Real Time Wireless Health Monitoring Application Using Mobile Devices
Amna Abdullah, Asma Ismael, Aisha Rashid, Ali Abou-ElNour, and Mohammed Tarique, Department of Electrical Engineering, Ajman University of Science and Technology, P.O. Box 2202, Fujairah, United Arab Emirates
In the last decade the healthcare monitoring systems have drawn considerable attentions of the researchers. The prime goal was to develop a reliable patient monitoring system so that the healthcare professionals can monitor their patients, who are either hospitalized or executing their normal daily life activities. In this work we present a mobile device based wireless healthcare monitoring system that can provide real time online information about physiological conditions of a patient. Our proposed system is designed to measure and monitor important physiological data of a patient in order to accurately describe the status of her/his health and fitness. In additionthe proposed system is able to send alarming message about the patient’s critical health data by text messages or by email reports. By using the information contained in the text or e-mail message the healthcare professional can provide necessary medical advising. The system mainly consists of sensors, the data acquisition unit, microcontroller (i.e., Arduino), and software (i.e., LabVIEW). The patient’s temperature, heart beat rate, muscles, blood pressure, blood glucose level, and ECG data are monitored, displayed, and stored by our system. To ensure reliabilityand accuracy the proposed system has been field tested. The test results show that our system is able to measure the patient’s physiological data with a very high accuracy.
ZigBee, remote healthcare, mobile device, patient monitoring, LabView
For More Details :
https://airccse.org/journal/cnc/7315cnc02.pdf
Volume Link :
https://airccse.org/journal/ijc2015.html
Dynamic Routing of Ip Traffic Based on Qos Parameters
Martin Kriška1 Jozef Janitor2and Peter Fecilak3 1Computer Networks Laboratory, Technical University of Kosice, Slovakia2Institute of Computer Technology, Technical University of Kosice, Slovakia3Department of Computers and Informatics, Technical University of Kosice, Slovakia
The article looks into the current state of the art of dynamic routing protocols with respect to their possibilities to react to changes in the Quality of Service when selecting the best route towards a destination network. New options that could leverage information about the ever changing QoS parameters for data communication are analysed and a Cisco Performance Routing solution is described more in detail. The practical part of this work focuses on a design and implementation of a test bed that provides a scalable laboratory architecture to manipulate QoS parameters of different data communications flowing through it. The test bed is used in various use cases that were used to evaluate Cisco Performance Routing optimization capabilitiesin different scenarios.
Performance Routing, PfR, Quality of Service, QoS, Optimized Edge Routing
For More Details :
https://airccse.org/journal/cnc/6414cnc02.pdf
Volume Link :
https://airccse.org/journal/ijc2014.html
Gps Systems Literature: Inaccuracy Factors And Effective Solutions
Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin, School of Computer Sciences, Universiti Sains Malaysia, Malaysia
Today, Global Positioning System (GPS) is widely used in almost every aspect of our daily life. Commonly, users utilize the technology to track the position of a vehicle or an object of interest. They also use it to safely navigate to the destination of their choice. As a result, there are countless number of GPS based tracking application that has been developed. But, a main recurring issue that exists among these applications are the inaccuracy of the tracking faced by users and this issue has become a rising concern. Most existing research have examined the effects that the inaccuracy of GPS have on users while others identified suitable methods to improve the accuracy of GPS based on one or two factors. The objective of this survey paper is to identify the common factors that affects the accuracy of GPS and identify an effective method which could mitigate or overcome most of those factors. As part of our research, we conducted a thorough examination of the existing factors for GPS inaccuracies. According to an initial survey that we have collected, most of the respondents has faced some form of GPS inaccuracy. Among the common issues faced are inaccurate object tracking and disconnection of GPS signal while using an application. As such, most of the respondents agree that it is necessary to improve the accuracy of GPS. This leads to another objective of this paper, which is to examine and evaluate existing methods as well as to identify the most effective method that could improve the accuracy of GPS.
