-
Fostering of innovative usability testing to develop mobile application for mobile collaborative learning (MCL)
Authors:
Khaled Elleithy,
Abdul Razaque
Abstract:
Emergence of latest technologies has diverted the focus of people form Computer-Supported Collaborative Learning (CSCL) to mobile supported collaborative learning. MCL is highly demanded in educational organizations to substantiate the pedagogical activities. Some of the MCL supportive architectures including applications are introduced in several fields to improve the activities of those organiza…
▽ More
Emergence of latest technologies has diverted the focus of people form Computer-Supported Collaborative Learning (CSCL) to mobile supported collaborative learning. MCL is highly demanded in educational organizations to substantiate the pedagogical activities. Some of the MCL supportive architectures including applications are introduced in several fields to improve the activities of those organizations, but they need more concise paradigm to support both types of collaboration: synchronous and asynchronous. This paper introduces the new preusability testing method that provides educational support and gives complete picture for develo** new pedagogical group application for MCL. The feature of application includes asynchronous and synchronous collaboration support. To validate the features of application, we conduct the post usability testing and heuristic evaluation, which helps in collecting the empirical data to prove the effectiveness and suitability of Group application. Further, application aims to improve learning impact and educate people at anytime and anywhere.
△ Less
Submitted 13 October, 2014;
originally announced October 2014.
-
Dynamic Cluster Head Node Election (DCHNE) Model over Wireless Sensor Networks (WSNs)
Authors:
Abeer Alabass,
Khaled Elleithy,
Abdul Razaque
Abstract:
WSNs are becoming an appealing research area due to their several application domains. The performance of WSNs depends on the topology of sensors and their ability to adapt to changes in the network. Sensor nodes are often resource constrained by their limited power, less communication distance capacity, and restricted sensing capability. Therefore, they need to cooperate with each other to accomp…
▽ More
WSNs are becoming an appealing research area due to their several application domains. The performance of WSNs depends on the topology of sensors and their ability to adapt to changes in the network. Sensor nodes are often resource constrained by their limited power, less communication distance capacity, and restricted sensing capability. Therefore, they need to cooperate with each other to accomplish a specific task. Thus, clustering enables sensor nodes to communicate through the cluster head node for continuous communication process. In this paper, we introduce a dynamic cluster head election mechanism. Each node in the cluster calculates its residual energy value to determine its candidacy to become the Cluster Head Node (CHN). With this mechanism, each sensor node compares its residual energy level to other nodes in the same cluster. Depending on the residual energy level the sensor node acts as the next cluster head. Evaluation of the dynamic CHN election mechanism is conducted using network simulator-2 (ns2). The simulation results demonstrate that the proposed approach prolongs the network lifetime and balancing the energy
△ Less
Submitted 13 October, 2014;
originally announced October 2014.
-
Simulation based Study of TCP Variants in Hybrid Network
Authors:
Wafa Elmannai,
Abdul Razaque,
Khaled Elleithy
Abstract:
Transmission control protocol (TCP) was originally designed for fixed networks to provide the reliability of the data delivery. The improvement of TCP performance was also achieved with different types of networks with introduction of new TCP variants. However, there are still many factors that affect performance of TCP. Mobility is one of the major affects on TCP performance in wireless networks…
▽ More
Transmission control protocol (TCP) was originally designed for fixed networks to provide the reliability of the data delivery. The improvement of TCP performance was also achieved with different types of networks with introduction of new TCP variants. However, there are still many factors that affect performance of TCP. Mobility is one of the major affects on TCP performance in wireless networks and MANET (Mobile Ad Hoc Network). To determine the best TCP variant from mobility point of view, we simulate some TCP variants in real life scenario. This paper addresses the performance of TCP variants such as TCP-Tahoe, TCP-Reno, TCP-New Reno, TCPVegas,TCP-SACK and TCP-Westwood from mobility point of view.The scenarios presented in this paper are supported by Zone routing Protocol (ZRP) with integration of random waypoint mobility model in MANET area. The scenario shows the speed of walking person to a vehicle and suited particularly for mountainous and deserted areas. On the basis of simulation, we analyze Round trip time (RTT) fairness, End-to-End delay, control overhead, number of broken links during the delivery of data. Finally analyzed parameters help to find out the best TCP variant.
△ Less
Submitted 13 October, 2014;
originally announced October 2014.
