International Journal of Computers and Communications

E-ISSN: 2074-1294
Volume 13, 2019

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of NAUN Journals is adapted to the 'continuously updated' model. What this means is that instead of being seperated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.

Main Page

Submit a paper | Submission terms | Paper format

 


Volume 13, 2019 


Title of the Paper: Enhancing Liveness Detection Methods in Iris Codes for Iris Recognition

 

Authors: J. Vijayaraj, D. Loganathan

Pages: 79-87

Abstract: Iris Recognition methodology is anauthentication mechanism that combines the various methodology. It is used to increase the accuracy of the iris detection method. Iris recognition has inherent weaknesses that can potentially compromise the security of a system. Parodying attacks is one of them and enhanced iris recognition is more vulnerable to parody attack than normal iris recognition method. Parodying is giving duplicate input to the biometric sensor. Parody detection is used to check whether the given input is original or duplicate. The objective is to overcome parodying attacks in iris recognition method. The proposed methodology extracts a set of features from iris using mean, median, variance and local ternary pattern (LTP) techniques respectively and the extracted biometric features are fused and fed to a convolution neural network that employs deep learning to detect parodied features from original features. The proposed method gives better results than the existing liveness detection methods in iris recognition.


Title of the Paper: Transcription Variants Effects on the Continuous Punjabi Language ASR System

 

Authors: Jyoti Guglani, A.N. Mishra

Pages: 75-78

Abstract: The performance of Continuous Punjabi language with different transcription variants is analyzed. The Performance of Automatic Speech Recognition system is much affected by the variations in terms of word error rate. The effect of training of acoustic model through canonical lexicon and lexicon with variants on the speech recognition system evaluated. The performance of the system with both training sets was investigated, and results were compared. Both monophone and triphone models of Speech Recognition were used to analyze the performance of the system. The language used for Automatic Speech Recognition System is the Punjabi language. The Continuous Punjabi language is chosen for the recognition system.


Title of the Paper: Consumption Temporary Density for the Detection of Water Leakages in Real-time

 

Authors: Anissa Ticherahine, Soumia Bourebia, Abdenacer Makhlouf, Patrice Wira

Pages: 68-74

Abstract: Detecting water leakage is a major challenge. Usually, specific meters are used to monitor water consumption. However, conventional meters are not capable of detecting an abnormal consumption such as an eventual leak. Due to recent advances in technologies and the emergence of the Internet of Things paradigm, a new kind of smart water meter has appeared. These meters provide further options for monitoring water consumption. In this paper, a new water leakage indicator, called Water Leakage Indicator based on the Consumption Temporary Density (WLICTD), is presented. The leakage detection process is based on a computation of temporal density for water consumption. WLICTD can distinguish an abnormal consumption, i.e., a leak situation, from a normal daily consumption. The proposed indicator has been evaluated using a set of real water consumption data obtained from a smart meter installed in a university restaurant in France. Results reveal the strength and efficiency of the proposed indicator in detecting all water leaks situations within a convenient period of time.


Title of the Paper: High-phase Resolution Architecture for Phased Array Transmitters

 

Authors: F. Cannone, G. Avitabile, G. Coviello

Pages: 59-67

Abstract: The paper describes a frequency independent phase shifting technique suitable for applications wherein a high-phase resolution at RF frequencies is required. For instance the propose approach is useful both for advanced measurements systems and for RADAR, satellite and wireless telecommunications systems. The proposed phased array transmitter is based on an innovative technique using the cascade of two blocks: an advanced digital block named Phase Control Block and an up-converter block containing integer-PLLs. The first digital block assures a high phase resolution comparable with the precision achievable by using a Direct Digital Synthesizer. The second block allows the up conversion at microwaves frequencies without a significant decrease of the phase-shift precisions. In fact, thanks to the described technique, the phase resolution is limited only by the rms phase error introduced by the integer-PLLs. The theory governing the design of the phase shifter is thoroughly discussed and three prototypes operating in different bands reporting an rms phase error lower than 0.4 degrees are reported. The measurements are compared with theoretical results showing a perfect agreement


Title of the Paper: A Reliable Numerical Analysis for Computer Virus Transmission Model

 

Authors: M.Rafiq, A.Raza, M.S.Arif

Pages: 53-58

Abstract: Numerical Analysis involves construction and implementation of reliable numerical schemes to solve continuous models. These schemes are constructed with the aim that they remain consistent with the continuous model and preserve all of its essential properties .In this paper, a reliable numerical analysis is presented for the dynamics of computer virus in a network. Results are compared with already existing schemes which do not behave well in certain scenarios.


Title of the Paper: Performance Evaluation of heterogeneous network via IEEE802.11.X and LTE Multi-homing framework in VANETs using Estinet 8

 

Authors: Ghulam Yasin, Syed Fakhar Abbas, Waseem Iqbal

Pages: 47-52

Abstract: Vehicle-to-vehicle (V2V) and Vehicle-to- Infrastructure (V2I) communication has been hot research topic in the recent years. Vehicle ad hoc networks are subnetwork of mobile ad hoc networks; node includes vehicle like cars, buses, trucks etc. Vehicular ad hoc Network (VANET) is implemented for short distance; high-speed communication between vehicle to vehicle as well as vehicle to road side unites. Vehicle-to- Vehicle (V2V) and vehicle to infrastructure (V2I) communication support services like vehicle collision avoidance and road safety using different messages between V2V and V2I to enhance navigation and location based services. V2I communication represents one of the most appropriate technologies to improve road safety, comfort and efficiency. Its main features include highly scalability, dynamic network topology, infrastructure development, typical centralized network access. IEEE 802.11p is latest suggested wireless technology for data transmission among different vehicles in (VANET) to enhance road security. In this paper an effort has been made to evaluate the performance of different wireless technologies like 802.11g, 802.11n, 802.11p and LTE. Performance parameters include throughput, data drop, packet delivery ratio, data collision using various speeds of vehicles.


