Volume 10, Issue 1, January 2019


Cross-correlation based Underwater Node Estimation Technique and a Concise Summary of Different Effects on it

Sadman Saffaf Ahmed and Md. Mashrur Islam

Department of Electronics & Telecommunication Engineering, RUET, Bangladesh
Department of Electrical & Electronic Engineering, RUET, Bangladesh

Abstract- To overcome the common problem, i.e., protocol complexity, of conventional underwater node estimation techniques, a statistical signal processing technique was proposed as an alternative. The technique uses cross-correlation as signal processing tool and hence it is called cross-correlation based underwater node estimation technique. This technique can overcome the protocol complexities, human interaction, over cost, etc., of conventional techniques. However, to introduce the readers with different technical aspects regarding this technique, the paper is introduced. We have used mean, and standard deviation as our estimation parameter to estimate nodes. At the same time, we have illustrated a brief discussion on effect of signal length, underwater bandwidth, etc., simultaneously in this paper. This writing can boost the researches in this field.

Keywords- Underwater Network, Wireless Sensor Network, Signal Processing and CHRIP

Download full paper PDF format (Page: 1-5)

Optimization of Logistic Supply Missions in Army Special Border Platoons Through a Heuristic Method

Daniel Alberto Pamplona and Claudio Jorge Pinto Alves

Air Transportation Department, Aeronautics Institute of Technology, Praça Marechal Eduardo Gomes, 50. 12280250 - São José dos Campos-SP, Brazil

Abstract- This article aims to show the application of Heuristic Methods for the optimization of logistical supply missions in Special Border Platoons in the Amazon region. In remote and distant from each other, the use of air transportation is necessary, and its correct planning an ongoing challenge. Using heuristic methods, particularly the Clarke & Wright heuristics adapted to the context, allowed a better allocation of resources seeking to avoid waste of time and especially fuel in a modal that stands out for its high cost compared to other.

Keywords- Logistics, Optimization and Heuristic Method

Download full paper PDF format (Page: 6-10)

Risk Management of Software Assessment in IoT based Healthcare System

Mariam Saleem

Department of Software Engineering, Government College University, Faisalabad, Pakistan

Abstract- Internet of Things (IoT) is a new technology used to collect data or communication between nodes using smart devices connected through some medium. There are many existing techniques have been implemented in IoT healthcare environment to collect and usage of people data. Further, security handling techniques are major issues in this environment. Analysis of these security barriers and challenges are discussed in this research also, solution to these problems are listed in this paper. In this paper, security is a major issue of entire system therefore, we also give some future recommendation to enhance the security of internet of thing base healthcare system.

Keywords- IoT, Healthcare, Security Issues and Big Data

Download full paper PDF format (Page: 11-16)

Detection of Networked Tunnelled Applications Using Statistical Approach

M. Yaseen and H. Tehsin

Department of Computer Science and Engineering, University of Engineering and Technology

Abstract- In tunnelling protocol, an application protocol is hidden inside another protocol in such a way to bypass the firewall criteria. Application-layer tunnelling pose a major security & resource consumption risk to networks since applications stopped by firewall policy like excessive data-rate games, end-to-end file sending, video streaming, audio, and chatting are done via permitted protocols such as HTTP, HTTPS and the firewall policy of security is violated. Identifying the original application active through a network is crucial for network performance, management, network abuse and security. Already existing methodologies for identifying applications active through the network, e.g., port number detection and packet deep data analysis methodologies are not always very effective, especially for applications using encrypted tunnelling techniques. This work proposes a methodology based on statistical approach to identify applications that are active using application layer tunnelling techniques. This work suggests that the distribution of packet size can be an effective parameter for identifying many applications running through the network, i.e., applications based on both UDP and TCP.

Keywords- HTTP, Protocol, Firewall, SSH, TCP and Tunnelling

Download full paper PDF format (Page: 17-22)

Abstract-

Keywords-

Download full paper PDF format (Page: -)

Abstract-

Keywords-

Download full paper PDF format (Page: -)