-
Performance Advancement of Wireless Sensor Networks using Low Power Techniques and Efficient Placement of Nodes
Authors:
Fatma Almajadub,
Khaled Elleithy
Abstract:
In this paper, we present optimization techniques for WSNs. Our main goal is to minimize the power consumption and latency. We address the problem of minimizing the energy consumption in WSNs including hardware. ZigBee protocol is used to design nodes on WSN to achieve a very low power consumption rate. Furthermore, we propose to use IRS protocol in WSN within a ZigBee technique to discover inform…
▽ More
In this paper, we present optimization techniques for WSNs. Our main goal is to minimize the power consumption and latency. We address the problem of minimizing the energy consumption in WSNs including hardware. ZigBee protocol is used to design nodes on WSN to achieve a very low power consumption rate. Furthermore, we propose to use IRS protocol in WSN within a ZigBee technique to discover information from unaware locations and achieve efficiency of energy and sacrifices latency. Our main idea is to support WSNs with both ZigBee technique and IRS protocol. In addition, we address the problem of efficient node placement for congestion control in WSNs. Thus, we evaluate the performance of specific routing and some algorithms of congestion control when wireless sensor nodes are deployed under different placements of network. To demonstrate the strength of the used algorithms, our simulation in C# proves that ZigBee-IRS- ESRT-Flooding approaches reduce the power consumption from 10% to 19% when compared to existing techniques of low Power and node placement.
△ Less
Submitted 30 June, 2014;
originally announced July 2014.
-
Efficient Search (RES) for One-Hop Destination over Wireless Sensor Network
Authors:
Abdul Razaque,
Khaled. M. Elleithy
Abstract:
The revolution of wireless sensors networks (WSNs) has highly augmented the expectations of people to get the work done efficiently, but there is little bit impediment to deal with deployed nodes in WSNs. The nature of used routing and medium access control (MAC) protocols in WSNs is completely different from wireless adhoc network protocols. Sensor nodes do not have enough capability to synchroni…
▽ More
The revolution of wireless sensors networks (WSNs) has highly augmented the expectations of people to get the work done efficiently, but there is little bit impediment to deal with deployed nodes in WSNs. The nature of used routing and medium access control (MAC) protocols in WSNs is completely different from wireless adhoc network protocols. Sensor nodes do not have enough capability to synchronize with robust way, in resulting causes of longer delay and waste of energy. In this paper, we deploy efficientenergy consuming sensors and to find one hop robust and efficient destination search in WSNs. We firstly deploy BT (Bluetooth enabled) sensors, which offer passive and active sensing capability to save energy. This work is a continuation of previous published work in [2]. The BT node is supported with efficient searchmethodss. The main objective of this contribution is to control different types of objects from remote places using cellular phone. To validate our proposed methodology,simulation is done with network simulator (ns2) to examine the behavior of WSNs. Based on simulation results, we claim that our approach saves 62% energy spent for finding best one- hop destination as compared with existing techniques.
△ Less
Submitted 3 October, 2013;
originally announced October 2013.
-
Robust Heterogeneous Network to Support Multitasking
Authors:
Muhammad Shoaib Khan,
Khaled Elleithy
Abstract:
Due to emerging technology, efficient multitasking approach is highly demanded. But it is hard to accomplish in heterogeneous wireless networks, where diverse networks have dissimilar geometric features in service and traffic models. Multitasking loss examination based on Markov chain becomes inflexible in these networks owing to rigorous computations is obligatory. This paper emphases on the perf…
▽ More
Due to emerging technology, efficient multitasking approach is highly demanded. But it is hard to accomplish in heterogeneous wireless networks, where diverse networks have dissimilar geometric features in service and traffic models. Multitasking loss examination based on Markov chain becomes inflexible in these networks owing to rigorous computations is obligatory. This paper emphases on the performance of heterogeneous wireless networks based on multitasking. A method based on multitasking of the interrelated traffic is used to attain an approximate performance in heterogeneous wireless networks with congested traffic. The accuracy of the robust heterogeneous network with multitasking is verified by using ns2 simulations.
△ Less
Submitted 17 September, 2013;
originally announced September 2013.
-
Automatic energy saving (AES) modelto boost ubiquitous wireless sensor networks (WSNs)
Authors:
Abdul Razaque,
Khaled Elleithy
Abstract:
We deploy BT node (sensor) that offers passive and active sensing capability to save energy. BT node works in passive mode for outdoor communication and active for indoor communication. The BT node is supported with novel automatic energy saving (AES) mathematical model to decide either modes. It provides robust and faster communication with less energy consumption. To validate this approach, netw…
▽ More
We deploy BT node (sensor) that offers passive and active sensing capability to save energy. BT node works in passive mode for outdoor communication and active for indoor communication. The BT node is supported with novel automatic energy saving (AES) mathematical model to decide either modes. It provides robust and faster communication with less energy consumption. To validate this approach, network simulator-2 (ns2) simulation is used to simulate the behavior of network with the supporting mathematical model. The main objective of this research is to remotely access different types of servers, laptops, desktops and other static and moving objects. This prototype is initially deployed to control MSCS [13] & [14] from remote place through mobile devices. The prototype can further be enhanced to handle several objects simultaneously consuming less energy and resources.
