International Journal of Computers and Communications

E-ISSN: 2074-1294
Volume 10, 2016

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of NAUN Journals is adapted to the 'continuously updated' model. What this means is that instead of being seperated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.

Main Page

Submit a paper | Submission terms | Paper format

 


Volume 10, 2016 


Title of the Paper: Non-Linear Steering Control of Submersible Vehicle

 

Authors: Nenad Popovich, Rajul R. Singh

Pages: 120-128

Abstract: In this paper a mathematical model for the steering control system of submersible vehicle is presented. System has been analysed with numerical and graph-analytical methods. Different types of controllers: P, PI, PD and PID are investigated. Ultimate sensitivity tuning method (Ziegler-Nichols Second method) is used to establish initial controller parameters. Optimal controller parameters have been determined using a Fine tuning method. PD controller has chosen as the best option for the system. Two different criteria are selected to find controller’s optimal parameters: Integral Squared Error and Integral Absolute Error. Dynamical behaviour of the system has been simulated by Simulink and Matlab. Non-linear elements are added to protect a rudder/steering gear. A sea current as the dominant disturbance has been implemented in the system and its influence on the system has been investigated.


Title of the Paper: Markov Model of the Smart Business Center Wired Network Considering Attacks on Software and Hardware Components

 

Authors: Vyacheslav Kharchenko, Maryna Kolisnyk, Iryna Piskachova, Nikolaos Bardis

Pages: 113-119

Abstract: Internet of Things covers the increasing number spheres of human activity. Create protected from malicious impacts smart business centers (SBC) is a challenge, and includes aspects of safety at every level of SBC architecture. The article analyzes some of the problems arising from the creation and operation of SBC wireline networks. In the analysis of dependability IoT system must take into account the reliability and security of the system at several levels SBC architecture: sensors level, connection level (link, router, switch), the level of software / hardware components of the server as a network management device, the level of the entire SBC system. To account for the impact of malicious actions on major hardware and software components of the SBC system is represented by a Markov model, which takes into account the specifications of typical network components SBC with the presence of software vulnerabilities when exposed to hacker attacks, which takes into account the attacks rate on software vulnerabilities and the hardware and as the values of the rate of their recovery after the attacks derived from the analysis of statistical data. The analysis of the simulation results gives the opportunity to identify ways to improve the reliability and safety of the SBC.


Title of the Paper: Deadlock Free 3-D Hamiltonian Broadcast Two-Phase Multi-Port Algorithm

 

Authors: Amnah El-Obaid

Pages: 103-112

Abstract: Broadcast is one of the most important approach in distributed memory parallel computers that is used to find a routing approach from a one source to all nodes in the mesh. The approach of this case of Broadcasting is to send the message from one source to all destinations in the network which corresponds to one-to-all communication. Routing schema is the approach that used to determine the road that is used to send a message from a source node to destination nodes. Wormhole routing is a fundamental routing mechanism in modern parallel computers which is characterized with low communication latency. We show how to apply this approach to 3-D meshes. In wormhole routing large network packets are broken into small pieces called FLITs (flow control digits). The destination address is kept in the first flit which is called the header flit and sets up the routing behavior for all subsequent flits associated with the packet. If the packets of the message can’t deliver to their destination and there is a cyclic dependence over the channels in the network, then the deadlock even is occurred. In this paper, we consider an efficient algorithm for broadcasting on Multi-Port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient algorithm, Three-Dimension Tow Phase Multi-Port (3-DTPMP) algorithm which used broadcast communication facility with deadlock-free wormhole routing in general three-dimensional networks. In this paper the behaviors of this algorithm were compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our simulation results show the average of our proposed algorithm over the other algorithms that presented


Title of the Paper: Analysis of Non-Linear Attributes of Cooperative MIMO Channel Using State Space Modeling

 

Authors: Ankumoni Bora, Kandarpa Kumar Sarma, Nikos Mastorakis

Pages: 93-102

Abstract: Stochastic wireless channels have significant nonlinear contents which in a restricted form are handled by traditional channel estimation and modeling approaches. The working of most of the traditional channel modeling approaches is based on the adoption of a linearized representation of the path gains which truncates a sizable portion of the contents. The outcome is a distinct fall in the quality of service (QoS) and degradation of the system performance. Non-linear components in the channel are better approximated by considering analytical methods which retain more of these path gain segments. The state space modeling is a viable approach as it encompasses higher order terms in the representation and thereby prevents discarding of important channel components. Here, we discuss the application of state space modeling to cooperative wireless channels and provide an analytical treatment of such a propagation medium configured for high data rate cooperative communication. The analytical treatment is compared with simulation results using two estimation techniques namely zero forcing (ZF) and least mean square (LMS) equalizer.