GPS, accuracy factors, improve accuracy, global positioning system
For More Details :
https://aircconline.com/ijcnc/V8N2/8216cnc11.pdf
Volume Link :
https://airccse.org/journal/ijc2016.html
Containerized Services Orchestration for Edge Computing in Software-defined Wide Area Networks
Felipe Rodriguez Yaguache and Kimmo Ahola, 5G Networks & Beyond, Technical Research Centre of Finland (VTT), Espoo, Finland
As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the opportunities for deploying edge-computing containerized applications running over SD-WAN are vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the lack of research focused on service discovery in these scenarios. In this article, an in-house service discovery solution that works alongside Kubernetes’ master node for allowing improved traffic handling and better user experience when running micro-services is developed. The service discovery solution was conceived following a design science research approach. Our research includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster that allows us to deploy custom services and delimit the necessary characteristics of our in-house solution. Also, the implementation's performance is tested based on the required times for updating the discovery solution according to service updates. Finally, some conclusions and modifications are pointed out based on the results, while also discussing possible enhancements.
SD-WAN, Edge computing, Virtualization, Kubernetes, Containers, Services
For More Details :
https://aircconline.com/ijcnc/V11N5/11519cnc07.pdf
Volume Link :
https://airccse.org/journal/ijc2019.html
A Secure Data Communication System Using Cryptography And Steganography
Saleh Saraireh, Department of Communications and Electronic Engineering, Philadelphia University, Amman, Jordan
The information security has become one of the most significant problems in data communication. So it becomes an inseparable part of data communication. In order to address this problem, cryptography and steganography can be combined. This paper proposes a secure communication system. It employs cryptographic algorithm together with steganography. The jointing of these techniques provides a robust and strong communication system that able to withstand against attackers. In this paper, the filter bank cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed. After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted message in the cover image by modifying the wavelet coefficients. The performance of the proposed system is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show that, the proposed system provides high level of security.
Steganography, Cryptography, DWT, Filter bank, PSNR
For More Details :
https://airccse.org/journal/cnc/5313cnc10.pdf
Volume Link :
https://airccse.org/journal/ijc2013.html
Visualize Network Anomaly Detection By Using K-means Clustering Algorithm
A. M. Riad ,and Nancy Awadallah1 Ibrahim Elhenawy2Ahmed Hassan3 1Faculty of Computer Science and Information Systems, Mansoura University, Egypt2Faculty of Computer Science and Information Systems ,Zagazig University, Egypt3Faculty of Engineering Mansoura University , Egypt
With the ever increasing amount of new attacks in today’s world the amount of data will keep increasing, and because of the base-rate fallacy the amount of false alarms will also increase. Another problem with detection of attacks is that they usually isn’t detected until after the attack has taken place, this makes defending against attacks hard and can easily lead to disclosure of sensitive information. In this paper we choose K-means algorithm with the Kdd Cup 1999 network data set to evaluate the performance of an unsupervised learning method for anomaly detection. The results of the evaluation showed that a high detection rate can be achieve while maintaining a low false alarm rate .This paper presents the result of using k-means clustering by applying Cluster 3.0 tool and visualized this result by using TreeView visualization tool .
Intrusion detection, Clustering, K-means, Kdd Cup 99, Cluster 3.0, Visualization, TreeView
For More Details :
https://airccse.org/journal/cnc/5513cnc14.pdf
Volume Link :
https://airccse.org/journal/ijc2013.html
On the Migration of a Large Scale Network from IPv4 to IPv6 Environment
Muhammad Yeasir Arafat1 Feroz Ahmed2and M Abdus Sobhan3 1Department of Electrical and Electronic Engineering, School of Engineering and Computer Science, Independent University, Bangladesh
This work mainly addresses the design a large scale network using dual stack mechanisms. We focused on the most important theoretical concepts of the IPv6 protocol, such as addressing, address allocation, routing with the OSPF and BGP protocols and routing protocols performance in dual stack network using GNS3 and Wireshark simulators. we have a tendency to measure a perfect model and a true large-scale network atmosphere victimization out there end-to-end activity techniques that focuses on a large-scale IPv4 and IPv6 backbone and created performance the IPv4 and IPv6 network. In this paper, we compiled IPv6 address planning in large scale network, performance statistics of each network in terms of TCP throughput, delay jitters, packet loss rate, and round trip time. It is found that, a minor degradation within the throughput of the TCP, delay jitter, a lower packet loss rate, and a rather longer round trip time are occurred in a real large scale dual stack network.
