Volume 11, Issue 3, June 2020

Energy-Conserving Routing Protocols for Wireless Sensor Networks: A Comprehensive Review
Pages: 1-10 (10) | [Full Text] PDF (576K)
Anam Shahzadi, Mehreen Rafi
Department of Computer Science and Engineering, UET, Lahore

Abstract -
Wireless Sensor Networks (WSNs) used in many fields like agriculture, military, smart homes, IoT and industrial sectors and have become an integral part of today's communication infrastructure. Research and innovations on WSNs have been available in many places over the past few years. WSN is a wireless network designed to use locally distributed autonomous devices that use sensors for physical or spatial analysis. In particular, the nodes in WSNs are built remotely and do not have the ability to get direct power. Energy savings provide some important considerations for the design because of sensor node's restricted battery lifetime. Basic routing policies are designed to transfer data between different locations efficiently by avoiding power outages and prolonging the lifespan of nodes. A comprehensive review of the different techniques has been presented in this paper on the basis of network architecture of the WSN.
 Index Terms - Routing, Wireless Sensor Networks, Hierarchical-based, Flat-based, Location-based and Energy Efficiency
An Improved Model for Software Defect Prediction in Concurrent Software Systems
Pages: 11-16 (6) | [Full Text] PDF (247K)
FARINRE, J. Moyosore, ABIOLA, O. Arowolo, AKINOLA, S. Olalekan
Department of Computer Science, University of Ibadan, Nigeria

Abstract -
Defects found after the development of software has made researchers develop different types of software defect prediction model. Most concurrent software has defects in them that makes them to give incorrect results. This study provides a model that predict defect in concurrent software system so as to make the software system to produce a correct and expected results. Deep learning classifier Convolutional Neural Network (CNN) was employed to build the model and its performance was compared with an existing model that also predicts defect in concurrent software systems. The model combined Static and Dynamic metric and Convolutional Neural Network (CNN) for predicting defects in concurrent software system.
 Index Terms - Concurrent Programs, Feature Selection, Convolutional Neural Network and Defect Prediction
A Comprehensive Evaluation of Mobile Ad Hoc Networks: Applications, Attacks and Protocols
Pages: 17-23 (7) | [Full Text] PDF (543K)
Muhammad Irzam Liaqat, Usman Ghani
Department of Computer Sciences and Engineering, University of Engineering and Technology, Lahore, Pakistan

Abstract -
Mobile Ad Hoc Network (MANET) is a decentralized, infrastructure-less and wireless network composed of set of mobile, dynamic and independent nodes. All the devices of the network are continuously changing their location which results in an always changing topology. Which increases its vulnerability to different types of security threats than a wired network; where the attacker would have to face much resistance. As the devices are dynamic and mobile in MANET, managing topology and choosing appropriate routing protocols is a challenge. In this paper, we discuss the different vulnerabilities, different type of attacks, some security mechanisms for detection and prevention and various routing protocols for the occurrence of effective communication between nodes in MANET.
 Index Terms - Mobile Ad Hoc Networks (MANET), Routing Protocols in MANET, Security of MANET and Types of Attacks
Modeling Business Processes: An Enhanced Behavioral Modelling Approach
Pages: - (-) | [Full Text] PDF (456K)
Kung Yi and Lea Yue
Department of Computer Science and Information Technology, Korea

Abstract -
Since the organizations have become the large enough and more complex with the passage of time, thus the organizations demand for a mechanism helping them in unfolding their systems business processes in such a way that it can be easily presentable and understandable by the software experts as well as for the business professionals, also that they can easily communicate with each other to fulfill their demands and needs. This study has highlighted some gaps of activity diagram in context of modeling business process using unified modeling language such as process of data flow, messaging, transaction and multiple instances etc. and suggested some ways to overcome the highlighted issues and limitations by importing facilities from business process theory into unified modeling language.
 Index Terms - Business Modeling Languages, Business Process Model, Unified Modeling Language (UML) and Behavioral Modelling
A Survey on Ransomware Detection and Risk Analysis Techniques
Pages: - (-) | [Full Text] PDF (496K)
Rabeeya Saleem, Taliah Tajammal, M. Juniad Arshad
Department of Computer Science, University of Engineering and Technology, Lahore-Pakistan

Abstract -
Ransomware's success has created a unique cybercriminal ecosystem. The purposes of this paper are therefore to provide understanding of the threat posed by ransomware and to address recent detection techniques employed. Successful ransomware attack has direct financial consequences, which are fuel by several sophisticated enablers such as encryption technology, cyber currency and accessibility. Encryption is reliable and virtually unbreakable. Anonymous cyber currency has the power to prevent traceability. Ransomware code is easy to obtain and allows easy entry. A combination of these provides an attractive avenue for cyber criminals and produces cybercrime specialists. As regards detection techniques, machine learning (ML) by regression algorithms found to be the most technique adopted by researchers of ransomware. Nonetheless, none of the researchers develop model for defense against ransomware attack and detection. This work illustrates the need for a solution to the detection engine using Machine Learning algorithm.
 Index Terms - Cyber Crime, Intrusion Detection (ID), Machine Learning (ML) and Honeypot