Title of the Paper: Leveraging Software-Defined Networking for Security Intelligence against Distributed Denial of Service Attacks in the Data Centre

 

Authors: Ivan Iordanov

Pages: 87-92

Abstract: Distributed Denial of Service (DDOS) attacks are particularly damaging for commercial Data Centres (DC) – they affect the operator, their customers and the end users. The high capacity upstream connectivity of those organisations drives up the price of purely volumetric attacks against them. This makes other flavours of DDOS, which can be protected from within an organisation, the preferred tools of attackers. In order to mount a proper defence, however, timely actionable intelligence is needed. Collecting said Security Intelligence (SI) can be accomplished by means of an Intrusion Detection System (IDS). Finding patterns of multi-day subtle sophisticated attacks, or performing post-mortem analysis of suffered breaches, requires keeping huge amount of data backlog. This study presents an overview of DDOS attacks from the point of view of actors involved and enumerates various ways to get around the storage requirements by using flexible traffic selection mechanisms. A formula for calculating needed storage capacity is provided. The resultant recommendations are particularly applicable for Software-Defined Networking (SDN) environment where dynamic rollout of new interpretative rules can be leveraged in order to perform highly specialised operations on multi-purpose hardware.


Title of the Paper: Semantic Smart Home System: OntoSmart to Monitor and Assist Habitant

 

Authors: L. Nachabe, M. Girod-Genet, B. ElHassan, J. Khawaja, H. Salloum

Pages: 78-86

Abstract: The increasing number of older persons living independently, in parallel with the considerable number of individuals with chronic diseases or disabilities, in addition to the evolution in sensors/actuators technologies, wireless communication and cloud storage have empowered the idea of new smart home systems (SHS). These systems help to keep individuals safe, to assist them in controlling home appliances, and to inform their relatives and the medical staff about their status. Although various types of SHS already exist, they are environment dependent and scenario specific. Therefore, the aim of this paper is to propose sensors/actuators and scenarios independent flexible context aware and distributed SHSs based on standardized WSN and service ontologies as well as multi-agent architecture.


Title of the Paper: Multi-Channel Housing Monitoring System

 

Authors: Yeong-Yil Yang, Young-Sik Park, Hyun-Jong Lee, Young-Ho Choi, Jong-Chul Lee

Pages: 74-77

Abstract: In this paper, we propose multi-channel housing monitoring system based on Ethernet and 3G/4G mobile communication for monitoring and controlling the housings installed all over the city. We designed and developed the monitoring program and the embedded system which is installed in the housing. The environment of the housing, such as temperature, humidity and impact can be monitored and the equipment in the housing can be controlled through either Ethernet or 3G/4G mobile communication. When one of communication channels is disconnected, our system communicates through the other communication channel. Sixty embedded systems are installed all over JinJu City and the monitoring program is installed on the server at JinJu City hall. It’s working normally.


Title of the Paper: Analysis of a Hybrid Android System for Fall Detection

 

Authors: Eduardo Casilari, Miguel A. Oviedo-Jiménez

Pages: 67-73

Abstract: Android personal devices have become an interesting and cost-effective technology to deploy wearable Fall Detection Systems. In contrast with other smartphone-based solutions, this paper describes a fall detection architecture that integrates two-Bluetooth enabled devices: a smartwatch and a smartphone. The evaluation of the system under different fall recognition algorithms and mobility patterns indicates that the simultaneous operation of the two devices as fall detectors clearly improves the specificity of the system when compared to the cases where just one device is employed as a fall detector. The performed analysis also encompasses the study of the battery consumption and the performance of the system under constant monitoring in everyday life conditions.


