Search

  • Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Communications
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Letter to the Editor
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • critical-appraisal
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • in-memomoriam
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • non-scientific
  • Obituary
  • original-paper
  • original-report
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • review-paper
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • serologic-method-review
  • short-communication
  • short-report
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • In Jour Smart Sensing And Intelligent Systems
  • Advancements Of Microbiology
  • International Journal Advanced Network Monitoring Controls
  • South Australian Geographical Journal
  • Transport Problems
  • Statistics In Transition

 

Research Article | 01-September-2017

CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY

The Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mish-mash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether these

R. Kalaiprasath, R. Elankavi, R. Udayakumar

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 482–494

Article | 07-May-2018

The Establishment and Implementation of Information Network Security Plan

This paper explains the idea of information security and discusses the establishment of the security system of information network. By using the information system security engineering method, we will establish and improve the network security plan and disaster recovery plan through strict organization and management, adequate financial support, strong talent support and deep technical guarantee. This paper puts forward the overall strategic goal of the “people-oriented, to prevent the main

Wang Yuanyuan

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 104–107

Article | 01-April-2018

Improving Protection and Security Awareness Amongst Home User

The growth of the Internet brings threats to the end user, which affects the home users more severely. The result from the different surveys shows that these vulnerabilities affect home user very badly. As strong security, controls have been implemented in businesses to minimize losses, hackers and fraudsters have moved their attention towards end users, which are normally easier prey. The increase in the need of security amongst end users is an important task of the today. A small security

Muhammad Farhan, Muhammed Fazil Ali, Sajid Ahmed Khan, Syed Shaji Ul hassan

International Journal of Advanced Network, Monitoring and Controls, Volume 1 , ISSUE 1, –

Article | 01-April-2018

Improving Protection and Security Awareness Amongst Home User

The growth of the Internet brings threats to the end user, which affects the home users more severely. The result from the different surveys shows that these vulnerabilities affect home user very badly. As strong security, controls have been implemented in businesses to minimize losses, hackers and fraudsters have moved their attention towards end users, which are normally easier prey. The increase in the need of security amongst end users is an important task of the today. A small security

Muhammad Farhan, Muhammed Fazil Ali, Sajid Ahmed Khan, Syed Shaji Ul hassan

International Journal of Advanced Network, Monitoring and Controls, Volume 1 , ISSUE 1, –

Research Article | 13-December-2017

Adaptive Security Modules in Incrementally Deployed Sensor Networks

Distributed wireless sensor networks often suffer problems on detecting malicious nodes, which always bring destructive threats. Thus, sensor networks have to supply authentication services for sensor identity and data communication. As matter of fact, intrusion detection and prevention schemes are always integrated in sensor security appliances so that they can enhance network security by discovering malicious or compromised nodes. This paper provides adaptive security modules to improve

Meng-Yen Hsieh, Yueh-Min Huang

International Journal on Smart Sensing and Intelligent Systems, Volume 1 , ISSUE 1, 70–86

Article | 30-November-2019

Design and Research of Security System in University Laboratory

I. INTRODUCTION In the field of security, with the diversification of networking methods, hardware and software platforms and application technologies, the implementation of security systems has become more and more diverse. At present, the laboratory security system has a large number of alarm constraints and redundancy, and poor real-time monitoring. In response to this series of problems, this paper uses the Internet of Things and other related technologies to carry out research work on the

Ding Li, Shi Xuerong, Zhang Dujuan, Su Yulei

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 2, 39–46

Article | 01-March-2012

HSCLOUD: CLOUD ARCHITECTURE FOR SUPPORTING HOMELAND SECURITY

Governmental institutions all over the world are trying to increase the level of security of their countries emphasizing the usage Information Technology solutions. We believe that Cloud Computing may strongly help Homeland Security, since it offers a very flexible support for organizing and managing heterogeneous systems, providing huge amount of processing, storing and sensing resources. In this work we introduce a new Cloud architecture able to virtualize different types of sensing

M. Fazio, M. Paone, A. Puliafito, M. Villari

International Journal on Smart Sensing and Intelligent Systems, Volume 5 , ISSUE 1, 246–276

Article | 30-November-2018

Application of Chaotic Encryption in RFID Data Transmission Security

the wireless transmission between reader and tag is considered as an unsafe channel. The basic components of the RFID system are shown in the figure: Figure 1. Diagram of the components of the RFID system. RFID technology has been widely used in various fields due to its low cost, fast recognition speed and long service life, such as warehouse transportation management, train/car identification, baggage security inspection, access control attendance and so on. However, a lot of security

Jianfang Yang, Baolong Liu, Huimin Yao

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 90–96

Article | 30-November-2018

A CEP Privacy Security Access Control Framework Based on Event Attribute Detecting Tree

processes and content of the complex event processing and output are open. That is to say, not only legal advanced application can utilize the CEP engine to obtain valuable information, but also illegal users are also able to acquire any necessary information for their criminal behaviors. This presents the CEP technology with huge responsibility with respect to the privacy security protection in detecting information. Up to now, there are few studies on CEP privacy security access control, thus the

Bo Hong, Xin Jing

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 3, 77–84

Article | 30-November-2018

From Network Security to Network Autonomous

database before it can be redirected to the top-level domain name server. III. INTERNET ACCESS AND SECURITY Any network access in the world should first visit the United States, and now some people say that many visits are not going abroad, and indeed some businesses do not feel abroad for the time being. In fact, the mirror root servers are working and cache servers are working. The Internet set up mirror servers in some countries without root servers, but these servers are completely controlled by

Yubian Wang, Shebzukhov Yuri

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 61–65

Article | 01-June-2016

IOT-1-PASS-SECURITY: 1(ONE)-PASS AUTHENTICATED KEY AGREEMENT PROTOCOL FOR ENERGY CONSTRAINT IOT APPLICATIONS

IoT data security is one of the core unresolved challenges in IoT community. Lack of resource-efficient authenticated secure key exchange methods among resource- constrained IoT devices makes man-in-the-middle attacks a serious vulnerability. In this regard, we propose 1(One) pass Authenticated Key Agreement (AKA) protocol for IoT applications. This protocol requires only one round of communication among the sender and receiver to establish a secure session, providing a balance between security

Mehrdad Aliasgari, Garrett Chan, Mohammad Mozumdar

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 598–615

Research Article | 01-September-2017

A NEW APPROACH FOR CLOUD DATA SECURITY: FROM SINGLE TO CLOUD-OF-CLOUDS

In the corporate world, a large number of people store their data on clouds. For doing this they need to give their confidential data in the hands of the third party, commonly known as service providers. These cloud service providers cannot be trusted since the complete data is stored in one single cloud. This increases security risks to the user’s sensitive data. Due to this issue of data integrity risk and service availability failure, the concept of “Cloud-of-Clouds” comes into picture

