Volume 11, Issue 4, September-October 2020

Eradicating Cybercrime Through Education, Awareness Raising and Outreach
Pages: 1-6 (6) | [Full Text] PDF (222K)
Hermain Zahra, Rafia Nawaz, M. Junaid Arshad
Department of Computer Sciences, University of Engineering and Technology, Lahore-Pakistan

Abstract -
Computer technology services didn't come out without pitfalls. Although it makes life too quick and easy, however shoved under the eclipse of risk from the deadliest type of crime named ‘Cybercrime’, without machines whole industries and multiple activities would almost cease to work. This proliferation of cheap, powerful, user-friendly computers has made it possible for more and more people to use them as part of their normal way of life. The abundance of inexpensive, strong, user-friendly computers has made it possible for more and more people to use them as part of their normal way of life. As businesses, organizations, and people continue to rely more and more on them, so do the hackers. Restricting cybercrimes relies on proper analysis of their actions and awareness of their impacts through all levels of society. Hence, this work explains purposeful knowledge of cybercrimes, how they attack, preventions and their effects with future cybercrime trends over various areas.
 Index Terms - Cybercrime, Phishing Attacks, Prevention and User Education
Hierarchical Threshold Outsource Secret Sharing and Interactive Proof Scheme for Land Conflicts
Pages: 7-16 (10) | [Full Text] PDF (613K)
Ngye Antoinette Agwa, Takumi Kobayashi, Chika Sugimoto, Ryuji Kohno
Graduate School of Engineering Science, Yokohama National University, Japan
University of Oulu Research Institute Japan

Abstract -
A land dispute involves conflicting claims to the ownership right of landed property by two or more parties that can be addressed within a legal framework. The advancements in networking and computing technologies have opened a gateway for the landowners to make any legal transaction on their landed properties, such as selling and conveniently transferring ownership through the internet. Despite all the advantages of digital technology advancement and the global use of the internet, the fraudulent act of manipulating digital content to compromised ownership rights is a common phenomenon in land conflicts. In this study, a scheme of multi-prover zero-knowledge arguments and outsourcing secret sharing has been proposed to solve land disputes. In this proof, participants only have to run a small amount of competition on their devices. Simultaneously, complex computation is sent to the cloud service provider for verification and construction.
 Index Terms - Outsource Secret Sharing, Homomorphism Encryption, Ownership Proof, Zero-Knowledge Interactive Proof, Land Dispute and Cloud Service Provider
Clustering in Wireless Sensor Networks for Energy Efficiency Improvement: A Comparative Analysis
Pages: 17-22 (6) | [Full Text] PDF (393K)
Zain Ali, Zia-ur-Rahman
Department of Computer Science and Engineering, University of Engineering and Technology, Lahore-Pakistan

Abstract -
In the world of 21st century, the technology is growing day by day and the needs of the advancements are also increasing. So is in the case of Wireless Sensor Networks. Wireless sensor network has vast fields of applications due to which it gains a lot of research interests. The energy enhancement techniques in this field are presented by many researchers as well. This paper presents a brief introduction of WSNs and clustering that is used for the energy efficiency enhancement of the nodes. The analysis of some popular clustering techniques including the LEACH, HEED, ECPF, EACLE & TEEN is also presented with a conclusion of merits and demerits of the compared techniques.
 Index Terms - Ad Hoc Networks, MEMS, SOC, Improvement, Energy Efficiency and Analysis
Future High-Speed Gigabit Ethernet Networks: Performance Evaluation
Pages: 23-29 (7) | [Full Text] PDF (626K)
Kung Yi and Lea Yue
Department of Computer Science and Information Technology, WSE, Korea

Abstract -
The aim of this research work is to analyse and study the future high-speed gigabit ethernet networks and evaluate their performance in terms of transport, security, hardware infrastructure and applicability. A series of experiments were conducted by sending and receiving TCP and UDP packets through high-speed gigabit ethernet fibre-optic link to present their research findings and discuss the main impact on handling data and bottlenecks which limits the efficiency of high-performance gigabits networks.
 Index Terms - Fibre-optics, High-Speed, Performance, Gigabit Ethernet, Impact and Evaluation
Introduction to Senior Computer Interaction (SCI) the branch of HCI
Pages: 30-34 (5) | [Full Text] PDF (496K)
Manal Umar, Muhammad Umar Bakhat, Feroz Mahmood
Bahria University Computer Science Department, Lahore

Abstract -
We propose a SCI people group (Senior Computer Interaction) for HCI (Human Computer Interaction). Numerous gadgets have gotten popular across adult community, with a larger part presently claiming mobile phones, laptops and desktop computers. The concerns and demand of SCI group is different from other users. Aging challenges, the needs and requirements are suggested in this paper.
 Index Terms - Senior, Interaction Design, Senior Computer Interaction, Evaluation and Design