Title of the Paper: Cross-Layer Information to Enhance TCP-AP Congestion Control in Wireless Networks

 

Authors: Luís Barreto

Pages: 58-66

Abstract: The dynamic and instability of wireless links make congestion control an important research subject in wireless networks. It is important to define strategies that accurately evaluate the characteristics of the wireless links and what can be used by congestion control protocols. It is known that TCP experiences serious performance degradation problems in wireless networks. It has been showed that new variants of TCP, defined fo wireless congestion control, such as TCP-AP, do not evaluate accurately the capacity and available link bandwidth in wireless networks. In this paper, we propose a new congestion control protocol for wireless networks, based in TCP-AP and in a new cross layer information (CLI). We name the proposed protocol TCP-AP with CLI. It relies on the MAC layer information gathered by a method that accurately estimates the available bandwidth and the path capacity over a wireless network path and introduces the concept of node count fair bandwidth share effect. The new congestion control mechanism is evaluated in different scenarios, in wireless mesh and ad-hoc networks, and compared against several approaches for wireless congestion control. It is shown that TCP-AP with CLI outperforms the base TCP-AP, showing its stable behavior and better channel utilization.


Title of the Paper: The Reduction of Number Messages in Election Bully Algorithm

 

Authors: Qamil Kabashi, Arbnor Zeqiri, Milaim Zabeli

Pages: 53-57

Abstract: In distributed systems, communication networks, and general communication between processes, it is required to have a process that synchronizes all other system processes and communication between them. If the chosen coordinator crashes or becomes isolated, a new coordinator is elected. All active processes at any given point of election get together to choose a coordinator. Nowadays, many algorithms have been developed for the election of the coordinator. These algorithms differ among themselves for the way in which they select the coordinator, the criteria that are taken into account for selection, and the number of messages required for selection. Among the best known of such algorithms is the Bully Algorithm and its modifications. The proposed algorithm is also based on the Bully Algorithm, but unlike similar algorithms, it will select the process with the smallest identifier as a coordinator, assuming that the minimal identifier that a process can take is known. This algorithm reduces the number of messages (in the best case only one message is required), as well as network traffic, and it ensures that the system has only one coordinator at any given time.


Title of the Paper: Design and Implementation of Virtual Reality Contents Based on Dynamic Event

 

Authors: Dongik Lee, Giyeol Baek, Yangwon Lim, Hankyu Lim

Pages: 48-52

Abstract: Recently, thanks to the development of ICTs, hardware items such as controllers and displays, software for processing of the hardware items and content have been diversely developed in virtual reality content markets. In the market, several controller and display are being developed. Kinect and Leap Motion Controller are examples of motion recognition controllers. Also head mount display(HMD) is used as display unit. In addition, virtual reality content related technologies utilizing those technologies are also required for processing of interactions with users and for processing of events. The usage of combination of peripheral devices is not usual in virtual reality contents. Therefore, in the present study, virtual reality content that can process dynamic events utilizing Kinects which are motion recognition controllers that have been the mostly actively utilized recently and Oculus Rifts which are HMDs was designed and implemented.


Title of the Paper: Proposal for Urban Tracking of Dangerous Goods for Brazilian Cities

 

Authors: Marcelo Luiz Alves Fernandez, Eduardo Mario Dias, Luciano Gualberto

Pages: 37-47

Abstract: This article describes an innovative proposal for tracing dangerous products in Brazilian urban cities. For that uses the concept of electronic tax documents and tracking technologies.


Title of the Paper: Research of Algorithms for Communication Encryption

 

Authors: Milena N. Karova, Gergana E. Todorova, Mariana G. Todorova, Ivaylo P. Penev, Ventsislav G. Nikolov

Pages: 30-36

Abstract: An application for research of algorithms for cryptographic secure data transmission by using the algorithms DES, TripleDES-128, TripleDES-192, AES-128, AES-192 и AES-256 is developed in C#. It offers to the user access to the transmitted data via password. Testing of the application is carried out to ensure trouble-free operation. The used resources and time required for encryption of groups of files with different length are studied. A comparative analysis of the algorithms is done and corresponding conclusions are made.


Title of the Paper: Using Efficient TRNGs for Pseudo Profile in National eID Card

 

Authors: Blerim Rexha, Dren Imeraj, Ehat Qerimi, Arbnor Halili

Pages: 23-29

Abstract: Applications that requires true random number generator (TRNG), which uses raw analog data generated from any noise source in nature, must convert the source normal distribution to uniform distribution. If the TRNG is implemented in a low power device such as a microcontroller, the algorithm for distribution conversion needs to be lightweight and efficient in terms of using as much of the raw data as possible. Many used market implementations convert the raw analog data into digital data by employing a comparator or a Schmitt trigger. This method wastes a large amount of random input data, lowering the throughput of the TRNG. In new national electronic identity card (eID) beyond the true identity of its bearer and to address the increasing concern of user privacy while doing business in Internet a pseudo profile is set. This pseudo profile uses 20 bytes random value generated by database server, using a script during personalization process. In this paper we present a novel algorithm that enables efficient distribution conversion in low power devices. The low memory requirements and efficient processing make it suitable for implementation in microcontrollers or other low power cryptographic devices but also in complex personalization systems. Furthermore we compare the random data generated by our efficient TRNG vs. those generated by database server.