R. Kalaiprasath, R. Elankavi, Dr. R. Udayakumar

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 604–613

Article | 01-March-2015

A STUDY OF X-RAY MACHINE IMAGE LOCAL SEMANTIC FEATURES EXTRACTION MODEL BASED ON BAG-OFWORDS FOR AIRPORT SECURITY

The aviation security at the airport has been faced with increasingly severe situations since the 9-11 event. It’s of utmost importance to train airport X-ray machine screener’s image recognition competency. So they can prevent terrorists from bringing dangerous articles in their carry-on or checked bags. However, usually the luggages are placed in different positions and the density & volume of articles differ greatly. As a result, dangerous articles show a variety of X-ray image features

Ning Zhang, Jinfu Zhu

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 1, 45–64

Research Article | 13-December-2017

AUDIOVISUAL SENSING OF HUMAN MOVEMENTS FOR HOME-CARE AND SECURITY IN A SMART ENVIRONMENT

This paper presents the necessity and possibility of smart sensing using a multitude of sensors such as audio and visual sensors for human movement detection for home-care and home security applications in a smart environment. We define an event and spatial relationship based approach to the problem. Use of multisensory information to even detection is proposed and its prototype implementation to detect events like falling, walking, standing, shouting etc. are presented. Use of audio sensor

Liyanage C De Silva

International Journal on Smart Sensing and Intelligent Systems, Volume 1 , ISSUE 1, 220–245

Article | 11-January-2021

Imperative to Build Network Security System and Speed Up the Future Network Construction

others. Core technologies cannot be bought and critical infrastructure cannot be sought. The only possibility is to rely on independent innovation, opening up a new network system, with the new architecture, a new design, new technology, new resources, new standard and new application space to open up a new network, the network construction of new frontier has sovereign and independent control of network security system, set up national network defense system, and for the enterprise and society to

Aiqun Wu, Zhangxing Gao

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 4, 75–81

Article | 16-December-2013

STATE OF THE ART ON SECURE AND LOW COST RFID AUTHENTICATION PROTOCOLS FOR RFID BASED VEHICLE LICENSE PLATE

RFID technology has many potential applications that would ease object identification seamlessly. One of its potential benefits to government is the adoption of RFID tag as embedded smart material within vehicle license plate. However, adoption of RFID in vehicle license plate is fragile from various RFID attacks while efforts to improve its security will lead to additional cost. Enhancing RFID security without extra cost poses new challenges to researchers in the area. This study aims to

Irfan Syamsuddin

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 5, 1949–1969

Article | 30-November-2019

A Study of Edge Computing Offloading Based on Security

of the MEC are sufficient, and the problem of insufficient edge computing resources exists in realistic production environments with multi-user conditions. However, the above literature does not consider the impact of security issues on system performance. Security issues such as privacy breaches may be encountered during the offloading process, so security issues are equally important in the study of edge computing offloading. Unlike the aforementioned literature, this paper designs a secure

Luo Pei, Lei Juchao

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 2, 58–63

Article | 01-March-2015

IRIS-FACE FUSION AND SECURITY ANALYSIS BASED ON FISHER DISCRIMINANT

With the development of society and science technology, the information security becomes more and more important for people and nation. In this paper, we focus on the technology of iris-face fusion in multi-mode sense in order to find an algorithm to get a better recognition performance. Firstly, we introduce the feature extraction of iris and face, and fusion the features using different algorithms. By simulation, we find out the recognition performance with different fusion methods, which

Qihui Wang, Bo Zhu, Yo Liu, Lijun Xie, Yao Zheng

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 1, 387–407

Article | 03-December-2014

SECURITY METHOD FOR COMBINATION STEGANOGRAPHY ALGORITHMS ON TRANSFORM DOMAIN FOR JPEG IMAGES

Steganography is the act of hiding a message inside another message in such a way that can only be detected by its intended recipient. In any communication, security is the most important issue in the world today. It created a lot of data security and steganography algorithms in the past decade, and that worked motivation for our research. In this paper, Security Method for Combination Steganography Algorithms on Transform domain for JPEG images, we have designed a system that will allow the

Hamdan L. Jaheel, Zou Beiji

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 4, 1962–1979

Article | 08-April-2018

A Mobile Terminal Security Strategy Based On the Cloud Storage

With the emergence of mass storage systems and the development of the Distributed File System, Cloud storage system has become the focus of the industry. The cloud storage services on mobile terminal have been putted on the agenda based on the rapid development of intelligent mobile terminal. Based on the analysis of the architecture of HDFS and Dynamo, a mobile Terminal Security strategy is presented in this paper. The database technology and the dynamic consistent hashing algorithm are

Wang Hui, Tang Junyong

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 2, 46–59

Research Article | 01-December-2011

Type-2 Fuzzy Kalman Hybrid Application for Dynamic Security Monitoring Systems based on Multiple Sensor Fusion

Multiple sensors fusion plays a major role in situation awareness, especially in modern dynamic security monitoring and tracking applications. In this paper, we focus on a specific effective set of complementary sensors [Laser (for speed measurements), Sonar (for space scanning) and RF (for access rights)]. A novel multi-agent system is obtained by fusing the above types of sensory data taking advantages of similarity and complementarity concepts. Furthermore, Kalman Filter is utilized to track

T. K. Dakhlallah, M. A. Zohdy, O.M. Salim

International Journal on Smart Sensing and Intelligent Systems, Volume 4 , ISSUE 4, 607–629

Research Article | 15-February-2020

Marine based Wireless Sensor Networks: Challenges and Requirements

Marine environmental monitoring based on wireless sensor networks (WSN) is a challenging area of research due to the instability of the water field. Due to the characteristics of the water environment, there are certain considerations which must be taken into account before the establishment of marine based wireless sensor networks. These include the deployment of wireless nodes (WNs), energy consumption, network connectivity and security. This paper compares and contrasts the basic parameters

Walid Elgenaidi, Thomas Newe

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–5

research-article | 30-November-2018

Integrity Assurance of OTA Software Update in Smart Vehicles

; Riggs et al., 2019): First, a real-time SW update can mitigate the cost problems caused by the vehicle guarantee. Second, a SW update related to security vulnerability can be done as soon as possible against a zero-day attack. Third, the costs of physical recall can be eliminated, and the time of the guests or users can be saved. Fourth, the SW update can be done continuously and frequently. In contrast, the disadvantages of an OTA SW update are as follows: if the SW update is done by the update SW

Geunhyoung Kim, Im Y. Jung

International Journal on Smart Sensing and Intelligent Systems, Volume 12 , ISSUE 1, 1–8

Article | 30-November-2018

Research on Trust-Role Access Control Model in Cloud Computing

cloud computing, cloud computing service security failures occur frequently, and the cloud security issues involved are increasingly prominent. For example, data stored in the cloud makes users have no absolute control over it, and cannot guarantee data integrity and confidentiality. Sex, and cloud service providers have some degree of untrustworthiness, etc., and this potential data security problem constrains cloud computing. Development in archival data management, and access control is one of

Yuchen Wu, Pingping Liu

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 75–80

Article | 05-June-2013

A NOVEL TRI-FACTOR MUTUAL AUTHENTICATION WITH BIOMETRICS FOR WIRELESS BODY SENSOR NETWORKS IN HEALTHCARE APPLICATIONS

User authentication, as a fundamental security protocol, has been addressed with more concerns recently. Unlike normal authentication processes invoked by a user to access the network, biosensors with healthcare applications normally need to be validated automatically, followed by data transmission to the remote server without any explicit request. Hence, implied authentication procedure involved in such application scenarios shall be addressed. In this paper, a novel tri-factor user

Chen-Guang He, Shu-Di Bao, Ye Li

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 3, 910–931

Article | 08-April-2018

Image Watermarking Encryption Scheme Based on Fractional Order Chaotic System

embedded into the original image by the discrete wavelet transform. Finally, the security analysis of the proposed watermarking algorithm is presented. The experimental results show that the proposed watermarking scheme has high security, and it has stronger robustness and invisibility compared with the previous work.

