This paper presents the reliable broadcast protocol for Inter-Vehicular networks. Traffic fatalities are one of the leading causes of death in the world. Vehicular communication technology such as (vehicular ad hoc networks) has emerged as one of promising technology in improving the safety of drivers, passengers, and pedestrians on the road. In vehicular ad hoc networks majority of the messages are broadcasted to announce the state of a vehicle to it neighbors (e.g. sending emergency warning messages, transmitting state information, etc.). However broadcast in vehicular ad hoc networks cause a broadcast storm problem. In this paper, we present new broadcast protocol that address the broadcast problem and improves the reliability of receiving broadcast messages in vehicular ad hoc network. Simulation results shows the efficiency of proposed protocol....
Due to explosion of hand held devices e.g. smart phones and wireless internet, distributed denial of service attack (DDoS) become a great threat to service availability in cloud computing. In past, research community focused on IP base traffic filtering to mitigate attack by ignoring the fact that thousands of distributed zombies participate in collaborative fashion to launch DDoS attack successful by creating huge amount of network traffic. As a result, DDoS attack guzzles the resources of legitimate service server so that the network and the permanence of service cannot be assured. In this paper, we have focused on three proposed goals. First, we re-engineered attack and, mitigation scenario to provide real-time analysis about current Internet-wide DDoS security anomalies. This allowed us to impel supplementary active measurements to typify the burden of attacks and to enhance correlation of our log data with other publicly available sources of network traffic analysis data. Second, we have focused the sophistication of proposed monitoring scheme to simulate a variety of operating systems and software podiums. This facilitates us to identify and typify verity of DDoS attacks and traffic scanning activity to avoid detection of attacks such as ‘Ping to Death DDoS attack’. Third, we followed these proceedings on an enduring basis to extort trends in the attack frequency, make-up, and production of extensive DDoS attacks. Generating such longitudinal analysis findings was necessary for understanding the progression of the threats and vulnerabilities being utilized. In conclusion, while we had authenticated our early results concerning large-scale DDoS...
Sinkhole attacks in wireless sensor networks occur when a compromised node tries to attract network traffic by advertising un-authorized/illegitimate routing updates. The victim node sends data to the compromised node rather than sending it to the node it was formerly using. Sinkhole attacks are typically used to launch other attacks on the network such as selective forwarding and wormhole attacks. Once the network is compromised it is very hard to predict the kind of attack that is to follow. For this reason, there is a need to strengthen the security of wireless sensor networks. In this paper, we first describe the challenges in detecting sinkhole attacks in wireless sensor networks, followed by an analysis of methods to prevent, detect and neutralize sinkhole attacks. The analysis will be based on discussing the advantages and limitations of the proposed solutions....
This paper provide the aspects of mobile learning by presenting the differences techniques and aspects of using mobile devices in education according to the perspective of researches and studies in this area, it offers a comparison between e-learning and m-learning, a classification of education by mobile devices, and shows the categories of mobile learning. The paper also provides the readiness of mobile learning by presenting the results of study conducted at faculty of Computer Science and Information Technology at Al- Zaiem Al-Azahri University in Sudan....
The number of people being diagnosed with autism is on increase. In the US, statistics have shown that autism affects close to 500,000 people, and the number has been increasing gradually. Other parts of the world have also witnessed this increase, and hence, it is considered a global concern. In Saudi Arabia, the situation is not different. Right from diagnosis, special needs students encounter massive challenges (Abrahams, 2008, p. 350; Croen, 2007, p. 242; Al-Mousa, 2008, p. 76; Anthony, 2008, p. 236; Dover, 2007 p. 541; Freitag, 2007, p. 20; Childress, 2007, p. 187). In Saudi Arabia, there are no support services in place for students with autism in most schools, and the number of teachers trained in special needs education still wants (Cook, 2010, p. 210; Cook, 2009, p. 327; Cross, 2007, p. 178; Ministry of Education of Saudi Arabia, 2009, p. 132). This means that most students suffering from autism in Saudi Arabia do not get the opportunity to further their education, and the few that get the opportunity face difficult and unfriendly conditions....
It has been observed that technology has been designed in a manner that it facilitates
achievement of human objectives such as communication, interaction, use of communication
languages and other human characteristics (Wenglinsky, 2005). The design of technical
equipment such as computers has been done in manners which ensure these objectives are
achieved. An example of this form of interaction is the computer-mediated communication. This
paper provides a research into ways in which human interactions impact on technology.
This research proposal outlines the way and how 3D printer impact businesses in the
current economic and social dynamic environment (Harrington, 2013). This proposal will
examine the main impacts surrounding 3D printing technology, Identifying global responses and
investigating what the global business world is doing to adopt this kind of technology in their
business operations. The methodology behind this proposal will involve reading and locating the
current literature from advanced academic reports, global government bodies, and conversational
organizations (Hood-Daniel & Kelly, 2011).