Annals of Emerging Technologies in Computing (AETiC)

 
Table of Contents

·         Table of Contents (Volume #2, Issue #1)


 
Cover Page

·         Cover Page (Volume #2, Issue #1)


 
Editorial

·         Editorial (Volume #2, Issue #1)


 
Paper #1                                                                             

Applications of Blockchain Technology beyond Cryptocurrency

Mahdi H. Miraz and Maaruf Ali


Abstract: Blockchain (BC), the technology behind the Bitcoin crypto-currency system, is considered to be both alluring and critical for ensuring enhanced security and (in some implementations, non-traceable) privacy for diverse applications in many other domains - including in the Internet of Things (IoT) eco-system. Intensive research is currently being conducted in both academia and industry applying the Blockchain technology in multifarious applications. Proof-of-Work (PoW), a cryptographic puzzle, plays a vital rôle in ensuring BC security by maintaining a digital ledger of transactions, which is considered to be incorruptible. Furthermore, BC uses a changeable Public Key (PK) to record the users’ identity, which provides an extra layer of privacy. Not only in cryptocurrency has the successful adoption of BC been implemented but also in multifaceted non-monetary systems such as in: distributed storage systems, proof-of-location, healthcare, decentralized voting and so forth. Recent research articles and projects/applications were surveyed to assess the implementation of BC for enhanced security, to identify associated challenges and to propose solutions for BC enabled enhanced security systems.


Keywords: Blockchain (BC); Bitcoin; Crypto-currency; IoT; Proof of Work (PoW); Distributed Digital Ledger.


Download Full Text


 
Paper #2                                                                             

Autism Children’s App using PECS

Nareena Soomro and Safeeullah Soomro


Abstract: Since autistic children suffers from learning disabilities and communication barriers, this research aim to design, develop and evaluate an Android based mobile application (app) providing better learning environment with inclusion of graphical representation in a cost effective manner. This research evaluate various supporting technologies and finds Picture Exchange Communication System (PECS) to be better choice for integrating with the app. Evaluation results reveal that the inclusion of PECS helped the children suffering from Autistic Spectrum Disorder (ASD) to better communicate with others. The study included autistic children who do not speak, who are unintelligible and who are minimally effective communicators with their present communication system. The evolution results showed encouraging impacts of the Autism App in supporting autistic children to adapt to normal life and improve the standard of their life.


Keywords: Autism; Language Learning; Learning Disability; Picture Exchange Communication System (PECS); Android; Mobile Application (apps).


Download Full Text


 
Paper #3                                                                             

A Congestion Control System Based on VANET for Small Length Roads

Ruchin Jain


Abstract: As vehicle population has been increasing on a daily basis, this leads towards increased number of accidents. To overcome this issue, Vehicular Ad Hoc Network (VANET) has come up with lot of novel ideas such as vehicular communication, navigation and traffic controlling. In this study, the main focus is on congestion control at the intersections which result from unclear ahead. For this purpose, a city lane and intersection model has been proposed to manage vehicle mobility. It shows the actual vehicle to vehicle and vehicle to traffic infrastructure communication. The experiment was conducted using Network Simulator 2 (NS 2). The implementation required modelling the road side unit, traffic control unit, and on-board unit along the roadside. In the simulation, including traffic volume, the distance between two signals, end-to-end delay, packet delivery ratio, throughput and packet lost were taken into consideration. These parameters ensure efficient communication between the traffic signals. This results in improved congestion control and road safety, since the vehicles will be signalled not to enter the junction box and information about other vehicles.


Keywords: Vehicular Ad Hoc Network (VANET); IEEE 802.11p Standard; Vehicle to Traffic Infrastructure; Traffic Signal; Efficient Communication.


Download Full Text


 
Paper #4                                                                             

Audio Networking in the Music Industry

Glebs Kuzmics and Maaruf Ali


Abstract: This paper surveys the rôle of computer networking technologies in the music industry. A comparison of their relevant technologies, their defining advantages and disadvantages; analyses and discussion of the situation in the market of network enabled audio products followed by a discussion of different devices are presented. The idea of replacing a proprietary solution with open-source and freeware software programs has been chosen as the fundamental concept of this research. The technologies covered include: native IEEE AVnu Alliance Audio Video Bridging (AVB), CobraNet®, Audinate Dante™ and Harman BLU Link.


Keywords: MANETS; DSR Protocol; AODV Protocol; Malicious.


Download Full Text


 
Paper #5                                                                             

A Comparative Study of Data Mining Algorithms for High Detection Rate in Intrusion Detection System

Nabeela Ashraf, Waqar Ahmad and Rehan Ashraf


Abstract: Due to the fast growth and tradition of the internet over the last decades, the network security problems are increasing vigorously. Humans can not handle the speed of processes and the huge amount of data required to handle network anomalies. Therefore, it needs substantial automation in both speed and accuracy. Intrusion Detection System is one of the approaches to recognize illegal access and rare attacks to secure networks. In this proposed paper, Naive Bayes, J48 and Random Forest classifiers are compared to compute the detection rate and accuracy of IDS. For experiments, the KDD_NSL dataset is used.


Keywords: Intrusion Detection System; Naive Bayes; J48; Random Forest; NSL_KDD dataset.


Download Full Text

 
 International Association for Educators and Researchers (IAER), registered in England and Wales - Reg #OC418009                        Copyright © IAER 2017