Dawei Ding, Zongzhi Li, Shujia Li

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 2, 79–89

Article | 01-June-2015

A STUDY ON OPTIMIZATION METHODS OF X-RAY MACHINE RECOGNITION FOR AVIATION SECURITY SYSTEM

Traditional X-ray machine image recognition methods for airport security system have difficulties in recognition and are prone to result in recognition errors due to the impact of placing angle, density and volume of detected objects. This paper accurately describes the image features of X-ray machine visual image, carries out SVM classification after a visual dictionary is formed and enhances the accuracy of image discrimination by means of robust acceleration. The experimental results

Ning Zhang

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 2, 1313–1332

Article | 01-December-2012

HOME REAL-TIME REMOTE MONITORING SYSTEM BASED ON EMBEDDED LINUX

Remote video monitoring is an important way of residential security. Due to some deficiencies of traditional home monitoring system such as high cost, large power consumption and difficult maintenance, this paper designs an economical and practical home real-time remote monitoring system. This system includes hardware design and software design. The hardware analyzes and compares the processor of different architectures to configure the model of microprocessors and the composition of peripheral

Huang Feijiang, Li Zhaofeng, Lu Xiaochun, Liu Guangcan, Sun Liping, Wang Yingde, Chen Weibing, Xiao Xinle

International Journal on Smart Sensing and Intelligent Systems, Volume 5 , ISSUE 4, 896–910

Research Article | 15-February-2020

Comparison and overview of Wireless sensor network systems for Medical Applications

particular focus on communication platforms and their security. These parameters will be compared and contrasted, and the main components necessary to form an ideal medical WSN will be highlighted.

Avijit Mathur, Thomas Newe

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–6

Research Article | 01-September-2017

MULTI_LEVEL SECURE FROM WEB INTRUSION AND QUERY ATTACKS ON WEB DATABASE

Most data frameworks and business applications assembled these days have a web frontend and they should be generally accessible to customers, representatives and accomplices around the globe, as the computerized economy is turning out to be increasingly pervasive in the worldwide economy. Strategy and a model instrument to assess web application security components. In this paper, we along these lines propose to make trusted equipment a top notch national in the safe information administration

Nirmala Kumari R, Mala V

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 271–283

Article | 01-September-2016

TESTBED EVALUATION OF SELF-ADAPTIVE TRUST MODEL FOR COOPERATIVE GEOGRAPHIC ROUTING IN WIRELESS SENSOR NETWORKS

Wireless Sensor Networks (WSNs) are often deployed in remote and hostile environments to monitor the mission critical tasks. In such environments, cooperation among nodes plays a vital role for successful execution of protocol operations. However, node cooperation may not be guaranteed when malicious activities are present in the WSNs. Trust management based security has received considerable attention to use along with cryptography based security to improve the cooperation among nodes in the

P. Raghu Vamsi, Krishna Kant

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 3, 1362–1383

Article | 11-April-2018

Intrusion Detection Based on Self-adaptive Differential Evolutionary Extreme Learning Machine

Nowadays with the rapid development of network-based services and users of the internet in everyday life, intrusion detection becomes a promising area of research in the domain of security. Intrusion detection system (IDS) can detect the intrusions of someone who is not authorized to the present computer system automatically, so intrusion detection system has emerged as an essential component and an important technique for network security. Extreme learning machine (ELM) is an interested area

Junhua Ku, Bing Zheng, Dawei Yun

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 54–60

Research Article | 01-September-2017

INSTANCE VEHICLE MONITORING AND TRACKING WITH INTERNET OF THINGS USING ARDUINO

The Vehicle Tracking System has the capability of finding the Vehicle location, Gas Leakages, Vehicle Speed, and Vehicle Accident and at the same time notifies the owners of the vehicle through a GSM network with an SMS alert message. The drivers require their presence to their family or to their respective one’s. The main aim is to design a low cost and an efficient vehicle tracking and vehicle security circuit based on an Arduino microcontroller. This system can be made as a backup sector

Dhanalakshmi, A.Ezil Sam Leni

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 123–135

Article | 01-June-2016

SURFACE FOLLOWING WITH AN RGB-D VISION-GUIDED ROBOTIC SYSTEM FOR AUTOMATED AND RAPID VEHICLE INSPECTION

applications in automated vehicle inspection, cleaning, and security screening. In order to efficiently navigate the robotic manipulator along the vehicle’s surface within regions of interest that are selectively identified, an efficient and accurate integration of information from multiple RGB-D sensors and robotic components is proposed. The main components of the proposed approach include: automated vehicle category recognition from visual information; RGB-D sensors calibration; extraction of specific

Danial Nakhaeinia, Pierre Payeur, Alberto Chávez-Aragón, Ana-Maria Cretu, Robert Laganière, Rizwan Macknojia

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 419–447

Article | 30-November-2018

Remote ECG System Data Encryption Scheme

completely eliminated, the patient data security can still be effectively protected in the presence of the above security management vulnerability. II. DESIGN OF INFORMATION SECURITY SCHEME FOR REMOTE ECG SYSTEM The key protocol developed in this paper contains mechanisms for key generation, storage, deployment, and verification. This scheme takes into account various attacks such as brute force cracking by attackers and interception of network communication packets. A. Hardware risk control scheme

Liu Xin, Wei Zhiqiang

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 4, 31–34

Article | 01-June-2016

TRUST AWARE DATA AGGREGATION AND INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKS

Data Aggregation (DA) is one of the most frequently used techniques in Wireless Sensor Networks (WSNs) to improve the network lifetime. It involves gathering, consolidating, and routing the sensory data collected by sensor nodes. However, research studies have demonstrated that the dependability of the DA process affects severely when malicious nodes are present in the network. Many security solutions using cryptography and Intrusion Detection System (IDS) have been proposed in the literature

P. Raghu Vamsi, Krishna Kant

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 537–562

Article | 07-April-2018

Review on RFID Identity Authentication Protocols Based on Hash Function

Radio frequency identification (RFID) is one of the key technologies of Internet of Things, which have many security issues in an open environment. In order to solve the communication problem between RFID tags and readers, security protocols has been improved constantly as the first choice. But the form of attack is also changing constantly with the development of technology. In this paper we classify the security protocols and introduce some problems in the recent security protocols.

