuracy and a low power consumption about 102 μW with operating sampling frequency 125 MHz and 1.8 V supply. Simulation results are reported and compared with earlier work done and improvements are observed in this work.Item Interference Mitigation MAC Protocol for Cognitive Radio Networks(Scientific Research Publishing, 2012-04) Faruk, Nasir; Ali, Maaruf; Gumel, Mohammed I.The growing demand for wireless services coupled with the limited availability of suitable electromagnetic spectrum is increasing the need for more efficient RF spectrum utilization. Spectrum allocated to TV operators can potentially be shared by wireless data services, either when the primary service is switched off or by exploiting spatial reuse opportunities. This paper describes a dynamic spectrum access scheme for use in the TV bands which uses cognitive radio techniques to determine the spectrum availability. The approach allows secondary users (SU) to operate in the presence of the primary users (PU) and the OPNET simulation and modelling software has been used to model the performance of the scheme. An analysis of the results shows that the proposed scheme protects the primary users from harmful interference from the secondary users. In comparison with the 802.11 MAC protocol, the scheme improves spectrum utilization by about 27% while limiting the interference imposed on the primary receiver.Item Software Defined Radio Prototyping with Visual C++ Express and Code Composer Studio(Scientific Research Publishing, 2012-04) Wichlund, SverreThe primary goal of this project was educational: to demonstrate Software Defined Radio based prototyping using Visual C++ Express and Code Composer Studio. More specifically an IEEE802.11a Phy [1] compliant baseband processor was written in C++ and a radio link demonstrated “live” using a standard PCand the DSK6713 kit from Spectrum Digital [2] for baseband processing at the receiver and transmitter side respectively. To reduce costs without loss of educational value (the algorithms remains the same), the bandwidth was scaled down from 20MHz to 6 kHz to be able to utilize cheap narrowband COTS RF frontends operating at an intermediate frequency of only 12 kHz at the transmitter and receiver sides. This was easily achieved by just reducing the OFDM symbol rate by a suitable factor. The development process is described in detail, emphasizing development tricks to facilitate debugging of this kind of complex baseband processing. For educational purposes some other simpler waveforms was implemented as well.Item Hybrid Amplification: An Efficient Scheme for Energy Saving in MIMO Systems(Scientific Research Publishing, 2012-01) Poitau, Gwenael; Kouki, Ammar B.In this paper, a new amplification scheme for adaptive MIMO systems is proposed and tested. In this ‘hybrid amplification’ configuration, different amplifiers with different peak powers are used. In this way, each transmitter RF chain has a different DC-power consumption behavior. The adaptation algorithm, which chooses power and rate for each transmitter, uses these different amplifier behaviors to minimize the overall consumed energy. Several MIMO configurations designed for constant capacity applications have been simulated with different amplification schemes. Realistic amplifier models based on measured data are used. The difference between the amplifiers’ RF powers is set in order to keep optimal system performances. Then, it is shown that energy savings higher than 10% can be obtained with the hybrid amplification. The different tests are done for MQAM constellations in uncorrelated Rayleigh fading channels detected with a VBLAST ZF-SIC algorithm but can easily be extended to other correlated channels, detection algorithms or constellations.