Aiman Samra | Islamic University of Gaza (original) (raw)

Papers by Aiman Samra

Research paper thumbnail of A survey of Static Android Malware Detection Techniques

Nowadays android is the most popular operating system. Android apps suffer from more and more mal... more Nowadays android is the most popular operating system. Android apps suffer from more and more malware attacks. So more and more research is done to get a reliable malware detection approaches. Android malware detection is mainly divided into dynamic approach and static approach. In this paper, we present a survey of the two major approaches of the static Android malware detection: the permission based Detection technique and the signature based detection technique. It is a comparative study, that should be helpful for researchers in this topic. Based on clear parameters the study illustrates the similarity and differences in addition to the accuracy in important published researches.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Applying Deep Learning and Natural Language Processing in Cancer: A Survey

Artificial intelligence (AI) tools significantly bolstered and facilitated the complexity of fore... more Artificial intelligence (AI) tools significantly bolstered and facilitated the complexity of forecasting dangers, catching cancer earlier, and predicting the survival after treatment. Nowadays, they are emerging as a major adjunct for clinical and medical approaches. In this paper, the main idea concentrates on using deep learning (DL) and natural language processing (NLP) to scan, diagnose, and reduce any future negativities of cancer and oncology. In addition to giving strong variety of structural, systematic analysis of some reviewed studies. The primary aim of this survey is that it includes and represents a helpful guidance for researchers who need such direct evaluation of existed techniques for the purpose of more effective maintenance and development.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using Data mining for GEDCO customers' data to increase the collection of electricity bills in Gaza Strip

2021 International Conference on Electric Power Engineering – Palestine (ICEPE- P), 2021

The Gaza Governorate Electricity Distribution Company (GEDCO) is an economic service company oper... more The Gaza Governorate Electricity Distribution Company (GEDCO) is an economic service company operating with a special financial liability and owned by the Palestinian National Authority and local authorities.The unpaid bills are one of the company's biggest operating obstacles that obstructs money processing. The ever-increasing number of unpaid invoices has caused constant problems with the company's cash flow.In this paper, Data mining techniques and neural networks techniques were implemented over the data warehouses of GEDCO. Decision tree machine learning algorithm is used to classify the customers according to their commitment to payment, as well as to extract the categories for each class of customers. The neural networks are used to train the machine to extract a threshold for consumption and amperes. The threshold extracted for each subscriber according to his history of consumption and payment, to help him stay committed to payment.The results concluded that consum...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Research Priorities in Information and Computer

In Palestine, 44.7% of the population is under 16 with literacy rate of 91.9% over all of the pop... more In Palestine, 44.7% of the population is under 16 with literacy rate of 91.9% over all of the population. More than half of Palestinian youth own computers and have access to the Internet. With such prospect, ensuring information security and spreading awareness of it is one of the main challenges facing researchers on a national level. In this paper, we will identify three challenges which researchers in Palestine can attack. In each one, we will state the motivation, the background and possible outlooks and research directions.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Performance Analysis of VoIP in WiFi Campus Network

International Journal of Computer Applications, 2017

Voice over Internet Protocol (VoIP) service is growing very fast. Service providers offer VoIP se... more Voice over Internet Protocol (VoIP) service is growing very fast. Service providers offer VoIP service along with traditional data services using the same IP infrastructure. That is why today it is one of the most dominant technologies for communication. In this paper, simulative investigations have been done for VoIP service in WiFi campus network. Step by step, increasing the number of calls, investigations have been done in terms of important Quality of Service parameters like jitter, packet end-to-end delay, wireless LAN load and wireless LAN throughput.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A survey of Static Android Malware Detection Techniques

2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE)

Nowadays android is the most popular operating system. Android apps suffer from more and more mal... more Nowadays android is the most popular operating system. Android apps suffer from more and more malware attacks. So more and more research is done to get a reliable malware detection approaches. Android malware detection is mainly divided into dynamic approach and static approach. In this paper, we present a survey of the two major approaches of the static Android malware detection: the permission based Detection technique and the signature based detection technique. It is a comparative study, that should be helpful for researchers in this topic. Based on clear parameters the study illustrates the similarity and differences in addition to the accuracy in important published researches.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Simple Scalar as an eLearning Mashup web application (eScalar)