IPv6, IPv4, double stack, BGPv4, OSPFv3, ISP, throughput, TCP and RTT
For More Details :
https://airccse.org/journal/cnc/6214cnc10.pdf
Volume Link :
https://airccse.org/journal/ijc2014.html
Performance Analysis And Monitoring Of Various Advanced Digital Modulation And Multiplexing Techniques Of F.o.c Within And Beyond 400 Gb/s.
Sumant Ku. Mohapatra, Ramya Ranjan Choudhury, Rabindra Bhojray and Pravanjan Das, Department of Electronics & Telecommunication Engineering, Trident Academy of Technology, B.P.U.T, Bhubaneswar, Odisha, India
To achieve better calculative performance in optical fiber communication and for simplicity of implementation different digital modulation, detection and multiplexing techniques are used. These techniques maximize the spectral efficiency. This paper reviews a tabular comparative analysis with 3D graphical representation for different optical digital modulation formats and multiplexing techniques within and beyond 400 Gb/s. In this particular article we survey about different parameters related to digital fiber optic communication.
OFDM, Digital Modulation formats, Multiplexing techniques, QAM & WDM
For More Details :
https://airccse.org/journal/cnc/6214cnc13.pdf
Volume Link :
https://airccse.org/journal/ijc2014.html
A Deep Learning Technique For Web Phishing Detection Combined Url Features And Visual Similarity
Saad Al-Ahmadi1 Yasser Alharbi2, 1College of Computer and Information Science, Computer Science Department, King Saud University, Riyadh, Saudi Arabia2College of Computer and Information Science, Computer Engineering Department, King Saud University, Riyadh, Saudi Arabia
The most popular way to deceive online users nowadays is phishing. Consequently, to increase cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper, we propose an approach that rely on websites image and URL to deals with the issue of phishing website recognition as a classification challenge. Our model uses webpage URLs and images to detect a phishing attack using convolution neural networks (CNNs) to extract the most important features of website images and URLs and then classifies them into benign and phishing pages. The accuracy rate of the results of the experiment was 99.67%, proving the effectiveness of the proposed model in detecting a web phishing attack.
Phishing detection, URL, visual similarity, deep learning, convolution neural network.
For More Details :
https://aircconline.com/ijcnc/V12N5/12520cnc03.pdf
Volume Link :
https://airccse.org/journal/ijc2020.html
A Comprehensive Study Of Dscp Markings' Impact On Voip Qos In Hfc Networks
Shaher Daoud and Yanzhen Qu, School of Computer Science, Colorado Technical University, Colorado Springs, USA
Various factors can have a significant degrading impact on the residential Voice over Internet Protocol (VoIP) phone services’ quality. Hybrid fibre- coaxial (HFC) networks typically carry three types of traffic that include voice, data, and video. Unlike data and video, some delays or packet loss can result in a noticeable degraded impact on a VoIP’s phone conversation. This paper will analyze and assess VoIP traffic prioritization and its impact on VoIP’s quality of service (QoS) based on the concept of differentiated services code point (DSCP) markings. Call testing examines two types of calls. The first set of tests focus on calls that originate from a VoIP network and terminate on a signalling system 7 (SS7) network. The second experiment focuses on calls that originate from SS7 network and terminate on a VoIP network. The research results provide DSCP markings configurations that can improve phone conversations’ quality.
QoS , VoIP, DSCP Marking , jitter, HFC Network, MOS
For More Details :
https://aircconline.com/ijcnc/V11N5/11519cnc01.pdf
Volume Link :
https://airccse.org/journal/ijc2019.html