△ Less
Submitted 17 September, 2013;
originally announced September 2013.
-
Restoring the privacy and confidentiality of users over Mobile collaborative learning (MCL) environment
Authors:
Abdul Razaque,
Khald. M. Elleithy
Abstract:
Mobile collaborative learning (MCL) is extensively recognized field all over the world. It demonstrates the cerebral approach combining the several technology to handle the problem of learning. MCL motivates the social and educational activities for creating healthier environment. To advance and promote the baseline of MCL, different frameworks have been introduced for MCL. From other side, there…
▽ More
Mobile collaborative learning (MCL) is extensively recognized field all over the world. It demonstrates the cerebral approach combining the several technology to handle the problem of learning. MCL motivates the social and educational activities for creating healthier environment. To advance and promote the baseline of MCL, different frameworks have been introduced for MCL. From other side, there is no highly acceptable security mechanism has been implemented to protect MCL environment. This paper introduces the issue of rogue DHCP server, which highly affects the performance of users who communicate with each other through MCL. The rogue DHCP is unofficial server that gives incorrect IP address to user in order to use the legal sources of different servers by sniffing the traffic. The contribution focuses to maintain the privacy of users and enhances the confidentiality. The paper introduces multi-frame signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with innovative algorithms, modification in the existing rules of IDS and use of mathematical model. The major objectives of research are to identify the malicious attacks created by rogue DHCP server. This innovative mechanism emphasizes the security for users in order to communicate freely. It also protects network from illegitimate involvement of intruders. Finally, the paper validates the mechanism using three types of simulations: testbed, discrete simulation in C++ and ns2. On the basis of findings, the efficiency of proposed mechanism has been compared with other well-known techniques.
△ Less
Submitted 17 September, 2013;
originally announced September 2013.
-
Multi-frame Signature-cum Anomaly-based Intrusion Detection Systems (MSAIDS) to Protect Privacy of Users over Mobile Collaborative Learning (MCL)
Authors:
Abdul Razaque,
Khaled Elleithy
Abstract:
The rogue DHCP is unauthorized server that releases the incorrect IP address to users and sniffs the traffic illegally. The contribution specially provides privacy to users and enhances the security aspects of mobile supported collaborative framework (MSCF) explained in [24].The paper introduces multi-frame signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with novel algor…
▽ More
The rogue DHCP is unauthorized server that releases the incorrect IP address to users and sniffs the traffic illegally. The contribution specially provides privacy to users and enhances the security aspects of mobile supported collaborative framework (MSCF) explained in [24].The paper introduces multi-frame signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with novel algorithms and inclusion of new rules in existing IDS. The major target of contribution is to detect the malicious attacks and blocks the illegal activities of rogue DHCP server. This innovative security mechanism reinforces the confidence of users, protects network from illicit intervention and restore the privacy of users. Finally, the paper validates the idea through simulation and compares the findings with known existing techniques.
△ Less
Submitted 7 October, 2012;
originally announced October 2012.
-
TCP-UB: A New congestion aware transmission control protocolvariant
Authors:
Wafa Elmannai,
Abdul Razaque,
Khaled Elleithy
Abstract:
Transmission control protocol (TCP) is a connection oriented protocol for several types of distributed applications. TCP is reliable particularly for traditional fixed networks. With emergence of faster wireless networks, TCP has been performing poorly in its original format. The performance of TCP is affected due to assorted factors including congestion window, maximum packet size, retry limit, r…
▽ More
Transmission control protocol (TCP) is a connection oriented protocol for several types of distributed applications. TCP is reliable particularly for traditional fixed networks. With emergence of faster wireless networks, TCP has been performing poorly in its original format. The performance of TCP is affected due to assorted factors including congestion window, maximum packet size, retry limit, recovery mechanism, backup mechanism and mobility. To overcome deficiency of original TCP, Several modifications have been introduced to improve network quality. The mobility is a major hurdle in degrading the performance of mobile wireless networks. In this paper, we introduce and implement new TCP variant University of Bridgeport (UB) that combines the features of TCP Westwood and Vegas. We examine the performance of TCP-UB, Vegas and Westwood using different realistic scenarios. NS2 simulator demonstrates the stability of TCP-UB as compared with TCP Vegas and Westwood in highly congested networks from the mobility point of view.