In recent years Mashups are increasingly found in the eLearning field to offer instructors the op... more In recent years Mashups are increasingly found in the eLearning field to offer instructors the opportunity oflinking students to multiple sources of information as well as offering students the ability of accessing learning tools andservices in an easy manner. In this paper we describe the design and implementation of our Mashup web application thatoffer the SimpleScalar simulator as an eLearning web-based service for the students of Computer Architecture course.This Mashup overcomes the problem of platform and hardware dependency of SimpleScalar and can be accessed fromanywhere. We added new service to SimpleScalar in our Mashup web application that is generating visual statisticalresults.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Least recently plus five least frequently replacement policy (LR+5LF)

In this paper, we present a new block replacement policy in which we proposed a new efficient alg... more In this paper, we present a new block replacement policy in which we proposed a new efficient algorithm for combining two important policies Least Recently Used (LRU) and Least Frequently Used (LFU). The implementation of the proposed policy is simple. It requires limited calculations to determine the victim block. We proposed our models to implement LRU and LFU policies. The new policy gives each block in cache two weighing values corresponding to LRU and LFU policies. Then a simple algorithm is used to get the overall value for each block. A comprehensive comparison is made between our Policy and LRU, First In First Out (FIFO), V-WAY, and Combined LRU and LFU (CRF) policies. Experimental results show that the LR+5LF replacement policy significantly reduces the number of cache misses. We modified simple scalar simulator version 3 under Linux Ubuntu 9.04 and we used speccpu2000 benchmark to simulate this policy. The results of simulations showed, that giving higher weighing to LFU policy gives this policy best performance characteristics over other policies. Substantial improvement on miss rate was achieved on instruction level 1 cache and at level 2 cache memory.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Research Priorities in Information and Computer Networks Security in Palestine

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Performance Evaluation of the QoS for VoIP using Different CODECS

Voice over Internet Protocol (VoIP) service is growing very fast and supported by many applicatio... more Voice over Internet Protocol (VoIP) service is growing very fast and supported by many applications. Its interactive nature makes it very attractive service. VoIP requires a precise level of quality to be utilized. Quality of Service (QoS) is determined by factors like jitter, traffic sent, traffic received and end-to-end delay. In this paper, we study the performance of different scheduling schemes, like: FIFO, PQ, and WFQ for different codec formats. The implementation of the schemes was carried out using OPNET. VoIP service is deployed using the internet implementing the Resource Reservation Protocol (RSVP). The paper discusses the results through a number of figures for the jitter, end-to-end delay and the traffic sent and received. Figures show the different scheduling schemes PQ, WFQ and FIFO with different codec formats, G.711, G.729A and G.723.15 codec formats. I. INTRODUCTION Nowadays, very huge amounts of voice traffic are transferred between millions of people across the world using different social media applications. Using VoIP over the Internet connection, we should be aware about the quality of the VoIP service. VoIP service requires a precise level of quality to be utilized. The end user perception of the quality is determined by subjective testing as a function of the network impairments such as delay, jitter, packet loss, and blocking probability. The amount of impairment introduced by a packet network depends on the particular QoS mechanism implemented [1] Quality of Service (QoS) is determined by factors like the delay the packet delay variation (jitter), and the data loss rate [2]. The greatest technical problem in supporting multimedia services over IP is that real-time traffic must reach its destination within a preset time interval (delay) and with some tolerance of the delay variation (jitter). This is difficult because the original UDP/IP operates on a best-effort basis and permits dropping of packets on the way to a destination [3]. The simulation model was done using OPNET Modeler [4] [5]. OPNET has gained considerable popularity in academia as it is being offered free of charge to academic institutions. That has given OPNET an edge over DES NS2 in both market place and academia [6]. In this paper, we studied the performance of the most popular scheduling schemes, like: First-In First-Out (FIFO), priority Queuing (PQ), and Weighted Fair Queuing (WFQ). A comparison is carried out between different codecs (G.711, G.729A and G.723.15) which are the most appropriate to improve QoS for VoIP. The rest of the paper is organized as follows. Section II presents a typical WAN network topology that uses RSVP protocol to be used as a case study for deploying VoIP service. Section III describes the VoIP service and its parameters. Section IV presents the OPNET-based simulation approach for deploying VoIP service. Section V describes the results and analysis of the simulation study. Then section VI conclusion.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Performance Analysis of VoIP in WiFi Campus Network