Yang Bing, Liu Baolong, Chen Hua

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 1, 72–82

Research Article | 01-September-2017

SECURE ROUTE DISCOVERY FOR DYNAMIC SOURCE ROUTING IN MANETs

Mobile ad hoc networks (MANETs) are collections of wireless mobile devices with restricted broadcast range and resources and no fixed infrastructure. Communication is achieved by communicating data along suitable routes that are dynamically discovered and maintained through association between the nodes. Discovery of such routes is a major task both from good organization and security points of view. Recently a security model tailored to the specific requirements of MANETs. A novel route

M. Anto Bennet, G. Vijayalakshmi, P. Shenbagavalli, M. Vijayalakshmi, S. Saranya

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 426–445

Article | 30-November-2018

Cyber Security Cookbook for Practitioners

? ➢ What resources are required? ➢ Risk Management ➢ Measuring progress and success The basic security principles of Least Privilege, Defense in Depth, and Separation of Duties are observed. These concepts will drive many of the security design decisions, just like Confidentiality, Integrity, Availability, and Accountability will inform the requirements for controls to mitigate specific risks. (Wheeler, 2011, Page 19). II. ENTERPRISE RISK MANAGEMENT Risk Management is defined as “the function of

Devesh Mishra

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 3, 88–105

Article | 01-December-2012

LIGHTWEIGHT TRUSTED ID-BASED SIGNCRYPTION SCHEME FOR WIRELESS SENSOR NETWORKS

Wireless sensor networks (WSN) are usually deployed in hostile environments, which having a wide variety of malicious attacks. As various applications of WSN have been proposed, security has become one of the big research challenges dan is receiving increasing attention. In order to insure the security of communication in wireless sensor networks, we proposed a new ID-based signcryption scheme using bilinear pairing. Under the computational Diffie-Hellman assumption, the security of the scheme

Zhimin Li, Xin Xu, Zexiang Fan

International Journal on Smart Sensing and Intelligent Systems, Volume 5 , ISSUE 4, 799–810

Article | 30-November-2018

IPV9 is the Foundation of the Future Digital World

increase in the bandwidth of international bandwidth is seriously related to the increase in the total amount of information consumption in the country, and the sum of the income of Internet companies and the income of operators often accounts for less than half of the total amount of information consumed in China. Therefore, the more the network economy develops, the greater the contribution to the United States! Security is more restricted by the United States! Since every time the network visits go

Peide Lou, Fei Xu

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 1–6

Article | 30-November-2018

Application of the Source Encryption Algorithm Model in the Power Industry

protection, the construction of data security grading system, based on different security levels to determine the open rights of data, to ensure the efficiency of business execution and smooth management. Internet of things technology is developing rapidly, but the corresponding infrastructure and security protection capabilities do not adapt to it. Network security is the biggest hidden danger of the power Internet of things. On the one hand, non-ip communication protocol is often used to transmit data

Jiao Longbing

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 68–73

Article | 24-April-2018

Fine-grained Access Control Scheme Based on Cloud Storage

Cloud storage originates from cloud computing, and brings new model of data sharing and storage, which provided great convenience for users. However, cloud environment confronts with many problems, and one of the most important problems is the security problem. This paper researched on security problem based on encryption, and proposed a secure and efficient scheme according to system characteristics of data storage on cloud platform, and applied it in cloud storage system with fine-grained

Xiaojie Niu

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 207–210

Research Article | 15-February-2020

Feasibility Evaluation on an Instant Invader Detection System with Ultrasonic Sensors Scattered on the Ground

Increasing interest in security demands privacyaware security systems, which do not use camera, especially for personal home security. As a candidate for this purpose, this paper presents an instant invader detection system that finds an invader by using small sensor nodes distributed on the ground. Once a sensor node detects a suspicious phenomenon, thisinformationiswirelesslytransmittedtothebaseinthehouse. Thispaper,asafirststep,evaluatesthefeasibilityoftheproposed

Ami Iokibe, Masanori Hashimoto, Takao Onoye

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–6

Article | 14-October-2020

Interview with the Inventor of the Future Network IPV9

network number of each international and operator. The effective URL is only 64 bits, which cannot meet the needs of the Internet of Things mobility and the number of URLs. Therefore, IPV9 is a milestone for China to maintain national network sovereignty, guarantee the security of network information, break the monopoly of the US Internet, and promote the rapid development of a new generation of Internet with independent control and secure interconnection. III. FUTURE NETWORK PATENT China IPV9 has

Guoshao Chen, Yubian Wang

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 3, 73–79

Article | 05-September-2013

A Novel Key Chain-Based En-route Filtering Protocol For Wireless Sensor Networks

novel security routing protocol (KCEFP) based on one-way key chain. The proposed protocol can resist false data injection, replay and IDs attacks, and if the endorsement report is modified, the forwarding nodes can verify the endorsement report by the key chain, and filters out the fabricated packet right now. The security and performance analysis shows that our scheme provides a high security level and the energy savings significantly increasing with the number of fabricated report packet

Zhiming Zhang, Xiaoyong Xiong, Jiangang Deng

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 4, 1637–1652

Article | 24-December-2021

ANALYSIS OF PEDESTRIAN BEHAVIOR AT CROSSWALKS AND EVALUATION OF FUNCTIONING PEDESTRIAN CROSSINGS

Piotr GORZELAŃCZYK, Jakub BAZELA

Transport Problems, Volume 16 , ISSUE 4, 135–147

Article | 05-September-2013

ADVANCED SECURE USER AUTHENTICATION FRAMEWORK FOR CLOUD COMPUTING

Cloud Computing, as an emerging, virtual, large-scale distributed computing model, has gained increasing attention these years. Meanwhile it also faces many security challenges, one of which is authentication. Lots of researches have been done in this area. Recently, Choudhury et al proposed a user authentication framework to ensure user legitimacy before entering into the cloud. They claimed their scheme could provide identity management, mutual authentication, session key agreement between

Rui Jiang

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 4, 1700–1724

Article | 01-September-2016

EVALUATION OF HYBRID TRUST MODELS USING ANT COLONY OPTIMIZATION IN WIRELESS SENSOR NETWORKS

Wireless sensor networks (WSNs) are prone to various kinds of threats and are subjected to several constraints like energy, communication overhead and lifetime. Application of bio-inspired algorithms based trust models has shown significant improvement in the security mechanism of the wireless sensor networks. This paper presents a brief survey on application of Ant Colony Optimization (ACO) and significance of trust models in WSNs. ACO application in routing, increase in lifetime, energy

