Volume 4 Issue 3- March 2014

 

S.No Title Page
1. A Review of 3G-WLAN Interworking
B.Bindusha Reddy, Dr Syed Umar , M.Satya Anusha
Abstract

The 3rd Generation Partnership Project (3GPP) standard is developing System Architecture Evolution (SAE)/Long Term Evolution (LTE) architecture for the next generation mobile communication system. The SAE/LTE architecture provides secure service and 3G-WLAN interworking [9]. To provide secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) is used. However, EAP-AKA has several vulnerabilities such as disclosure of user identity, man-in-the middle attack, Sequence Number (SQN) synchronization, and additional bandwidth consumption. Therefore, this paper analyzes threats and attacks in 3G-WLAN interworking and proposes a new authentication and key agreement protocol based on EAPAKA. The proposed protocol combines Elliptic Curve Diffie Hellman (ECDH) with symmetric key cryptosystem to overcome these vulnerabilities. Moreover, our protocol provides Perfect Forward Secrecy (PFS) to guarantee stronger security, mutual authentication, and resistance to replay attack. Compared with previous protocols which use public key cryptosystem with certificates, our protocol can reduce computational overhead.

Keywords—Routing protocols, 3 G. WLAN, EAP

50-55
Full Text PDF
2. Streaming Video Content over NGA (Next Generation Access) Network Technology
Sarah Ali Abdullah, Riyadh Bassil Abduljabbar
Abstract

Operators throughout the developed world are rolling out IP-based next generation networks (NGNs) with different application. The main objectives of this paper is to examine the performance of NGA network by integrating between both wireless technologies (WiMax IEEE 802.16 / WiFi IEEE 802.11g) and fixed line technologies (ADSL) architecture to support video services by determining whether broadband access network such as WiMax can deliver access network performance comparable to the ADSL and hybrid wireless network under different separated scenarios by using OPNET Modeler v.14.5. The QoS guidelines and the objective performance recommendations are presented in this paper in the context of an end-to-end delay, jitter, and delay variation.
 
KeywordsNGA network, Video Service (IPTV, VoD), QoS with DiffServ architecture, simulation model design

56-62
Full Text PDF
3. A Study on Mining for Semantic Web Personalization
V.Veena Madhuri , Dr Syed Umar, P.Veeraveni
Abstract

With the explosive growth of information on the Web, it has become more difficult to access relevant information from the Web. One possible approach to solve this problem is web personalization. In Semantic Web, user access behavior models can be shared as ontology. Agent software can then utilize it to provide personalized services such as recommendation and search. To achieve this, we need to tackle the technical issues on transforming web access activities into ontology, and deducing personalized usage knowledge from the ontology. In this paper, we propose a web usage mining approach for semantic web personalization. The proposed approach first incorporates fuzzy logic into Formal Concept Analysis to mine user access data for automatic ontology generation, and then applies approximate reasoning to generate personalized usage knowledge from the ontology for providing personalized services.
Keywords—Semantic, Web, Mining, Personalization

63-67
Full Text PDF
4. Enhancement LTE-A Using MIMO Technology
Hussein Ali Rasool
Abstract

MIMO is one of the techniques proposed to 3G and 4G LTE-A systems for its added benefits of higher data rates and low bit error rates. The gist of MIMO working is its ability to increase number of channels; thus increasing diversity gain. Correspondingly, more users are accommodated in one communication system. In this work, different MIMO schemes, performance of various Bandwidth, MU-MIMO scheme  , impact of HARQ signaling errors caused by unreliable feedback on the throughput of communication systems like LTE and Channel Quality Indicator (CQI) and Precoding feedback are investigated using  MATLAB simulation .     
Keywords–LTE-A; MIMO; CQI; HARQ; Precoding

68-73
Full Text PDF
5. Nanorobots in Medicine-A New Dimension in Bio Nanotechnology
T.Venkat Narayana Rao, Dr. H. S. Saini, Dr. Pinnamaneni Bhanu Prasad
Abstract

Bio-nanotechnology has become a hopeful area of research that is bringing radical advancements and changes in the current century of technological mutiny. It is a one part of Nano technology.  It has shown its clear participation in all fields, there is an integral part of the nanos in human science and medicine. Nanomedicine is the process of diagnosing cancers, treating, preventing disease, relieving pain, and of preserving and improving human health  using molecular tools and molecular knowledge of the human body. Most of the symptoms such as fever and itching have specific biochemical reasons that can also be controlled, reduced, and eliminated using the appropriate injected nanorobots. This paper mainly concentrates on reviewing role and implementation of nano robots in medical field and how it can replace present medical scenarios with cost reduction along with vision to permanent solutions to many human aliments towards surgery less treatments.

Keywords : nano robots, cancer, simulation, payload.

74-79
Full Text PDF
6. A Secure Mobile Network Environments Using Biometrics
Rajaa Aldeen Abd Khalid, Tameem Mohammed Mahmood
Abstract

A security of computers network system depends upon real time face recognition technique is considered. The proposed work is consisting of two sections. The first section represents the computers network system, and the second section represents the face recognition technique as a type of biometrics. Computers network system is consisting of a number of clients connected to web server on internet. In addition to computers network system being secured by face recognition technique, the connection between the clients and web server is secured via secure socket layer to secure the http between each client and web server. Face recognition technique consists of four main phases which are image acquisition phase, pre-processing phase, features extraction phase, and classification phase. Acquisition means capture the face images of the users via webcam and pre-processing is used to enhancement the images. Features extraction is used to get features from face images, Principle component analysis is used to extract the best features that represent the users face image. Artificial feed forward neural network back propagation algorithm is used to training and testing the users face images in classification stage.
Keywords— Biometric, secure computer network, face recognition technique, principle component analysis, features extraction, artificial neural network, bayesian regular back-propagation algorithm.

80-82
Full Text PDF

 

 

 

 

IJCSET Menu

Downloads