Voice over Internet Protocol (VoIP) service is growing very fast. Service providers offer VoIP se... more Voice over Internet Protocol (VoIP) service is growing very fast. Service providers offer VoIP service along with traditional data services using the same IP infrastructure. That is why today it is one of the most dominant technologies for communication. In this paper, simulative investigations have been done for VoIP service in WiFi campus network. Step by step, increasing the number of calls, investigations have been done in terms of important Quality of Service parameters like jitter, packet end-to-end delay, wireless LAN load and wireless LAN throughput.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Performance Analysis of VoIP in WiFi Campus Network

Voice over Internet Protocol (VoIP) service is growing very fast. Service providers offer VoIP se... more Voice over Internet Protocol (VoIP) service is growing very fast. Service providers offer VoIP service along with traditional data services using the same IP infrastructure. That is why today it is one of the most dominant technologies for communication. In this paper, simulative investigations have been done for VoIP service in WiFi campus network. Step by step, increasing the number of calls, investigations have been done in terms of important Quality of Service parameters like jitter, packet end-to-end delay, wireless LAN load and wireless LAN throughput.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of NetworkMonitoring System (NMS

Due to rapid changes and consequent new threats to computer networks there is a need for the desi... more Due to rapid changes and consequent new threats to computer networks there is a need for the design of systems that enhance network security. These systems make network administrators fully aware of the potential vulnerability of their networks. This paperdesigns a Network Monitoring System (NMS) which is an active defense and complex network surveillance platform designed for ISPs to meet their most rigorous security requirements. This system is motivated by the great needof government agencies, ecommerce companies and Web development organizations to secure their computer networks. The proposed system is also used by network administrators to enable them understand the vulnerabilities affecting computer networks.This enables these administrators to improve network security. The proposed system is a lawful network traffic (Internet Service Provider IP trffic) interception system with the main task of obtaining network communications, giving access to intercepted traffic to lawful authorities for the purpose of data analysis and/or evidence. Such data generally consist of signaling, network management information, or the content of network communications. The intercepted IP traffic is gathered and analyzed for network vulnerability in real time. Then, the corresponding TCP/UDP traffic (Web page, email message,VOIP calls, DHCP traffic, files transferred over the LAN such as HTML files, images, and video files, etc.) is rebuilt and displayed. Based on the results of the analysis of the rebuilt TCP/UDP an alarm could be generatedif amalicious behavior is detected. Experimental results show that the proposed system has many features that make it much better than existing similar tools such as wireshark.In addition, experimental results show that the proposed system has high accuracy and efficiency in regards to network packets capturing and corresponding Web pages restructuring. Index Terms—Network security, nework traffic interception, packet filtering, network malicious behavior, network attacks

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Sound Visualization for Deaf Assistance Using Mobile Computing

— This thesis presents a new approach to the visualization of sound for deaf assistance that simu... more — This thesis presents a new approach to the visualization of sound for deaf assistance that simultaneously illustrates important dynamic sound properties and the recognized sound icons in an easy readable view. .In order to visualize general sounds efficiently, the MFCC sound features was utilized to represent robust discriminant properties of the sound. The problem of visualizing MFCC vector that has 39 dimension was simplified by visualizing one-dimensional value, which is the result of comparing one reference MFCC vector with the input MFCC vector only. New similarity measure for MFCC feature vectors comparison was proposed that outperforms existing local similarity measures due to their problem of one to one attribute value calculation that leaded to incorrect similarity decisions. Classification of input sound was performed and attached to the visualizing system to make the system more usable for users. Each time frame of sound is put under K-NN classification algorithm to detect short sound events. In addition, every one second the input sound is buffered and forwarded to Dynamic Time Warping (DTW) classification algorithm which is designed for dynamic time series classification. Both classifiers works in the same time and deliver their classification results to the visualization model. The application of the system was implemented using Java programming language to work on smartphones that run Android OS, so many considerations related to the complexity of algorithms is taken into account. The system was implemented to utilize the capabilities of the smartphones GPU to guarantee the smoothness and fastness of the rendering. The system design was built based on interviews with five deaf persons taking into account their preferred visualizing system. In addition to that, the same deaf persons tested the system and the evaluation of the system is carried out based on their interaction with the system. Our approach yields more accessible illustrations of sound and more suitable for casual and little expert users.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Developing A Security Model for Enterprise Networks (SMEN

