35 research outputs found

    Network performance evaluation of 6to4 tunneling

    Get PDF
    Several types of IPv6 transition mechanisms have been developed to facilitate the migration of IPv4 to the new protocol, IPv6. Although all transition mechanisms have the same objective, the process necessitates compliance with their respective capabilities. This paper focuses on the evaluation of the transition mechanisms namely 6to4 tunneling in terms of data transmission. The assessment is based upon experimental work that is conducted on a controlled environment. User-to-user network performance software is used to obtain the throughput, round trip time and tunneling overhead for TCP and UDP transmission protocol. The performance of TCP and UDP through 6to4 tunnel is then compared over the native IPv4 and IPv6 environment. As a result, the findings prove the ease of TCP data transmission via the tunnel compared to both native networks. In contrast, the UDP implementations show the slight difference for them. © 2012 IEEE

    A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers

    Get PDF
    Cloud computing is becoming a key factor in computer science and an important technology for many organizations to deliver different types of services. The companies which provide services to customers are called as cloud service providers. The cloud users (CUs) increase and require secure, reliable and trustworthy cloud service providers (CSPs) from the market. So, it’s a challenge for a new customer to choose the highly secure provider. This paper presents a cloud service brokering system in order to analyze and rank the secured cloud service provider among the available providers list. This model uses an autonomous and flexible agent in multi-agent system (MASs) that have an intelligent behavior and suitable tools for helping the brokering system to assess the security risks for the group of cloud providers which make decision of the more secured provider and justify the business needs of users in terms of security and reliability

    Knowledge of Information Security Awareness and Practices for Home Users: Case Study in Libya

    Get PDF
    The abundance of information available through the Internet, mobile applications, and cloud computing has made it convenient for users to access a wide range of information. However, this convenience comes with a cost as this information is constantly at risk of being compromised by cybercriminals and hackers. While the recognition of the potential dangers of information security is increasing in developed countries, in regions like Libya in North Africa, the level of protection for this information is insufficient. The purpose of this study is to examine the various factors that may influence or affect the users’ practice and awareness at home. The investigated factors are policy, behavior, training, knowledge of IT and education. In order to accomplish the goals of this study, a quantitative methodology was implemented. Specifically, a survey was created to assess the correlation between key factors and security awareness and practices in the home environment. The survey attracted 220 respondents and analyzed using Bivariate/Pearson Correlation to determine the relationship between the independent variable and the dependent variable. The result of the study showed that there was a moderate positive correlation between policy, knowledge of IT and education with security awareness and practice, but behavior factor has a low correlation. These results indicated that security awareness and practice level of employees at home are mostly at the middle level. It is hoped that the present study provides an initial step to focus on security training sessions among higher education employees to reflect new knowledge on the importance of security training to increase the knowledge of information security. It is hoped that the findings of this study will serve as a starting point for further research and focus on providing security information for public, which will help to reflect new knowledge on the importance of security training and increase awareness of information security

    Knowledge of Information Security Awareness and Practices for Home Users: Case Study in Libya

    Get PDF
    The abundance of information available through the Internet, mobile applications, and cloud computing has made it convenient for users to access a wide range of information. However, this convenience comes with a cost as this information is constantly at risk of being compromised by cybercriminals and hackers. While the recognition of the potential dangers of information security is increasing in developed countries, in regions like Libya in North Africa, the level of protection for this information is insufficient. The purpose of this study is to examine the various factors that may influence or affect the users’ practice and awareness at home. The investigated factors are policy, behavior, training, knowledge of IT and education. In order to accomplish the goals of this study, a quantitative methodology was implemented. Specifically, a survey was created to assess the correlation between key factors and security awareness and practices in the home environment. The survey attracted 220 respondents and analyzed using Bivariate/Pearson Correlation to determine the relationship between the independent variable and the dependent variable. The result of the study showed that there was a moderate positive correlation between policy, knowledge of IT and education with security awareness and practice, but behavior factor has a low correlation. These results indicated that security awareness and practice level of employees at home are mostly at the middle level. It is hoped that the present study provides an initial step to focus on security training sessions among higher education employees to reflect new knowledge on the importance of security training to increase the knowledge of information security. It is hoped that the findings of this study will serve as a starting point for further research and focus on providing security information for public, which will help to reflect new knowledge on the importance of security training and increase awareness of information security

    Kompetensi Guru Gred Jawatan DG 52 dalam melaksanakan Pembelajaran Maya Menggunakan Google Classroom : Satu Pemerhatian Awal

    Get PDF
    Tujuan utama artikel ini ialah untuk mengulas kompetensi dan kemahiran guru gred DG 52 dalam melaksanakan pembelajaran maya menggunakan Google Classroom. Ulasan sistematik ini dilaksanakan dengan mengenalpasti semua komponen kompetensi guru gred DG52 dengan merujuk kepada deskripsi tugas yang telah ditetapkan oleh kementerian. Ulasan sistematik ini dilaksanakan menggunakan metodologi carian pustaka di mana terdapat 1389 artikel dan laporan yang berkaitan dengan kata kunci yang ditetapkan yang didapati menerusi Eric, Elsevier, Sage dan Goggle Scholar. Selepas tapisan, 112 artikel didapati lebih sesuai dengan kompetensi yang ditetapkan namun, 12 artikel terpilih untuk ulasan kerana menepati kriteria yang ditetapkan. Ulasan kajian lepas mendapati bahawa terdapat aspek-aspek yang berkait rapat dengan kemahiran-kemahiran serta kompetensi guru gred DG 52

    Content Based Image Retrieval and Support Vector Machine Methods for Face Recognition

    Get PDF
    The development of biometrics is growing rapidly. The recognition as non-trivial element in biometrics is not only using fingerprints, but also human face. The purpose of this research is to implement both Content Based Image Retrieval (CBIR) and Support Vector Machine (SVM) methods in the face recognition system with a combination of features extraction. CBIR method interprets images by exploiting several features. The feature usually consists of texture, color, and shape. This research utilizes color, texture, shape and shape coordinate features of the image. The proposed algorithms are HSV Color Histogram, Color Level Co-Occurrence Matrix (CLCM), Eccentricity, Metric, and Hierarchical Centroid. SVM method is used to train and classify the extracted vectors. The result shows that the proposed system is 95% accurate in recognizing faces with different resolutions
    corecore