G. Edwin Prem Kumar, K. Baskaran, R. Elijah Blessing, M. Lydia

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 3, 1243–1260

Article | 11-April-2018

A Remote-Attestation-Based Extended Hash Algorithm for Privacy Protection

Compared to other remote attestation methods, the binary-based approach is the most direct and complete one, but privacy protection has become an important problem. In this paper, we presented an Extended Hash Algorithm (EHA) for privacy protection based on remote attestation method. Based on the traditional Merkle Hash Tree, EHA altered the algorithm of node connection. The new algorithm could ensure the same result in any measure order. The security key is added when the node connection

Yongxiong Zhang, Liangming Wang, Yucong You, Luxia Yi

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 186–189

Article | 07-May-2018

Design of University Resource Website and Security Measures in IPV6

Chunmei Li, Peng Cui, Xinke Zhou, Ze Xiao

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 1, 54–57

Article | 30-November-2018

Design and Research of New Network Address Coding

other aspects. Although the use of NAT (“Network Address Translation”), CIDR (“Classless Inter-Domain Routing”) and other technologies can alleviate the IPv4 crisis to some extent. But in fact, it has not fundamentally solved the problem. At the same time, it will bring new problems in cost, quality of service, security and other aspects, posing greater challenges. To solve the problem of insufficient IPv4 addresses, scientists proposed IPv6. However, due to the limitations of the technology era

Yufeng Lai, Jianping Xie, Xiaowei Cheng, Yuyu Li

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 29–38

Article | 04-November-2019

SELECTION PROCESS AS A KEY HUMAN ASPECT IN AIR TRAFFIC CONTROL

context of the current development of European security and the perception of the human factor as a critical element of security and safety in air transport. In doing so, the authors use content analysis, as the results of empirical surveys present the results of discrete research surveys and evaluations based on explorative methods.

David LANGR, Jindřich PLOCH, Petr RUDOLF, Stanislav SZABO, Iveta VAJDOVÁ

Transport Problems, Volume 14 , ISSUE 3, 75–84

Article | 30-November-2019

Research and Implementation of Future Network Router

are also exposed. For example, in the address space, performance, network security and routing bottlenecks, IPv4 makes it difficult to meet the needs of the Internet in the future. To solve the IPv4 many problems, IPv6, IPV9 and other Internet protocols have been born. A. The Production of IPV9 The new network covers three new technologies: address coding design, new addressing mechanism and new address architecture design[1]. It aims to build a core technology system based on the underlying IP

Sun Huai, Wang Zhongsheng

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 2, 10–22

Article | 01-June-2016

RANDOM KEY PRE-DISTRIBUTION SCHEME BASED ON KEY UPDATING

use the obtained communication key to decipher the source key, it affects only two nodes communicate with each other. To assure the communication security, the key updating was designed based on code segment. The analysis shows that the proposed scheme can meet the security requirement of key management, and it also has less computation cost and storage cost than the existing schemes.

ZHU Ling-Zhi, HE Rui, ZHANG Jun-Ling

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 979–996

Article | 30-November-2018

A Secure Voice Signature Based Lightweight Authentication Approach for Remote Access Control

I. INTRODUCTION The adoption of cryptography in security system has not only enhanced the integrity of data and confidentiality but obviously contribute to the acceptability of most of the new technologies. However, cryptography based security schemes may not proffer universal security solution to most systems or networks. This is due to the restrictive processing power and memory resources, wider key generation procedure and operability that characterised these class of cryptograph based

Oladayo Olufemi Olakanmi, Aminat Shodipo

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 69–74

Research Article | 24-October-2017

EVALUATION OF USER’S PERCEPTIONS REGARDING PERFORMANCE INDICATORS OF INTERCITY BUS TERMINALS IN LAHORE, PAKISTAN

This study aims to evaluate the intercity bus terminals in metropolitan Lahore, Pakistan. In this regard eleven intercity bus terminals of Lahore (three government-owned & eight privately owned) were selected. Evaluation of performance indicators (PIs) for a sustainable design of intercity bus terminals was conducted with the help of different surveys. Six PIs on user perception were evaluated, i.e., safety and security, access, information, connection and reliability, environment and allied

Saba IKHLAQ, Muhammad Ashraf JAVID, Tanvir Iqbal QAYYUM

Transport Problems, Volume 12 , ISSUE 2, 123–136

Research Article | 01-September-2017

AN ANTI-EMULATION STRUCTURE FOR INTERNET DESPOSITORY USING SECURED IMAGE VALIDATION SCHEME

shares that as been stocked in independent database servers such that the authentic image can be revealed only when they are equally gathered. The specific sheet of representation does not declare the status of the original visual image which was generated previously. Once the unique visual image is discovered to the user then that picture can be used as a password for detecting phishing. In the proposed system, privacy enabled secure database is built. The security level is much enhanced from its

Anupriyan K, Santhosh Kumar C, Nagaraj N

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 62–68

Research Article | 15-February-2020

Image Quality Testing: Selection of Images for Assessing Test Subject Input

Determining image quality is dependent to some degree on human interpretation.  Although entirely subjective methods of evaluating image quality may be adequate for consumer applications, they are not acceptable for security and safety applications where operator interpretation may lead to missing a threat or finding threats where they do not exist.  Therefore, methods must be developed to ensure that the imagery used in security and safety applications are of sufficient quality to

John Jendzurski, Nicholas G. Paulter, Francine Amon, Eddie Jacobs, Al Bovik, Todd Goodall

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–4

Research Article | 20-February-2013

SECRECY TRANSFER FOR SENSOR NETWORKS:FROM RANDOM GRAPHS TO SECURE RANDOM GEOMETRIC GRAPHS

Zhihong Liu, Jianfeng Ma, Yong Zeng

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 1, 77–94

Article | 30-November-2018

Violence Cracking Technology of SSH Service Based on Kali-Linux

All SSH is an acronym for Secure Shell, developed by the IETF’s Network Working Group, SSH is a security protocol based on the application layer and transport layer. SSH is a protocol that provides security for remote login sessions and other network services. The SSH protocol can effectively prevent information leakage during remote management. SSH was originally a program on a UNIX system and later quickly expanded to other operating platforms. SSH can make up for vulnerabilities in the

Limei Ma, Dongmei Zhao, Yijun Gao, Chen Zhao

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 35–39

Research Article | 22-May-2019

DEADLY MICROBES – MICROBES USED AS A BIOLOGICAL WEAPON

Due to the development of civilization, people’s needs and expectations increase. The global development of civilization, the desire of some countries to expand their borders and achieve a higher political, social and military influence, cause insecurity among the people. Security is one of the main factors for the proper functioning of individuals and whole societies. Currently, a major threat to people is terrorism. Especially dangerous is the use of biological weapons for this purpose

Karol Abramczyk, Anna Gałązka

Postępy Mikrobiologii - Advancements of Microbiology, Volume 56 , ISSUE 4, 395–404

Article | 07-May-2018

A Searchable Re-encryption Storage Method in Cloud Environment

paper has better security and reliability.