—Enterprise network (EN) supports thousands of users, and interconnects many networks. EN integra... more —Enterprise network (EN) supports thousands of users, and interconnects many networks. EN integrates different operating systems and hosts hundreds of servers that provide several services such as web applications, databases, E-mail, and others. Security threats represent a serious problem to EN. They try to damage enterprise confidentiality, integrity, and availability. Security provides protection against attacks, hacking, and data theft. In this paper, we propose a security model (SMEN) of EN. The proposed model provides security at different layers. It integrates both hardware and software security solutions. We perform a defense evaluation for the proposed model The results show that SMEN was able to detect and prevent all attacks and malwares that were induced by the framework Metasploit. Performance evaluation shows that applying proposed model has a little negative effect on bandwidth utilization and hence on network performance.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Distributed Malware Detection Algorithm (DMDA

—The increasing number of malwares has led to an increase in research work on malware analysis st... more —The increasing number of malwares has led to an increase in research work on malware analysis studying the malware behavior. The malware tries to leak sensitive information from infected devices. In this paper, we study a specific attack method, which distributes the data source and the point of data loss on different versions of the malware application. That is done using local storage by storing part or all of the vital data to be leaked in the future. We introduce a Distributed Malware Detection Algorithm (DMDA), which is an algorithm to detect distributed malware on app versions. DMDA proposes a new way to analyze application against redistributed malware. DMDA is created to analyze the data and identify transitional loss points. We test this algorithm on a sample of Android applications published on the Google Play market containing 100 applications, where each application has two versions. The algorithm detected 150 transient data sources, 200 transient loss of data point and two leakages of data. In comparison, this dataset was checked using 56 anti-malware applications but none of them could find any malicious code.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using Homomorphic Cryptographic Solutions on E-voting Systems

—Homomorphic Cryptography raised as a new solution used in electronic voting systems. In this res... more —Homomorphic Cryptography raised as a new solution used in electronic voting systems. In this research, Fully Homomorphic encryption used to design and implement an e-voting system. The purpose of the study is to examine the applicability of Fully Homomorphic encryption in real systems and to evaluate the performance of fully homomorphic encryption in e-voting systems. Most of homomorphic cryptography e-voting systems based on additive or multiplicative homomorphic encryption. In this research, fully homomorphic encryption used to provide both operations additive and multiplication, which ease the demonstration of none interactive zero-knowledge proof NIZKP. The proposed e-voting system achieved most of the important security issues of the internet-voting systems such as eligibility, privacy, accuracy, verifiability, fairness, and others. One of the most important properties of the implemented internet voting system its applicability to work on cloud infrastructure, while preserving its security characteristics. The implementation is done using homomorphic encryption library HELib. Addition and multiplication properties of fully homomorphic encryption were used to verify the correctness of vote structure as a NIZKP, and for calculating the results of the voting process in an encrypted way. The results show that the implemented internet voting system is secure and applicable for a large number of voters up to 10 million voters.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Deadline Maximum Signal to Interference Ratio Scheduling Algorithm for WiMAX

International Journal of Computer Applications, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Analysis of Clustering Technique in Android Malware Detection

2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

ABSTRACT Mobile computing is an important field in information technology, because of the wide us... more ABSTRACT Mobile computing is an important field in information technology, because of the wide use of mobile devises and mobile applications. Clustering gives good results with information retrieval (IR), It aims to automatically put similar applications in one cluster. In this paper, we evaluate clustering techniques in Android applications. We explain how we can apply clustering techniques in malware detection of Android applications. We also use machine learning techniques in auto detection of malware applications in the Android market. Our evaluation is given by clustering two categories of Android applications: business, and tools. We have extracted 18,174 Android's application files in our evaluation using clustering. We extract the features of the applications from applications' XML-files which contains permissions requested by applications. The results gives a positive indication of using unsupervised machine learning techniques in malware detection in mobile applications using a combination of the application information and xml Android Manifest files.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Enhancement of Passive MAC Spoofing Detection Techniques

International Journal of Advanced Computer Science and Applications, 2010

Failure of addressing all IEEE 802.11i Robust Security Networks (RSNs) vulnerabilities enforces m... more Failure of addressing all IEEE 802.11i Robust Security Networks (RSNs) vulnerabilities enforces many researchers to revise robust and reliable Wireless Intrusion Detection Techniques (WIDTs). In this paper we propose an algorithm to enhance the performance of the correlation of two WIDTs in detecting MAC spoofing Denial of Service (DoS) attacks. The two techniques are the Received Signal Strength Detection Technique

