• Title/Summary/Keyword: international network

Search Result 4,198, Processing Time 0.031 seconds

A Data-centric Analysis to Evaluate Suitable Machine-Learning-based Network-Attack Classification Schemes

  • Huong, Truong Thu;Bac, Ta Phuong;Thang, Bui Doan;Long, Dao Minh;Quang, Le Anh;Dan, Nguyen Minh;Hoang, Nguyen Viet
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.169-180
    • /
    • 2021
  • Since machine learning was invented, there have been many different machine learning-based algorithms, from shallow learning to deep learning models, that provide solutions to the classification tasks. But then it poses a problem in choosing a suitable classification algorithm that can improve the classification/detection efficiency for a certain network context. With that comes whether an algorithm provides good performance, why it works in some problems and not in others. In this paper, we present a data-centric analysis to provide a way for selecting a suitable classification algorithm. This data-centric approach is a new viewpoint in exploring relationships between classification performance and facts and figures of data sets.

A Hybrid Routing Protocol Based on Bio-Inspired Methods in a Mobile Ad Hoc Network

  • Alattas, Khalid A
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.207-213
    • /
    • 2021
  • Networks in Mobile ad hoc contain distribution and do not have a predefined structure which practically means that network modes can play the role of being clients or servers. The routing protocols used in mobile Ad-hoc networks (MANETs) are characterized by limited bandwidth, mobility, limited power supply, and routing protocols. Hybrid routing protocols solve the delay problem of reactive routing protocols and the routing overhead of proactive routing protocols. The Ant Colony Optimization (ACO) algorithm is used to solve other real-life problems such as the travelling salesman problem, capacity planning, and the vehicle routing challenge. Bio-inspired methods have probed lethal in helping to solve the problem domains in these networks. Hybrid routing protocols combine the distance vector routing protocol (DVRP) and the link-state routing protocol (LSRP) to solve the routing problem.

Develop an Effective Security Model to Protect Wireless Network

  • Ataelmanan, Somya Khidir Mohmmed;Ali, Mostafa Ahmed Hassan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.48-54
    • /
    • 2021
  • Security is an important issue for wireless communications and poses many challenges. Most security schemes have been applied to the upper layers of communications networks. Since in a typical wireless communication, transmission of data is over the air, third party receiver(s) may have easy access to the transmitted data. This work examines a new security technique at the physical layer for the sake of enhancing the protection of wireless communications against eavesdroppers. We examine the issue of secret communication through Rayleigh fading channel in the presence of an eavesdropper in which the transmitter knows the channel state information of both the main and eavesdropper channel. Then, we analyze the capacity of the main channel and eavesdropper channel we also analyze for the symbol error rate of the main channel, and the outage probability is obtained for the main transmission. This work elucidate that the proposed security technique can safely complement other Security approaches implemented in the upper layers of the communication network. Lastly, we implement the results in Mat lab

3GPP 5G Core Network: An Overview and Future Directions

  • Husain, Syed;Kunz, Andreas;Song, JaeSeung
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.1
    • /
    • pp.8-15
    • /
    • 2022
  • The new 5G radio technology (NR) can provide ultra-reliable low latency communications. The supporting 5G network infrastructure will move away from the previous point-to-point network architecture to a service-based architecture. 5G can provide three new things, i.e., wider channels, lower latency and more bandwidth. These will allow 5G to support three main types of connected services, including enhanced mobile broadband, mission-critical communications, and the massive Internet of Things (IoT). In 2015, the 5th generation (5G) mobile communication was officially approved by the International Telecommunication Union (ITU) as IMT-2020. Since then, 3GPP, the international organization responsible for 5G standards, is actively developing specifications for 5G technologies. 3GPP Release 15 provides the first full set of 5G standards, and the evolution and expansion of 5G are now being standardized in Release 16 and 17, respectively. This paper provides an overview of 3GPP 5G technologies and key services.

Predicting the Saudi Student Perception of Benefits of Online Classes during the Covid-19 Pandemic using Artificial Neural Network Modelling

  • Beyari, Hasan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.145-152
    • /
    • 2022
  • One of the impacts of Covid-19 on education systems has been the shift to online education. This shift has changed the way education is consumed and perceived by students. However, the exact nature of student perception about online education is not known. The aim of this study was to understand the perceptions of Saudi higher education students (e.g., post-school students) about online education during the Covid-19 pandemic. Various aspects of online education including benefits, features and cybersecurity were explored. The data collected were analysed using statistical techniques, especially artificial neural networks, to address the research aims. The key findings were that benefits of online education was perceived by students with positive experience or when ensured of safe use of online platforms without the fear cyber security breaches for which recruitment of a cyber security officer was an important predictor. The issue of whether perception of online education as a necessity only for Covid situation or a lasting option beyond the pandemic is a topic for future research.