Wang Hui, Hong Bo, Tang Junyong

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 89–94

Article | 30-November-2018

Research and Design of Next Generation Internet (IPV9) Datagram

, big data and cloud storage, IPv6 has some shortcomings in its address structure design, security and network sovereignty. The Chinese researchers developed a new generation Internet (IPV9) datagram by researching the existed IPv4 and IPv6, and it is based on the method of assigning addresses to computers connected to the Internet by full decimal character code. It is a subsequent version with RFC1606, RFC1607, a new generation of network data structure, it is not the updating of IPv4 and IPv6, it

Zhongsheng Wang, Jianping Xie, Zhao Lin, Wei Zhong

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 10–28

Article | 30-November-2018

Comparative Research on Key Technologies from IPv4, IPv6 to IPV9

exposed [1]. For example, in the address space, performance, network security and routing bottlenecks, IPv4 makes it difficult to meet the needs of the Internet in the future. To solve the IPv4 many problems, IPv6, IPV9 and other Internet protocols have been born. II. THE STATUS OF IPV4 IPv4 plays a key role in the development of the network. However, with the continuous expansion of the network scale, it can no longer meet the network development needs. Firstly, the address resources are exhausted

Sun Huai, Liu Zhang

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 3, 79–87

Article | 30-November-2018

The Shortcomings of Ipv6 and Upgrade of Ipv4

continuous development and application of new technologies. Although at that time, it was believed that IPv6 adopted 128-bit address, which was large enough to meet people’s large demands, so it integrated the information of the physical layer and the application layer, confused the network layer, and formed a peculiar “splicing address” structure, thus bringing potential problems such as unresolved security vulnerabilities. I. IPV6 CONFIGURATION IPv6is abbreviated of Internet Protocol Version 6, also

Tao Wang, Jiaqiong Gao

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 1–9

Article | 01-September-2015

SELADG: SECURE ENERGY EFFICIENT LOCATION AWARE DATA GATHERING APPROACH FOR WIRELESS SENSOR NETWORKS

Recent trends in wireless sensor networks leads to the development of new protocols for data gathering. In this paper, a secure energy efficient location aware data gathering approach is introduced to secure data gathering. An Elliptic Curve Diffie Hellman Key Exchange (ECDHKE) algorithm is utilized for key generation and key exchange between the sensor nodes to maintain security and prevent the data from malicious nodes. The performance of the proposed scheme is validated in terms of packet

M. Roseline Juliana, S. Srinivasan

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 3, 1748–1767

Article | 30-November-2019

Research and Implementation of Future Network IPV9

. IPv4 did not want to be open to the public at the beginning of the design, so it is very lacking in security, and it is difficult to provide rich QoS functions for real-time multimedia, mobile IP and other commercial services, although later The developed protocols such as RSVP provide QoS support, but the cost of planning and constructing an IP network is relatively high. B. The Features and Problems of IPv6 IPv4 is a widely deployed Internet protocol. The IPv4 protocol is simple, easy to

Liu Zhang, Wang Yubian

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 2, 47–57

Research Article | 01-September-2017

DATA MINING WITH BIG DATA REVOLUTION HYBRID

-driven model involves demand-driven aggregation of information sources, mining and analysis, user interest modeling, and security and privacy considerations. We analyze the challenging issues in the data-driven model and also in the Big Data revolution.

R. Elankavi, R. Kalaiprasath, R. Udayakumar

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 560–573

Article | 05-September-2013

ESKA: A Highly Reliable Authentication Protocol Based-on One-way Key Chain for WSN Broadcast

The authentication of broadcast sources is one of the most important research issues in the area of network security. To confirm that the control information received is from the genuine management nodes, the message broadcasted from management nodes must be verifiable for the working nodes. In this paper, a highly reliable WSN broadcast authentication protocol based-on one-way key chain, namely, the ESKA, is presented. For the purpose of comparison, a group of simulations are conducted. The

Qianping Wang, Ruoyu Li, Liangli LAI, Lei Kong

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 4, 1653–1674

Research Article | 24-October-2017

PROBABILISTIC MODEL FOR AIRPORT RUNWAY SAFETY AREAS

The Laboratory of Aviation Safety and Security at CTU in Prague has recently started a project aimed at runway protection zones. The probability of exceeding by a certain distance from the runway in common incident/accident scenarios (take-off/landing overrun/veer-off, landing undershoot) is being identified relative to the runway for any airport. As a result, the size and position of safety areas around runways are defined for the chosen probability. The basis for probability calculation is a

Stanislav SZABO, Peter VITTEK, Jakub KRAUS, Vladimír PLOS, Andrej LALIŠ, Marek ŠTUMPER, Iveta VAJDOVÁ

Transport Problems, Volume 12 , ISSUE 2, 89–97

Article | 01-March-2015

RESEARCH OF THE FORKLIFT POWER-ASSISTED STEERING SYSTEM BASED ON SAFETY STEERING SPEED CONTROL

with the traditional PID in order to justify the validity of the algorithm. Finally, the expression of speed with tri-function is built. Optimization of safety speed is added on the basis of traditional power-assisted steering to ensure the stability and security of forklift steering.

Yan He, Benxian Xiao

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 1, 749–765

Article | 01-December-2015

AMN-PSO METHOD FOR JAMMING UNMANNED AERIAL VEHICLE NETWORK

UAVs are attracting more and more attentions for their versatilities and low costs. This paper focuses on their security and considers launching jamming attacks on them. We firstly formulate the UAVs jamming problem. Secondly the PSO (Particle Swarm Optimization) algorithm is introduced and new metrics like AJRL (Area for jamming a receiving link) and NJRL (Number of AJRLs) are defined. Then we provide a new jamming method AMN-PSO (Achieving Maximal NJRL based on PSO) for UAVs jamming attack

ZHANG Yu, LIU Feng, HAN Jie

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 4, 2042–2064

Article | 11-January-2021

Review of Anomaly Detection Based on Log Analysis

to impose more complex filtering rules. The cost of this method is very high, writing effective scripts requires a deep understanding of the target system, and these scripts written for specific target systems cannot be applied to other systems, and their versatility is poor. But even without considering the cost, this approach has become no longer feasible for today’s software systems. The ever-increasing log data scale and network security issues make network managers face severe challenges

Xudong Wu

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 4, 40–49

Article | 07-May-2018

Design of the Hotel Monitoring System for the Image and Video Collection

With the more attention of the security of the hotels, an effective hotel monitoring system was required. Based on the Samsung S3C2440, the proposed system uses the Linux system to accomplish the intelligent video surveillance. Using the image acquisition process and the embedded BOA server, designed an intelligent video image acquisition system. The system capturing image by the USB camera and building an embedded Web server, which complete the image acquisition, image processing, and the