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A survey of Static Android Malware Detection Techniques

Nowadays android is the most popular operating system. Android apps suffer from more and more mal... more Nowadays android is the most popular operating system. Android apps suffer from more and more malware attacks. So more and more research is done to get a reliable malware detection approaches. Android malware detection is mainly divided into dynamic approach and static approach. In this paper, we present a survey of the two major approaches of the static Android malware detection: the permission based Detection technique and the signature based detection technique. It is a comparative study, that should be helpful for researchers in this topic. Based on clear parameters the study illustrates the similarity and differences in addition to the accuracy in important published researches.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Applying Deep Learning and Natural Language Processing in Cancer: A Survey

Artificial intelligence (AI) tools significantly bolstered and facilitated the complexity of fore... more Artificial intelligence (AI) tools significantly bolstered and facilitated the complexity of forecasting dangers, catching cancer earlier, and predicting the survival after treatment. Nowadays, they are emerging as a major adjunct for clinical and medical approaches. In this paper, the main idea concentrates on using deep learning (DL) and natural language processing (NLP) to scan, diagnose, and reduce any future negativities of cancer and oncology. In addition to giving strong variety of structural, systematic analysis of some reviewed studies. The primary aim of this survey is that it includes and represents a helpful guidance for researchers who need such direct evaluation of existed techniques for the purpose of more effective maintenance and development.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using Data mining for GEDCO customers' data to increase the collection of electricity bills in Gaza Strip

2021 International Conference on Electric Power Engineering – Palestine (ICEPE- P), 2021

The Gaza Governorate Electricity Distribution Company (GEDCO) is an economic service company oper... more The Gaza Governorate Electricity Distribution Company (GEDCO) is an economic service company operating with a special financial liability and owned by the Palestinian National Authority and local authorities.The unpaid bills are one of the company's biggest operating obstacles that obstructs money processing. The ever-increasing number of unpaid invoices has caused constant problems with the company's cash flow.In this paper, Data mining techniques and neural networks techniques were implemented over the data warehouses of GEDCO. Decision tree machine learning algorithm is used to classify the customers according to their commitment to payment, as well as to extract the categories for each class of customers. The neural networks are used to train the machine to extract a threshold for consumption and amperes. The threshold extracted for each subscriber according to his history of consumption and payment, to help him stay committed to payment.The results concluded that consum...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Research Priorities in Information and Computer

In Palestine, 44.7% of the population is under 16 with literacy rate of 91.9% over all of the pop... more In Palestine, 44.7% of the population is under 16 with literacy rate of 91.9% over all of the population. More than half of Palestinian youth own computers and have access to the Internet. With such prospect, ensuring information security and spreading awareness of it is one of the main challenges facing researchers on a national level. In this paper, we will identify three challenges which researchers in Palestine can attack. In each one, we will state the motivation, the background and possible outlooks and research directions.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Performance Analysis of VoIP in WiFi Campus Network

International Journal of Computer Applications, 2017

Voice over Internet Protocol (VoIP) service is growing very fast. Service providers offer VoIP se... more Voice over Internet Protocol (VoIP) service is growing very fast. Service providers offer VoIP service along with traditional data services using the same IP infrastructure. That is why today it is one of the most dominant technologies for communication. In this paper, simulative investigations have been done for VoIP service in WiFi campus network. Step by step, increasing the number of calls, investigations have been done in terms of important Quality of Service parameters like jitter, packet end-to-end delay, wireless LAN load and wireless LAN throughput.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A survey of Static Android Malware Detection Techniques

2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE)

Nowadays android is the most popular operating system. Android apps suffer from more and more mal... more Nowadays android is the most popular operating system. Android apps suffer from more and more malware attacks. So more and more research is done to get a reliable malware detection approaches. Android malware detection is mainly divided into dynamic approach and static approach. In this paper, we present a survey of the two major approaches of the static Android malware detection: the permission based Detection technique and the signature based detection technique. It is a comparative study, that should be helpful for researchers in this topic. Based on clear parameters the study illustrates the similarity and differences in addition to the accuracy in important published researches.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Simple Scalar as an eLearning Mashup web application (eScalar)