△ Less
Submitted 7 October, 2012;
originally announced October 2012.
-
Novel Framework for Mobile Collaborative learning (MCL)to substantiate pedagogical activities
Authors:
Abdul Razaque,
Khalid Elleithy,
Nyembo Salama
Abstract:
Latest study shows that MCL is highly focusing paradigm for research particularity in distance and online education. MCL provides some features and functionalities for all participants to obtain the knowledge. Deployment of new emerging technologies and fast growing trends toward MCL boom attract people to develop learning management system, virtual learning environment and conference system with…
▽ More
Latest study shows that MCL is highly focusing paradigm for research particularity in distance and online education. MCL provides some features and functionalities for all participants to obtain the knowledge. Deployment of new emerging technologies and fast growing trends toward MCL boom attract people to develop learning management system, virtual learning environment and conference system with support of MCL. All these environments lack the most promising supportive framework. In addition some of major challenges in open, large scale, dynamic and heterogeneous environments are not still handled in develo** MCL for education and other organizations. These issues includes such as knowledge sharing, faster delivery of contents, request for modified contents, complete access to enterprise data warehouse, delivery of large rich multimedia contents (video-on-demand), asynchronous collaboration, synchronous collaboration, support for multi model, provision for archive updating, user friendly interface, middleware support and virtual support. To overcome these issues; the paper introduces novel framework for MCL consisting of four layers with many promising functional components, which provide access to users for obtaining required contents from enterprise data warehouse (EDW). Novel framework provides information regarding the course materials, easy access to check the grades and use of labs. The applications running on this framework give substantial feedback for collaboration such as exchange for delivery of communication contents including platform for group discussion, short message service (SMS), emails, audio, video and video-on-demand to obtain on-line information to students and other persons who will be part of collaboration.
△ Less
Submitted 7 October, 2012;
originally announced October 2012.
-
Analytical Study of Pre-congestion notification (PCN) techniques
Authors:
Marwah Almasri,
Khaled Elleithy,
Abdul Razaque
Abstract:
Maintaining the quality of service (QOS) and controlling the network congestion are quite complicated tasks. They cause degrading the performance of the network, and disturbing the continuous communication process. To overcome these issues, one step towards this dilemma has been taken in form of Pre-congestion notification (PCN) technique. PCN uses a packet marking technique within a PCN domain ov…
▽ More
Maintaining the quality of service (QOS) and controlling the network congestion are quite complicated tasks. They cause degrading the performance of the network, and disturbing the continuous communication process. To overcome these issues, one step towards this dilemma has been taken in form of Pre-congestion notification (PCN) technique. PCN uses a packet marking technique within a PCN domain over IP networks. It is notified by egress node that works as guard at entry point of network. Egress node gives feedback to communicating servers whether rate on the link is exceeded than configured admissible threshold or within the limit. Based on this feedback, admission decisions are taken to determine whether to allow/block new coming flows or terminate already accepted. The actual question is about selection of right algorithm for PCN domain. In this paper, we investigate the analytical behavior of some known PCN algorithms. We make slide modifications in originality of PCN algorithms without disquieting working process in order to employ those within similar types of scenarios. Our goal is to simulate them either in highly congested or less congested realistic scenarios. On the basis of simulation done in ns2, we are able to recommend each PCN algorithm for specific conditions. Finally, we develop a benchmark that helps researchers and scientific communities to pick the right algorithm. Furthermore, the benchmark is designed to achieve specific objectives according to the users' requirements without congesting the network.
△ Less
Submitted 11 August, 2012;
originally announced August 2012.
-
Discovery of Malicious Attacks to Improve Mobile Collaborative Learning (MCL)
Authors:
Abdul Razaque,
Khaled Elleithy
Abstract:
Mobile collaborative learning (MCL) is highly acknowledged and focusing paradigm in eductional institutions and several organizations across the world. It exhibits intellectual synergy of various combined minds to handle the problem and stimulate the social activity of mutual understanding. To improve and foster the baseline of MCL, several supporting architectures, frameworks including number of…
▽ More
Mobile collaborative learning (MCL) is highly acknowledged and focusing paradigm in eductional institutions and several organizations across the world. It exhibits intellectual synergy of various combined minds to handle the problem and stimulate the social activity of mutual understanding. To improve and foster the baseline of MCL, several supporting architectures, frameworks including number of the mobile applications have been introduced. Limited research was reported that particularly focuses to enhance the security of those pardigms and provide secure MCL to users. The paper handles the issue of rogue DHCP server that affects and disrupts the network resources during the MCL. The rogue DHCP is unauthorized server that releases the incorrect IP address to users and sniffs the traffic illegally. The contribution specially provides the privacy to users and enhances the security aspects of mobile supported collaborative framework (MSCF). The paper introduces multi-frame signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with novel algorithms through addition of new rules in IDS and mathematcal model. The major target of contribution is to detect the malicious attacks and blocks the illegal activities of rogue DHCP server. This innovative security mechanism reinforces the confidence of users, protects network from illicit intervention and restore the privacy of users. Finally, the paper validates the idea through simulation and compares the findings with other existing techniques.