Wang Pengfei

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 1, 23–26

Article | 02-April-2020

Research on Real-Name Routing and Trusted Connection Based on IPV9 and CPK-card

I. INTRODUCTION Routers work in the network layer of the OSI seven-layer protocol. Their main function is to connect the network with the network and forward packets between the networks. Routers have become the most important network equipment, so the research on the new generation of routers will become the core technology of the next generation of Internet research. Due to the IPv4, IPv6 protocols that used in the Internet, the new requirements for trusted Cyber Security connections are not

Jianping Xie, Xianghao Nan, Zoraghchin AliAb

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 1, 9–14

Article | 27-December-2017

SECURITY OF WIRELESS SENSOR NETWORKS FOR HEALTH MONITORING HELMETS WITH ANOMALY DETECTION USING MONITORING HELMETS WITH ANOMALY DETECTION USING 

Biswajit Panja, Zachary Scott, Priyanka Meharia

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 1, 561–580

Research Article | 01-September-2017

DETECTION AND REMOVAL OF DUST PARTICLES IN PIPELINES USING 3-D MEMS

Currently, the detection of dust particles is realized through manual sampling. Thus it is desirable to develop an automated online technique. Generally, industries run with the help of pipelines through which liquid can flow. The main aim of the work is to detect the dust particles which are present inside the pipeline when liquid is flowing through it. Distributed Acoustic Sensing (DAS) is a recent addition to the pipeline security world. Opta sense system is designed to prevent the damage in

B. Thamilvalluvan, Dr.M.Anto Bennet, K. Gokulakrishnan, S. Harrison, R. Shanmugam, B. Mangaram

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 147–162

Article | 04-March-2018

A COMPREHENSIVE EMERGENCY MANAGEMENT STRATEGY FOR TRANSPORTATION SYSTEMS IN USA

Transportation systems in USA are an integral part of the current infrastructure systems and involves a huge investment as part of the government and taxpayers. Therefore, transportation systems have economic, social and vital importance for the U.S. Security and safety of transportation systems and infrastructures in case of any possible future disasters and hazards are crucial for state transportation agencies. The objective of this paper is to develop and implement a comprehensive emergency

Kasim A. KORKMAZ

Transport Problems, Volume 12 , ISSUE 4, 153–162

Article | 01-March-2015

CYBER-AWARENESS IMPROVEMENT USING ARTIFICIAL INTELLIGENCE TECHNIQUES

Soorena Merat, Wahab Almuhtadi

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 1, 620–636

Article | 16-December-2013

Target Classification Using Pyroelectric Infrared Sensors in Unattended Wild Ground Environment

Pyroelectric Infrared (PIR) sensors are widely used as a simple presence trigger for alarms and a reliable counter for people in security home and smart office. Most paper have focused on the design and application of such systems, however, few research has be done on the detecting of targets in an outdoor environment using PIR sensors. In this paper, we realize a detecting system by means of PIR nodes to monitor outdoor targets more than 20 meters away from the PIR detectors. Furthermore

Dongfeng Xie, Huawei Liu, Baoqing Li, Qianwei Zhou, Xiaobing Yuan

International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 5, 2119–2135

Article | 27-December-2017

FACE DETECTION IN PROFILE VIEWS USING FAST DISCRETE CURVELET TRANSFORM (FDCT) AND SUPPORT VECTOR MACHINE (SVM)

Human face detection is an indispensable component in face processing applications, including automatic face recognition, security surveillance, facial expression recognition, and the like. This paper presents a profile face detection algorithm based on curvelet features, as curvelet transform offers good directional representation and can capture edge information in human face from different angles. First, a simple skin color segmentation scheme based on HSV (Hue – Saturation - Value) and

Bashir Muhammad, Syed Abd Rahman Abu-Bakar

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 1, 108–123

research-article | 30-November-2018

Implementing a lightweight Schmidt-Samoa cryptosystem (SSC) for sensory communications

of common wireless sensor network, where sensor nodes can talk to one or more neighboring nodes. Sensor nodes have limited processing power, storage, bandwidth, and energy. This limitation makes provision of the security in sensor networks not an easy task (Polastre et al., 2004). A WSN has no fixed infrastructure; the sensor nodes are scattered in a special domain, which makes the network threatened by attackers in many ways of attacking (Radzevych and Mathew, 2003). For this reason, an

Qasem Abu Al-Haija, Ibrahim Marouf, Mohammad M. Asad, Kamal Al Nasr

International Journal on Smart Sensing and Intelligent Systems , Volume 12 , ISSUE 1, 1–9

Article | 30-November-2018

Research on IPv4, IPv6 and IPV9 Address Representation

according to needs”, the uneven distribution makes the address allocation has a huge loophole, which makes many countries and regions have insufficient IP address resources. With the development of Internet, especially the explosive growth of scale, some inherent defects of IPv4 are gradually exposed, mainly focusing on address exhaustion, rapid expansion of routing table to the bottleneck, security and service quality is difficult to guarantee, and serious waste of IPv4 address structure. The design of

Halavachou YURY, Yubian Wang

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 48–60

Article | 30-November-2020

Deep Periocular Recognition Method via Multi-Angle Data Augmentation

I. INTRODUCTION Identity identification is a basic problem in social life [1], which is not only closely related to the interests of individuals, but also affected national security and social stability. This paper studies the periocular recognition technology based on deep learning, which is to use the image of the eye area to identify the identity of people. Due to the high precision, high ease of use and high security of the eye circumference [2], it is easy to obtain eye images, analyze

Bo Liu, Songze Lei, Yonggang Li, Aokui Shan, Baihua Dong

International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 11–17

Article | 01-December-2015

A MAC AND ONE-WAY FUNCTION BASED FILTERING SCHEME

In optical sensor networks, the adversary can inject false reports and old packets, both of which can cause false alarms and drain out the limited energy of the network. Existing security mechanisms can detect and filter out only false reports but not the old packets during forwarding. Furthermore, they cannot resist cooperative attacks. A MAC and one-way function based Filtering Scheme (MOFS) was presented. Each node distributes its key and initial hash value to some other nodes after

ZHAO Jing-Guo, LUO Qing-Yun, Liu Zhi-Xiong

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 4, 2247–2266

Article | 01-June-2016

DETECTING SYBIL ATTACKS IN WIRELESS SENSOR NETWORKS USING SEQUENTIAL ANALYSIS

Wireless Sensor Networks (WSNs) suffer from many security attacks when deployed either in remote or hostile environments. Among possible attacks, the Sybil attack is one of the severe attacks in which malicious nodes report false identities and location information such that the remaining nodes believe that many nodes exist in their vicinity. The current study proposes a method for detecting Sybil attack using sequential analysis. This method works in two stages. First, it collects the

P. Raghu Vamsi, Krishna Kant

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 651–680

Article | 01-December-2014

IMPROVING THE LOCALIZATION OF ELECTRIC WHEELCHAIR BY USING PARTICLE FILTER

The electric wheelchair for handicapped is used to improve the displacement of disabled persons. An automatic navigation system is needed to ensure greater autonomy and security for the disabled person. Automatic control system is added to a manual control for autonomous displacement. Initial system composed of two DC motors installed at the rear of used electric wheelchair, power module for the motors control and joystick to select speed and moving direction. We include an automatic control

Malek Njah, Mohamed Jallouli

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 4, 1922–1942

Research Article | 20-December-2018

South African migrants in Australia: an overview

overview of migration from South Africa to Australia, including a profile of this migrant group. South Africans migrate to Australia for a broad range of reasons, although safety, security and crime influence a high proportion of movers. In part this explains the permanent nature of this movement, with the majority of South Africans seeking to set up new homes and lives in Australia. Still, settlement is not always a smooth process for them despite assumptions that it is.  