In recent years Mashups are increasingly found in the eLearning field to offer instructors the op... more In recent years Mashups are increasingly found in the eLearning field to offer instructors the opportunity oflinking students to multiple sources of information as well as offering students the ability of accessing learning tools andservices in an easy manner. In this paper we describe the design and implementation of our Mashup web application thatoffer the SimpleScalar simulator as an eLearning web-based service for the students of Computer Architecture course.This Mashup overcomes the problem of platform and hardware dependency of SimpleScalar and can be accessed fromanywhere. We added new service to SimpleScalar in our Mashup web application that is generating visual statisticalresults.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Least recently plus five least frequently replacement policy (LR+5LF)

In this paper, we present a new block replacement policy in which we proposed a new efficient alg... more In this paper, we present a new block replacement policy in which we proposed a new efficient algorithm for combining two important policies Least Recently Used (LRU) and Least Frequently Used (LFU). The implementation of the proposed policy is simple. It requires limited calculations to determine the victim block. We proposed our models to implement LRU and LFU policies. The new policy gives each block in cache two weighing values corresponding to LRU and LFU policies. Then a simple algorithm is used to get the overall value for each block. A comprehensive comparison is made between our Policy and LRU, First In First Out (FIFO), V-WAY, and Combined LRU and LFU (CRF) policies. Experimental results show that the LR+5LF replacement policy significantly reduces the number of cache misses. We modified simple scalar simulator version 3 under Linux Ubuntu 9.04 and we used speccpu2000 benchmark to simulate this policy. The results of simulations showed, that giving higher weighing to LFU policy gives this policy best performance characteristics over other policies. Substantial improvement on miss rate was achieved on instruction level 1 cache and at level 2 cache memory.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Research Priorities in Information and Computer Networks Security in Palestine

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Performance Evaluation of the QoS for VoIP using Different CODECS

Voice over Internet Protocol (VoIP) service is growing very fast and supported by many applicatio... more Voice over Internet Protocol (VoIP) service is growing very fast and supported by many applications. Its interactive nature makes it very attractive service. VoIP requires a precise level of quality to be utilized. Quality of Service (QoS) is determined by factors like jitter, traffic sent, traffic received and end-to-end delay. In this paper, we study the performance of different scheduling schemes, like: FIFO, PQ, and WFQ for different codec formats. The implementation of the schemes was carried out using OPNET. VoIP service is deployed using the internet implementing the Resource Reservation Protocol (RSVP). The paper discusses the results through a number of figures for the jitter, end-to-end delay and the traffic sent and received. Figures show the different scheduling schemes PQ, WFQ and FIFO with different codec formats, G.711, G.729A and G.723.15 codec formats. I. INTRODUCTION Nowadays, very huge amounts of voice traffic are transferred between millions of people across the world using different social media applications. Using VoIP over the Internet connection, we should be aware about the quality of the VoIP service. VoIP service requires a precise level of quality to be utilized. The end user perception of the quality is determined by subjective testing as a function of the network impairments such as delay, jitter, packet loss, and blocking probability. The amount of impairment introduced by a packet network depends on the particular QoS mechanism implemented [1] Quality of Service (QoS) is determined by factors like the delay the packet delay variation (jitter), and the data loss rate [2]. The greatest technical problem in supporting multimedia services over IP is that real-time traffic must reach its destination within a preset time interval (delay) and with some tolerance of the delay variation (jitter). This is difficult because the original UDP/IP operates on a best-effort basis and permits dropping of packets on the way to a destination [3]. The simulation model was done using OPNET Modeler [4] [5]. OPNET has gained considerable popularity in academia as it is being offered free of charge to academic institutions. That has given OPNET an edge over DES NS2 in both market place and academia [6]. In this paper, we studied the performance of the most popular scheduling schemes, like: First-In First-Out (FIFO), priority Queuing (PQ), and Weighted Fair Queuing (WFQ). A comparison is carried out between different codecs (G.711, G.729A and G.723.15) which are the most appropriate to improve QoS for VoIP. The rest of the paper is organized as follows. Section II presents a typical WAN network topology that uses RSVP protocol to be used as a case study for deploying VoIP service. Section III describes the VoIP service and its parameters. Section IV presents the OPNET-based simulation approach for deploying VoIP service. Section V describes the results and analysis of the simulation study. Then section VI conclusion.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Performance Analysis of VoIP in WiFi Campus Network

