15 research outputs found

    A survey on wireless mesh networks: architecture, specifications and challenges

    Get PDF
    Wireless Mesh Network (WMN) is an emerging and practical wireless solution for metropolitan area networks to provide community broadband Internet access services by organizing and configuring nodes in the network efficiently and dynamically. In this survey, the concept of wireless mesh network has been described briefly as an emerging technology to provide Internet in large areas. Accordingly, the architecture of these networks has been explained regarding to the client meshing backbone, characteristics and advantages of wireless mesh networks have been specified, and the performance of different layers in during communication in these networks has been described. In addition, due to the performance of wireless mesh networks various issues and challenges are raised. Thus, these challenges have been specified in this paper and related research areas were proposed to solve defined challenges

    A Novel automatic voice recognition system based on text-independent in a noisy environment

    Get PDF
    Automatic voice recognition system aims to limit fraudulent access to sensitive areas as labs. Our primary objective of this paper is to increase the accuracy of the voice recognition in noisy environment of the Microsoft Research (MSR) identity toolbox. The proposed system enabled the user to speak into the microphone then it will match unknown voice with other human voices existing in the database using a statistical model, in order to grant or deny access to the system. The voice recognition was done in two steps: training and testing. During the training a Universal Background Model as well as a Gaussian Mixtures Model: GMM-UBM models are calculated based on different sentences pronounced by the human voice (s) used to record the training data. Then the testing of voice signal in noisy environment calculated the Log-Likelihood Ratio of the GMM-UBM models in order to classify user's voice. However, before testing noise and de-noise methods were applied, we investigated different MFCC features of the voice to determine the best feature possible as well as noise filter algorithm that subsequently improved the performance of the automatic voice recognition system

    Privacy issues and protection in secure data outsourcing

    Get PDF
    Utilizing database encryption to safeguard data in several conditions where access control is not sufficient is unavoidable. Database encryption offers an extra layer of security to traditional access control methods. It stops users that are unauthorized, such as hackers breaking into a system, and observing private data. Consequently, data is safe even when the database is stolen or attacked. Nevertheless, the process of data decryption and encryption causes degradation in the database performance. In conditions where the entire information is kept in an encrypted format, it is not possible to choose the database content any longer. The data must be first decrypted, and as such, the unwilling and forced tradeoff occurs between the function and the security. The suitable methods to improve the function are techniques that directly deal with the data that is encrypted without having to decrypt them first. In this study, we determined privacy protection and issues that each organization should consider when it decides to outsource own data

    Feasibility of Implementing Multi-factor Authentication Schemes in Mobile Cloud Computing

    Get PDF
    Abstract-Mobile cloud computing is a new computing technology, which provides on-demand resources. Nowadays, this computing paradigm is becoming one the most interesting technology for IT enterprises. The idea of computing and offloading data in cloud computing is utilized to overcome the inherent challenges in mobile computing. This is carried out by utilizing other resource providers besides the mobile device to host the delivery of mobile applications. However, this technology introduces some opportunities as new computing concept, several challenges, including security and privacy are raised from the adoption of this IT paradigm. Authentication plays an important role to mitigate security and privacy issue in the mobile cloud computing. Even some authentication algorithms are proposed for mobile cloud computing, but most of these algorithms designed for traditional computing models, and are not using cloud capabilities. In mobile cloud computing, we access to pooled computation resources and applying more complicated authentication schemes is possible. Using different authentication factors, which is called multifactor authentication algorithms, has been proposed for various areas. In this paper, feasibility of implementation of different kinds of multi-factor authentication protocols are discussed. Furthermore, the security and privacy of these algorithms are analyzed. Finally, some future directions are recommended

    Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6

    Get PDF
    The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of privacy and security. The process of authentication of users is usually needed at the time of connecting to a wireless network. The mobile users might wander away from their home networks and be approached by other network services. These network services would usually require the users' credentials to authorize the usage of the service. In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. Nevertheless, a few methods of authentication have been suggested to enhance the PMIPv6's performance since 2008 when this protocol was first established [1]; however, the issues of privacy are often ignored. This study attempts to evaluate the authentication methods of the PMIPv6 according to the anonymity of several network mechanisms. The findings of this study reveal that it is important to suggest an appropriate method of enhancing the protection and privacy of network mechanisms

    Fountainhead for peace

    Get PDF
    The emergence of an ‘African hub’ for dispute resolution at the University of Stellenbosch Business School symbolises a new, transformative path for the university, writes TERRY BELL

    The effective factors on user acceptance in mobile business intelligence

    No full text
    Mobile business intelligence used for business intelligence mobile service applications increasingly. According to Gartner (2011), global smartphone sales had arrived at 630 million in 2012, and are supposed to reach 1,105 million items in 2015. As a result, business intelligence users not only rely on desktop computers, while they as well want mobile access to joint and used data. Nevertheless, few studies have been consummate on mobile business intelligence services and the user acceptance rate of mobile BI is still moderately low. For these reasons, the current article centred on the significant of the factors and levels of mobile business intelligence user acceptance that affect the mobile business intelligence user Acceptance. The conceptual model planned and data collected between mobile business intelligence users and quantitative method used. The collected data, analysed by SPSS software. The result of data analysis exposed that how factors such as organization climate, information quality, system quality, society effect and individual effect were influenced user acceptance in mobile business intelligence applications.</p

    Energy efficient routing in wireless sensor networks based on fuzzy ant colony optimization

    No full text
    A Wireless Sensor Network (WSN) is a collection of sensor nodes that dynamically self-organizes themselves into a wireless network with- out the utilization of any pre-existing infrastructure. One of the major problems in WSNs is the energy consumption, whereby the energy will be caused to increase or reduce the network’s lifetime. In this paper, we propose an optimal routing protocol for WSN inspired by the foraging behavior of ants. The ants try to find existing paths between the source and base station. Furthermore, we have combined this behavior of ants with fuzzy logic in order for the ants to make the best decision. In other words, the fuzzy logic is applied to make the use of these paths optimal. Our algorithm uses the principles of the Fuzzy Ant Colony Optimization Routing (FACOR) to develop a suitable problem solution. The performance of our routing algorithm is evaluated by Network Simulation2 (NS2). The simulation results show that our algorithm optimizes the energy consumption amount, decrease the number of routing request packets and increase the network’s lifetime in comparison with the orig- inal AODV
    corecore