Romy Wasserman

South Australian Geographical Journal, Volume 114 , ISSUE 1, 17–28

Article | 08-April-2018

Function Block Applications FOR Process Control System BASED ON Fieldbus Technology

Present and future digital process control systems need to many requirements,for example,increase security and safety,reduce time to market, minimize training costs,support integrated methodology for implementation,and so on. Process control systems are required to fulfil these requirements in terms of their architecture and their operation during all the phases of the life cycle. The accepted basic concept for the design process control system is to describe all necessary implementation

Zhuang Xia

International Journal of Advanced Network, Monitoring and Controls, Volume 1 , ISSUE 2, 112–117

Article | 30-November-2018

Design and Research of Healthy Ecology System Framework Based on IPV9

and interconnected platform for population health information, standardize and promote “Internet+ health care” services, and create new models of Internet health care services. Data collection, integration and sharing and business coordination of applied information systems such as public health, family planning, medical services, medical security, drug supply and comprehensive management are realized. In recent years, the aging population in Shandong province is characterized by large base, rapid

Qinyu Li, Hongwen Zhao, An Geng, Lei Han

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 3, 14–24

Research Article | 15-February-2020

Development of Miniature Modular Digital Altimeter

system that utilizes an air pressure sensor that can be adjusted to the current air pressure, run off a 6 Volt source and the height displayed on a Liquid Crystal Display (LCD) screen. This allows it to be used as a standalone module or integrated into a much larger system. This includes applications such as robotics and Unmanned Aerial Vehicles (UAVs) to personal handheld units for use in leisure activities or by security or rescue personnel.

Cristina Maria Fratila, Andrew Jason Tickle

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–5

Research Article | 13-December-2017

COOPERATIVE MULTI TARGET TRACKING USING MULTI SENSOR NETWORK

tracking system using multiple mobile sensors. For the purposes of surveillance and security, trackers use an Extended Kohonen neural network to track the moving targets in their environments. The proposed tracking algorithm can be used for single and multiple target tracking. A clustering algorithm is used in order to minimize the number of active trackers over time and hence save energy. An auction based algorithm is used for the purpose of optimizing the cooperation between trackers. Quantitative

Ahmed M. Elmogy, Fakhreddine O. Karray

International Journal on Smart Sensing and Intelligent Systems, Volume 1 , ISSUE 3, 716–734

Article | 09-April-2018

Design of Multi-channel Temperature Control Inspection System Based on PLC

The temperature control system is widely used in the field of industrial control, such as the boiler’s temperature control system in Steel, chemical plants and thermal power plants. For the requirements of remote centralized management and security monitor in temperature control system, a temperature control inspection system consisted by down-computer clew and up-computer , is designed in this paper. In this system, a programmable logic controller (PLC) is use as up-computer, multiple AI

Bi Xueqin, Zhang Liguang, Ma Xiaohui

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 118–121

Article | 30-November-2018

Research of New Network Address Structure

I. INTRODUCTION At the beginning of the Internet development, IPv4 addresses were sufficient and successful, but in the last 20 years of the 20th century, the global Internet was growing rapidly, and the number of hosts connected to the Internet was growing exponentially every year. Therefore, the number of existing addresses is no longer sufficient for this development demand. IPv6 solves the problem of address shortage in IPv4, but it does not fully consider the network security problem in

Jiao Chong, Jianping Xie, Yinqiu Xu, Hongwen Zhao

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 1, 39–47

Article | 30-November-2018

A New Method of Improving the Traditional Traffic Identification and Accuracy

Wang Zhongsheng, Gao Jiaqiong

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 3, 53–60

Article | 30-November-2018

Research on the Technology of Assign IP Address to the Connected Computer Based IPV9

can be used directly as domain names, which is the cornerstone of the future digital world. At the same time, IPV9 is also called “New Generation Security and Reliable Information Integrated Network Protocol” because it uses the classification and coding of the original computer network, cable broadcast television network and telecommunication network. IPV9 obtained Chinese patent in 2001 (CN98 1 22785), and has obtained authorized patents successively in more than ten countries and regions

Hui Wang, Lingwen Liu, Zhikai Yu, Ming Li

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 40–47

Research Article | 22-May-2019

MICROBIOLOGICAL CONTAMINATIONS OF UNDERGROUND GAS STORAGE FACILITIES AND NATURAL GAS PIPELINES

The growing demand for natural gas is primarily due to an increase in the share of gas in electricity production. Replacing coal with natural gas results in a significant decrease in emissions of greenhouse gases and dusts. The presence of microorganisms may be the cause of underground gas storage (UGS) facilities and pipelines deterioration. Microorganisms and their metabolic products contribute to the formation of sudden and unexpected failure causing loss of energy security by: decline in

Agnieszka Staniszewska, Alin Kunicka-Styczyńska, Krzysztof Ziemiński

Postępy Mikrobiologii - Advancements of Microbiology, Volume 56 , ISSUE 4, 381–388

Article | 06-July-2017

MODELLING ROAD TRAFFIC CRASHES USING SPATIAL AUTOREGRESSIVE MODEL WITH ADDITIONAL ENDOGENOUS VARIABLE

and population was the IV. The objective is to determine the hotspots and examine whether the number of RTC cases in a given LGA is affected by the number of RTC cases of neighbouring LGAs and an instrumental variable. The hotspots include Oluyole, Ido, Akinyele, Egbeda, Atiba, Oyo East, and Ogbomosho South LGAs. The study concludes that the number of RTC in a given LGA is affected by the number of RTC in contiguous LGAs. The policy implication is that road safety and security measures must be

Olusanya Elisa Olubusoye, Grace Oluwatoyin Korter, Afees Adebare Salisu

Statistics in Transition New Series, Volume 17 , ISSUE 4, 659–670

Research Article | 01-September-2017

TEMPORAL QUERY PROCESSIG USING SQL SERVER

data are at the heart of a broad range of business and network intelligence applications ranging from consumer behaviour analysis, trend analysis, temporal pattern mining, and sentiment analysis on social media, cyber security, and network monitoring. Social networks (SN) such as Facebook, twitter, LinkedIn contains huge amount of temporal information. Social media forms a dynamic and evolving environment. Similar to real-world friendships, social media interactions evolve over time. People join or

Mastan Vali Shaik, P Sujatha

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 495–505

No Record Found..
Page Actions