Voice over Internet Protocol (VoIP) service is growing very fast. Service providers offer VoIP se... more Voice over Internet Protocol (VoIP) service is growing very fast. Service providers offer VoIP service along with traditional data services using the same IP infrastructure. That is why today it is one of the most dominant technologies for communication. In this paper, simulative investigations have been done for VoIP service in WiFi campus network. Step by step, increasing the number of calls, investigations have been done in terms of important Quality of Service parameters like jitter, packet end-to-end delay, wireless LAN load and wireless LAN throughput.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Performance Analysis of VoIP in WiFi Campus Network

Voice over Internet Protocol (VoIP) service is growing very fast. Service providers offer VoIP se... more Voice over Internet Protocol (VoIP) service is growing very fast. Service providers offer VoIP service along with traditional data services using the same IP infrastructure. That is why today it is one of the most dominant technologies for communication. In this paper, simulative investigations have been done for VoIP service in WiFi campus network. Step by step, increasing the number of calls, investigations have been done in terms of important Quality of Service parameters like jitter, packet end-to-end delay, wireless LAN load and wireless LAN throughput.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of NetworkMonitoring System (NMS

Due to rapid changes and consequent new threats to computer networks there is a need for the desi... more Due to rapid changes and consequent new threats to computer networks there is a need for the design of systems that enhance network security. These systems make network administrators fully aware of the potential vulnerability of their networks. This paperdesigns a Network Monitoring System (NMS) which is an active defense and complex network surveillance platform designed for ISPs to meet their most rigorous security requirements. This system is motivated by the great needof government agencies, ecommerce companies and Web development organizations to secure their computer networks. The proposed system is also used by network administrators to enable them understand the vulnerabilities affecting computer networks.This enables these administrators to improve network security. The proposed system is a lawful network traffic (Internet Service Provider IP trffic) interception system with the main task of obtaining network communications, giving access to intercepted traffic to lawful authorities for the purpose of data analysis and/or evidence. Such data generally consist of signaling, network management information, or the content of network communications. The intercepted IP traffic is gathered and analyzed for network vulnerability in real time. Then, the corresponding TCP/UDP traffic (Web page, email message,VOIP calls, DHCP traffic, files transferred over the LAN such as HTML files, images, and video files, etc.) is rebuilt and displayed. Based on the results of the analysis of the rebuilt TCP/UDP an alarm could be generatedif amalicious behavior is detected. Experimental results show that the proposed system has many features that make it much better than existing similar tools such as wireshark.In addition, experimental results show that the proposed system has high accuracy and efficiency in regards to network packets capturing and corresponding Web pages restructuring. Index Terms—Network security, nework traffic interception, packet filtering, network malicious behavior, network attacks

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Sound Visualization for Deaf Assistance Using Mobile Computing

— This thesis presents a new approach to the visualization of sound for deaf assistance that simu... more — This thesis presents a new approach to the visualization of sound for deaf assistance that simultaneously illustrates important dynamic sound properties and the recognized sound icons in an easy readable view. .In order to visualize general sounds efficiently, the MFCC sound features was utilized to represent robust discriminant properties of the sound. The problem of visualizing MFCC vector that has 39 dimension was simplified by visualizing one-dimensional value, which is the result of comparing one reference MFCC vector with the input MFCC vector only. New similarity measure for MFCC feature vectors comparison was proposed that outperforms existing local similarity measures due to their problem of one to one attribute value calculation that leaded to incorrect similarity decisions. Classification of input sound was performed and attached to the visualizing system to make the system more usable for users. Each time frame of sound is put under K-NN classification algorithm to detect short sound events. In addition, every one second the input sound is buffered and forwarded to Dynamic Time Warping (DTW) classification algorithm which is designed for dynamic time series classification. Both classifiers works in the same time and deliver their classification results to the visualization model. The application of the system was implemented using Java programming language to work on smartphones that run Android OS, so many considerations related to the complexity of algorithms is taken into account. The system was implemented to utilize the capabilities of the smartphones GPU to guarantee the smoothness and fastness of the rendering. The system design was built based on interviews with five deaf persons taking into account their preferred visualizing system. In addition to that, the same deaf persons tested the system and the evaluation of the system is carried out based on their interaction with the system. Our approach yields more accessible illustrations of sound and more suitable for casual and little expert users.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Developing A Security Model for Enterprise Networks (SMEN