Social Network Comparison of Netflix, Disney+, and OCN on Twitter Using NodeXL

  • Lee, Soochang;Song, Keuntae;Bae, Woojin;Choi, Joohyung
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.47-54
    • /
    • 2022
  • We analyze and compare the structure of the networks of Netflix, Disney+, and OCN, which are forerunners in OTT market, on Twitter. This study employs NodeXL pro as a visualization software package for social network analysis. As a result of the comparison with values of Vertices, Connected Components, Average Geodesic Distance, Average Betweenness Centrality, and Average Closeness Centrality. Netflix has comparative advantages at Vertices, Connected Components, and Average Closeness Centrality, OCN at Average Geodesic Distance, and Disney+ at Average Betweenness Centrality. Netflix has a more appropriate social network for influencer marketing than Disney+ and OCN. Based on the analysis results, the purpose of this study is to explain the structural differences in the social networks of Netflix, Disney+, and OCN in terms of influencer marketing.

Femtocell Networks Interference Management Approaches

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.329-339
    • /
    • 2022
  • Small cells, particularly femtocells, are regarded a promising solution for limited resources required to handle the increasing data demand. They usually boost wireless network capacity. While widespread usage of femtocells increases network gain, it also raises several challenges. Interference is one of such concerns. Interference management is also seen as a main obstacle in the adoption of two-tier networks. For example, placing femtocells in a traditional macrocell's geographic area. Interference comes in two forms: cross-tier and co-tier. There have been previous studies conducted on the topic of interference management. This study investigates the principle of categorization of interference management systems. Many methods exist in the literature to reduce or eliminate the impacts of co-tier, cross-tier, or a combination of the two forms of interference. Following are some of the ways provided to manage interference: FFR, Cognitive Femtocell and Cooperative Resource Scheduling, Beamforming Strategy, Transmission Power Control, and Clustering/Graph-Based. Approaches, which were proposed to solve the interference problem, had been presented for each category in this work.

Neural Network Self-Organizing Maps Model for Partitioning PV Solar Power

  • Munshi, Amr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.1-4
    • /
    • 2022
  • The growth in global population and industrialization has led to an increasing demand for electricity. Accordingly, the electricity providers need to increase the electricity generation. Due to the economical and environmental concerns associated with the generation of electricity from fossil fuels. Alternative power recourses that can potentially mitigate the economical and environmental are of interest. Renewable energy resources are promising recourses that can participate in producing power. Among renewable power resources, solar energy is an abundant resource and is currently a field of research interest. Photovoltaic solar power is a promising renewable energy resource. The power output of PV systems is mainly affected by the solar irradiation and ambient temperature. this paper investigates the utilization of machine learning unsupervised neural network techniques that potentially improves the reliability of PV solar power systems during integration into the electrical grid.

A Hybrid Learning Model to Detect Morphed Images

  • Kumari, Noble;Mohapatra, AK
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.364-373
    • /
    • 2022
  • Image morphing methods make seamless transition changes in the image and mask the meaningful information attached to it. This can be detected by traditional machine learning algorithms and new emerging deep learning algorithms. In this research work, scope of different Hybrid learning approaches having combination of Deep learning and Machine learning are being analyzed with the public dataset CASIA V1.0, CASIA V2.0 and DVMM to find the most efficient algorithm. The simulated results with CNN (Convolution Neural Network), Hybrid approach of CNN along with SVM (Support Vector Machine) and Hybrid approach of CNN along with Random Forest algorithm produced 96.92 %, 95.98 and 99.18 % accuracy respectively with the CASIA V2.0 dataset having 9555 images. The accuracy pattern of applied algorithms changes with CASIA V1.0 data and DVMM data having 1721 and 1845 set of images presenting minimal accuracy with Hybrid approach of CNN and Random Forest algorithm. It is confirmed that the choice of best algorithm to find image forgery depends on input data type. This paper presents the combination of best suited algorithm to detect image morphing with different input datasets.

Key Challenges of Mobility Management and Handover Process In 5G HetNets

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.139-146
    • /
    • 2022
  • Wireless access technologies are emerging to enable high data rates for mobile users and novel applications that encompass both human and machine-type interactions. An essential approach to meet the rising demands on network capacity and offer high coverage for wireless users on upcoming fifth generation (5G) networks is heterogeneous networks (HetNets), which are generated by combining the installation of macro cells with a large number of densely distributed small cells Deployment in 5G architecture has several issues because to the rising complexity of network topology in 5G HetNets with many distinct base station types. Aside from the numerous benefits that dense small cell deployment delivers, it also introduces key mobility management issues such as frequent handover (HO), failures, delays and pingpong HO. This article investigates 5G HetNet mobility management in terms of radio resource control. This article also discusses the key challenges for 5G mobility management.