Volume 8, Issue 1, January 2017
Security Threats Towards Cognitive Radio in 4G LTE-Advanced Network: A Review
Gohar Mumtaz, Faisal Nawaz Khan, M. Junaid Arshad and Yasir Saleem
Department of Computer Science & Engineering, University of Engineering & Technology, Lahore, Pakistan
With the rapid growth in the advancement of technology, 4G LTE-Advanced using MIMO and OFDMA techniques, is being capable of providing high data rate and minimum delay but for the better efficiency and usage of wasted spectrum, Cognitive Radio (CR) is novel technology for spectrum regulation and management. In this paper, CR technology with 4G LTE-Advanced is summarized, followed by in depth analysis of security threats and possible counter measures towards the implementation of CR with 4G LTE-Advanced network, to ensure basic security concepts known as CIA triad. Furthermore, Security threats and their counter measures towards CRN, with respect to OSI layers are tabulated for new researchers.
— 4G LTE-Advanced, MIMO, OFDMA, CR, CIA Triad, and OSI layers
Download full paper PDF format (Page: 1-7)
A Self-healing Model for Web Service Composition in Dynamic Environment
Aram Alsedrani and Ameur Touir
College of Computer and Information Sciences, Department of Computer Science, King Saud University, KSA
Web service composition development is a complex and dynamic process. It is one of the challenges in distributed environments. Nowadays, the web environment becomes more dynamic due to the increase in the number of web services that are changing frequently. Therefore, the need for adaptive composition methods that act according to environment changes is advocated. Moreover, detecting changes and acting accordingly in the early stages of the composition will ensure the reliability and prevent, in some cases, the expensive re-planning process. We aim in this paper at proposing a web service composition model based on service clustering to react with service failure occurred during any phase of composition process.
— Web Services, Service composition, Service Clustering and Self-Healing Composition
Download full paper PDF format (Page: 8-12)
Analysis of Network Layer Attacks and their Solutions in MANET
Abida Aslam, Mehak Abbas, Muhammad Yasir Adnan and M. Junaid
University of Engineering & Technology, Lahore
A temporary network of wireless mobile hosts without the assistance of standard administration form mobile ad hoc network (MANET). It has dynamic topology because mobiles can enter and leave the network continuously. As MANET are wireless, dynamic and have no central administration, maintaining security in this network is difficult. The major goal of this paper is to discuss the security threats in MANET and their solution. Security criteria and attack type in MANET is also included in this paper.
— MANET, Infrastructure, Snooping, Replay Attack and Distributed Networks
Download full paper PDF format (Page: 13-16)
Tools and Techniques for Lexicon Driven Sentiment Analysis: A Review
Munir Ahmad, Shabib Aftab, Syed Shah Muhammad and Usman Waheed
Department of Computer Science, Virtual University of Pakistan
The growth of user’s generated content increased in microblogging platforms like Facebook, Twitter and Blogger in form of client reviews, comments and opinion. Using this bulk of helpful data is difficult to analyze and also a time consuming task. So it is needed to have such an intelligent text mining system that automatically analyze such vast data and categorize them into positive or negative class. Due to the noisiness in data, it is difficult to design such text mining systems because they suffer from mistakes of spelling, grammatical and improper punctuation. Opinion mining is a useful tool to monitor consumer’s feedback and public mood about certain product in terms of negativity or positivity. For example the management of customer relations can use these feedbacks and improve the products by keeping in view the complaints. Lexical tools are one of the famous and useful techniques for sentiment classification. Many extensions and modifications of these tools are available now days. The purpose of this research is to study the available lexical tools and techniques to raise an interest for this research area.
— Lexicon Driven, Sentiment Analysis, Techniques, Tools and Text Mining
Download full paper PDF format (Page: 17-23)
A Study of the Desirability Factors of Office Space Arrangement from the Viewpoint of Employees by the Analysis of Space Syntax Indices (Isovist, Integration, and Distance from the door)
Morteza Maleki, Seyed Majid Mofidi Shemirani and Ahmad Heidari
Iran University of Science & Technology, Iran
Shahid Beheshty University, Iran
Using the results of the assessment of desirability from the viewpoint of employees and the computer analysis of space syntax, the desirability factors of office space arrangement have been analyzed in the present study. To do the research, firstly a pictorial questionnaire was distributed among 113 employees in two offices of Tabriz city, Iran. Then, most of the participants were interviewed to obtain the desirable sitting places in the room. Next, using the space syntax indices and applying the space syntax software, the factors affecting the preferences of employees were analyzed. In this regard, three main indices, namely isovist, integration, and distance from the door have been studied. The significance and impact of the indices have not been similar and in some cases, "distance from the door" has had the highest impact and the "isovist" has had more impact than "integration". The difference between the spatial value of various parts of the room in terms of distance from the door and the position of the door in different cultures, the difference between the results obtained from female respondents and the male respondents in relation to the index of "isovist from outside", as well as the difference between the choices of individuals with different occupational ranks prove the significance of cultural and organizational factors.
— Desirability of Arrangement, Office Space, Space Syntax and Isovist
Download full paper PDF format (Page: 24-)