—Enterprise network (EN) supports thousands of users, and interconnects many networks. EN integra... more —Enterprise network (EN) supports thousands of users, and interconnects many networks. EN integrates different operating systems and hosts hundreds of servers that provide several services such as web applications, databases, E-mail, and others. Security threats represent a serious problem to EN. They try to damage enterprise confidentiality, integrity, and availability. Security provides protection against attacks, hacking, and data theft. In this paper, we propose a security model (SMEN) of EN. The proposed model provides security at different layers. It integrates both hardware and software security solutions. We perform a defense evaluation for the proposed model The results show that SMEN was able to detect and prevent all attacks and malwares that were induced by the framework Metasploit. Performance evaluation shows that applying proposed model has a little negative effect on bandwidth utilization and hence on network performance.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Distributed Malware Detection Algorithm (DMDA

—The increasing number of malwares has led to an increase in research work on malware analysis st... more —The increasing number of malwares has led to an increase in research work on malware analysis studying the malware behavior. The malware tries to leak sensitive information from infected devices. In this paper, we study a specific attack method, which distributes the data source and the point of data loss on different versions of the malware application. That is done using local storage by storing part or all of the vital data to be leaked in the future. We introduce a Distributed Malware Detection Algorithm (DMDA), which is an algorithm to detect distributed malware on app versions. DMDA proposes a new way to analyze application against redistributed malware. DMDA is created to analyze the data and identify transitional loss points. We test this algorithm on a sample of Android applications published on the Google Play market containing 100 applications, where each application has two versions. The algorithm detected 150 transient data sources, 200 transient loss of data point and two leakages of data. In comparison, this dataset was checked using 56 anti-malware applications but none of them could find any malicious code.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using Homomorphic Cryptographic Solutions on E-voting Systems

—Homomorphic Cryptography raised as a new solution used in electronic voting systems. In this res... more —Homomorphic Cryptography raised as a new solution used in electronic voting systems. In this research, Fully Homomorphic encryption used to design and implement an e-voting system. The purpose of the study is to examine the applicability of Fully Homomorphic encryption in real systems and to evaluate the performance of fully homomorphic encryption in e-voting systems. Most of homomorphic cryptography e-voting systems based on additive or multiplicative homomorphic encryption. In this research, fully homomorphic encryption used to provide both operations additive and multiplication, which ease the demonstration of none interactive zero-knowledge proof NIZKP. The proposed e-voting system achieved most of the important security issues of the internet-voting systems such as eligibility, privacy, accuracy, verifiability, fairness, and others. One of the most important properties of the implemented internet voting system its applicability to work on cloud infrastructure, while preserving its security characteristics. The implementation is done using homomorphic encryption library HELib. Addition and multiplication properties of fully homomorphic encryption were used to verify the correctness of vote structure as a NIZKP, and for calculating the results of the voting process in an encrypted way. The results show that the implemented internet voting system is secure and applicable for a large number of voters up to 10 million voters.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Deadline Maximum Signal to Interference Ratio Scheduling Algorithm for WiMAX

International Journal of Computer Applications, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Analysis of Clustering Technique in Android Malware Detection

2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

ABSTRACT Mobile computing is an important field in information technology, because of the wide us... more ABSTRACT Mobile computing is an important field in information technology, because of the wide use of mobile devises and mobile applications. Clustering gives good results with information retrieval (IR), It aims to automatically put similar applications in one cluster. In this paper, we evaluate clustering techniques in Android applications. We explain how we can apply clustering techniques in malware detection of Android applications. We also use machine learning techniques in auto detection of malware applications in the Android market. Our evaluation is given by clustering two categories of Android applications: business, and tools. We have extracted 18,174 Android's application files in our evaluation using clustering. We extract the features of the applications from applications' XML-files which contains permissions requested by applications. The results gives a positive indication of using unsupervised machine learning techniques in malware detection in mobile applications using a combination of the application information and xml Android Manifest files.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Enhancement of Passive MAC Spoofing Detection Techniques

International Journal of Advanced Computer Science and Applications, 2010

Failure of addressing all IEEE 802.11i Robust Security Networks (RSNs) vulnerabilities enforces m... more Failure of addressing all IEEE 802.11i Robust Security Networks (RSNs) vulnerabilities enforces many researchers to revise robust and reliable Wireless Intrusion Detection Techniques (WIDTs). In this paper we propose an algorithm to enhance the performance of the correlation of two WIDTs in detecting MAC spoofing Denial of Service (DoS) attacks. The two techniques are the Received Signal Strength Detection Technique

Bookmarks Related papers MentionsView impact