Title of the Paper: Broadcasting Messages Securely in Vanet

 

Authors: M. Miyara, H. Toulni, B. Nsiri

Pages: 42-46

Abstract: In Vehicular Ad hoc Networks, the secure sharing of information exchanged is necessary, due to the importance and sensitivity of this information exchanged. But the features and requirements of VANET prevent direct application of existing security solutions impossible. In this paper, we propose an effective solution to ensure the security of critical and urgent information. The solution provides authentication and confidentiality while minimizing the time required to decrypt the messages


Title of the Paper: Formal Modeling of Simple Network Management Protocol using Event-B

 

Authors: Rajaa Filali, Sanae El Mimouni, Anas Amamou, Bahija Boulamaat, Mohamed Bouhdadi

Pages: 37-41

Abstract: Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from, and configuring, network devices.This standardization gives network administrators the ability to monitor network performance. In this paper, we highlight to analyze the correctness and authenticity of SNMP using the formal method Event-B and the Rodin Tool to verify the accuracy of our protocol's performance. Event-B is formal technique that enables user to express the problem at abstract level and then add more details in refinement step to obtain concrete specification. This interaction between modelling and proving reduces the complexity and helps in assuring that the SNMP specification is correct and unambiguous.


Title of the Paper: Effective Crypto-compression Scheme for Medical Images

 

Authors: Med Karim Abdmouleh, Med Salim Bouhlel

Pages: 32-36

Abstract: The use of telecommunications and information technologies in the medicine sector were evolved breathtakingly last years. This involves the development of the applications bound to the telemedicine. Seen the importance of this discipline in the improvement of the care quality, the reduction of treatment costs, and in the universalization of the medical practices and knowledges, the optimization of medical related applications remains a necessity. In this meaning, we propose in this work an efficient scheme for the transmission and the storage of medical images. This scheme is applied to the on line medical folder sector that is, currently, one of the most potential sector in telemedecine. A new approach concerning the integration of the partial encryption in compression algorithms based on the RLE encoding technique, will be presented and developed


Title of the Paper: Broadcasting Messages Securely in VANET

 

Authors: H. Toulni, B. Nsiri

Pages: 28-31

Abstract: In Vehicular Ad hoc Networks, the security and integrity of the exchanged information are necessary, because of the importance of this information to save people's lives. But the different features of this network make the direct application of existing security solutions impossible. In this paper, we have proposed an effective approach to secure the dissemination of critical and urgent information.


Title of the Paper: Modelling Collaborative Pratival Work Processes in an E-learning Context of Engineering Electric Education

 

Authors: Fahd Ouatik, Mustapha Raoufi, Mohamed El Mohadab, Farouk Ouatik, Belaid Bouikhalene, Mohamed Skouri

Pages: 12-23

Abstract: This work deals with the modeling of the processes of the collaborative practical work of electronics in a context of e-learning and the remote laboratory which is new technology allows the students to manipulate the practical works of electronics and the researchers can realize its scientific experiment by control, command and manipulation of all equipment and instruments of a laboratory via the web without this move to the laboratory for to solve the problems of massification of students in universities and the restriction of time and places and the lack of some instrument in the laboratory. even this new project will allow the sharing of the instruments and equipments between the universities on the international scale for to have Coordination, integration and cooperation between universities. In this work we are interested to modeling the processes of collaborative electronics practical work, whose actors are : the tutor, the member, the coordinator and the secretary and collaborative tools. Two models have been developed: a tutor-student model showing the activities of the learner and tutor, and moderating-member-secretary model that focuses more specifically on the roles of the moderator (coordinator) and the secretary (rapportor). This modeling has made it possible to better understand the processes considered and to detect the various problems that may arise during an online particle work collaborative process.


Title of the Paper: Moving Object Tracking based on Camshift Algorithm

 

Authors: Md. Shaiful Islam Babu, K. H. Shaikh Ahmed

Pages: 8-11

Abstract: Continuously adaptive Camshift is an efficient and lightweight tracking algorithm developed based on mean-shift. Camshift algorithm has the advantage of better real-time, but this algorithm is only suitable for tracking targets in simple cases, not well for tracking desired targets in complex situation. In this paper, we will present an improved method of multiple targets tracking algorithm based on the Camshift algorithm combined with Kalman filter. The tracker of the improved method was used to track each detected target. It can achieve tracking of multiple targets. A large number of experiments have proved that this algorithm has strong target recognition ability, good anti-noise performance, and fasttracking speed.


Title of the Paper: Designing a Decentralized Container based Fog Computing Framework for Task Distribution and Management

 

Authors: Anna Reale, Peter Kiss, Melinda Toth, Zoltan Horvath

Pages: 1-7

Abstract: In the field of Fog computing, because of the highly dynamic nature of Mobile Networks, the problem of automating task distribution and code migration has not yet been solved by any resource orchestrator. In this paper, we propose a solution to the problem in the form of an orchestrator that can build overlay computational networks from a volatile set of nodes. Each node of this overlay is able to deploy specific services and can satisfy the requested task from any participant node. We also demonstrate the infrastructure purpose by suggesting an existing Federated Learning Application.