Title of the Paper: Hyperelliptic Based Signcryption with Sensor-Seeded Random Number

 

Authors: J. Premalatha, K. Sathya, Vani Rajasekar

Pages: 18-22

Abstract: The emerging trend now in network security is lightweight cryptography which is due to the growth of wireless technology. Lightweight cryptography is defined as cryptographic algorithm used to achieve higher security with limited resources. Generally, these wireless systems are in demand of security and resource(power). In order to meet these constraints an important lightweight scheme called signcryption is proposed with security features such as confidentiality, integrity(originality of sender and receiver), message and user authentication, non-repudiation, forward secrecy and public verifiability. Signcryption fulfils the functions of signature and encryption in one logical. Strength of security and privacy of any cryptographic mechanisms that use random numbers require that the random numbers generated have two important properties namely 1.Uniform distribution and 2.Independence [9]. One idea proposed is to use sensor data as seed for Random Number Generator (RNG) to generate the random numbers that is used for signcryption algorithm in wireless networks [8]. These sensor data also pose weaknesses where sensors may be under adversarial control that may lead to generating expected random sequence which breaks the security and privacy. This paper proposes an approach to process the raw sensor data that increases randomness in the seed value. The generated sequences from two sensors are combined by Decimation method to improve unpredictability. This makes the sensor data to be more secure in generating random numbers preventing attackers from knowing the random sequence through adversarial control. Existing signcryption scheme faces issues- lack of forward secrecy and public verifiability, computation and communication overhead, larger memory requirements [1]. The proposed scheme based on hyper elliptic curve (HEC) fulfils all the gaps of existing system [2].


Title of the Paper: Modelling Simple Network Graphs Using the Matrix Vector Transition Net

 

Authors: A. Spiteri Staines

Pages: 11-17

Abstract: Petri nets and graph modelling are popular topics in computing and other fields. Different structures and complexities can be represented using graphs. In information graphics graph topologies find suggested use for representing formal and informal natural occurring structures and relationships. Basically graph types can be divided into two simple types i) directed and ii) non-directed. Other characteristics and properties can be included. Certain types of simple graphs can easily be represented using matrix structures. The incidence matrix, and the adjacency matrix for a graph can be used as input or outputs in the MVTN (matrix vector transition net). The MVTN was presented in previous work. The reasons for combining graph structures with the MVTN are discussed in section II) and III). The MVTN is based on Petri net principles. Some advanced uses of the MVTN and using graph structures as inputs are given in sections IV) and V). Some simple examples are also given and discussed in section VI). These models can be executed and preserve Petri net like properties. They can be further enhanced. Some results and findings are presented in section VII).


Title of the Paper: Making Visits to Museums more Fun with Augmented Reality Using Kinect, Drones and Games

 

Authors: Erkan Bostanci, Metehan Unal

Pages: 7-10

Abstract: Augmented Reality (AR) provides an entertaining means for displaying 3D reconstructions of ancient buildings in situ for cultural heritage. This short paper presents several AR applications that can be employed in museums or heritage sites in order to enhance the visiting experience using recent technologies such as Kinect and drones. We also give an insight to an ongoing research employing novel ideas for allowing people to make the most out of their museum visits.


Title of the Paper: Robust t-out-of-n Internet Lottery Games with Player Anonymity

 

Authors: Jung-San Lee, Kuo-Jui Wei, Wei-Chiang Kao

Pages: 1-6

Abstract: No matter where you stay, you must often notice a scenario that people stand in a queue in front of lottery vendors. This phenomenon has lasted out for centuries. Different from gambling, a lottery game is usually launched by the Government or a legitimate organization for gathering funds or raising charity finance. To enhance the convenience and popularity of lottery, Lee and Chang have developed an electronic lottery system which allows players to purchase lotteries over the Internet recently. Unfortunately, it has been demonstrated that the system cannot ensure the robustness requirement. That is, a player can forge a winning ticket to earn the price. We therefore propose an improvement on their system to fix the weakness. Aside from that, we design a brand-new method which can preserve essentials of e-lottery game system.