4 research outputs found

    An energy efficient acknowledgement-based method for selfish node detection and avoidance in open MANET

    Get PDF
    Mobile Ad-Hoc Networks (MANET) is a decentralized infrastructure with relatively low capacity of connections for communication with the special measures described as a collection of autonomous mobile nodes. In such networks, weak communication links and node mobility can lead to highly unpredictable and dynamically changing topologies. Open MANET is one of the types of MANET in which any node is able to join or leave the network. Thus, it is vulnerable in oppose of selfish nodes which they do not like to spend their resources to participate in network activities such as routing. This helps them to preserve their limited energy while they have a huge negative impact on the network performance and total energy usage. One of the category of methods to for selfish node detection and avoidance is acknowledgement-based methods. Negative Acknowledgement (NACK) is the best method for detecting and avoidance selfish node in this category. The NACK method has high level of packet delivery, and high throughput in opposed of misbehaving action. However, this method suffers from extra charge by number of routing overhead, and more energy consumption when number of selfish nodes or mobility of nodes are increasing. In this study, using the Selective Acknowledgement (SACK) a new selfish node detection method has been developed called S-NACK. This method uses SACK instead of full TCP over the NACK. The proposed method was implemented in NS2 and its performance was compared with NACK. The extensive simulation results showed that S-NACK reduces the network overhead and improves the energy consumption in comparison to NACK whereas the packet delivery ratio is almost similar at the same time

    HUMAN ERRORS IN COMPUTER RELATED ABUSES 1

    No full text
    The term “Human error ” can simply be defined as an error which made by a human. In fact, Human error is an explanation of malfunctions, unintended consequents from operating a system. There are many factors that cause a person to have an error due to the unwanted error of human. The aim of this paper is to investigate the relationship of human error as one of the factors to computer related abuses. The paper beings by computer-relating to human errors and followed by mechanism mitigate these errors through social and technical perspectives. We present the 25 techniques of computer crime prevention, as a heuristic device that assists. A last section discussing the ways of improving the adoption of security, and conclusion.

    Generation of potential wells used for quantum codes transmission via a TDMA network communication system

    Get PDF
    This paper proposes a technique of quantum code generation using optical tweezers. This technique uses a microring resonator made of nonlinear fibre optics to generate the desired results, which are applicable to Internet security and quantum network cryptography. A modified add/drop interferometer system called PANDA is proposed, which consists of a centred ring resonator connected to smaller ring resonators on the left side. To form the multifunction operations of the PANDA system-for instance, to control, tune and amplify-an additional Gaussian pulse is introduced into the add port of the system. The optical tweezers generated by the dark soliton propagating inside the PANDA ring resonator system are in the form of potential wells. Potential well output can be connected to the quantum signal processing system, which consists of a transmitter and a receiver. The transmitter is used to generate high-capacity quantum codes within the system, whereas the receiver detects encoded signals known as quantum bits. Therefore, an entangled photon pair can be generated and propagated via an optical communication link such as a time division multiple access system. Here, narrower potential wells with a full-width half-maximum of 3.58 and 9.57nm are generated at the through and drop ports of the PANDA ring resonator system, respectively, where the amplification of the signals occurs during propagation inside the system. Copyright © 2013 John Wiley & Sons, Ltd. A PANDA ring resonator system which is made of nonlinear fiber optic can be used to generate optical tweezers in the form of potential wells while the dark soliton propagates inside the system. This system is connected to an encoding unit in which entangled photon pair can be generated and propagated via an optical communication link such as a time division multiple access. Here, ultra-short potential wells with a full-width halfmaximum of 3.58 and 9.57nm could be generate

    Survey: video forensic tools

    No full text
    Due to extension of using CCTVs and the other video security systems in all areas, these sorts of devices have been introduced as the most important digital evidences to search and seizure crimes. Video forensics tools are developed as a part of digital forensics tools to analyze digital evidences and clear vague points of them for presenting in the courts Existing video forensics tools have been facilitated the investigation process by providing different features based on various video editing techniques. In this paper, some of the most popular video forensics tools are discussed and the strengths and shortages of them are compared and consequently, an alternative framework which includes the strengths of existing popular tools is introduced
    corecore