△ Less
Submitted 9 August, 2012;
originally announced August 2012.
-
Effective M-learning design Strategies for computer science and Engineering courses
Authors:
Ibrahim Alkore Alshalabi,
Khaled Elleithy
Abstract:
Mobile learning (M-learning) is receiving more attention as a method of delivering to learners study materials anytime and anywhere. It is a necessity for educators to come up with a layout for learning that can be accessed through mobile devices. These learning materials should consist of good quality learning theories and accurate instructional layout in order to maintain the learning as effecti…
▽ More
Mobile learning (M-learning) is receiving more attention as a method of delivering to learners study materials anytime and anywhere. It is a necessity for educators to come up with a layout for learning that can be accessed through mobile devices. These learning materials should consist of good quality learning theories and accurate instructional layout in order to maintain the learning as effective as possible. It is important to follow certain strategies that can help the developers for M-learning applications. In this paper we proposed a set of strategies that are useful for creating mobile prototype for Computer Science and Engineering courses or M-learning application for course content.
△ Less
Submitted 8 March, 2012;
originally announced March 2012.
-
Clustered Hierarchy in Sensor Networks: Performance and Security
Authors:
Mohammed Abuhelaleh,
Khaled Elleithy,
Thabet Mismar
Abstract:
Many papers have been proposed in order to increase the wireless sensor networks performance; This kind of network has limited resources, where the energy in each sensor came from a small battery that sometime is hard to be replaced or recharged. Transmission energy is the most concern part where the higher energy consumption takes place. Clustered hierarchy has been proposed in many papers; in mo…
▽ More
Many papers have been proposed in order to increase the wireless sensor networks performance; This kind of network has limited resources, where the energy in each sensor came from a small battery that sometime is hard to be replaced or recharged. Transmission energy is the most concern part where the higher energy consumption takes place. Clustered hierarchy has been proposed in many papers; in most cases, it provides the network with better performance than other protocols. In our paper, first we discuss some of techniques, relates to this protocol, that have been proposed for energy efficiency; some of them were proposed to provide the network with more security level. Our proposal then suggests some modifications to some of these techniques to provide the network with more energy saving that should lead to high performance; also we apply our technique on an existing one that proposed to increase the security level of cluster sensor networks.
△ Less
Submitted 5 April, 2010;
originally announced April 2010.
-
A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks
Authors:
Syed S. Rizvi,
Khaled M. Elleithy
Abstract:
The performance of Mobile Ad hoc networks (MANET) depends on the cooperation of all active nodes. However, supporting a MANET is a cost-intensive activity for a mobile node. From a single mobile node perspective, the detection of routes as well as forwarding packets consume local CPU time, memory, network-bandwidth, and last but not least energy. We believe that this is one of the main factors t…
▽ More
The performance of Mobile Ad hoc networks (MANET) depends on the cooperation of all active nodes. However, supporting a MANET is a cost-intensive activity for a mobile node. From a single mobile node perspective, the detection of routes as well as forwarding packets consume local CPU time, memory, network-bandwidth, and last but not least energy. We believe that this is one of the main factors that strongly motivate a mobile node to deny packet forwarding for others, while at the same time use their services to deliver its own data. This behavior of an independent mobile node is commonly known as misbehaving or selfishness. A vast amount of research has already been done for minimizing malicious behavior of mobile nodes. However, most of them focused on the methods/techniques/algorithms to remove such nodes from the MANET. We believe that the frequent elimination of such miss-behaving nodes never allowed a free and faster growth of MANET. This paper provides a critical analysis of the recent research wok and its impact on the overall performance of a MANET. In this paper, we clarify some of the misconceptions in the understating of selfishness and miss-behavior of nodes. Moreover, we propose a mathematical model that based on the time division technique to minimize the malicious behavior of mobile nodes by avoiding unnecessary elimination of bad nodes. Our proposed approach not only improves the resource sharing but also creates a consistent trust and cooperation (CTC) environment among the mobile nodes. The simulation results demonstrate the success of the proposed approach that significantly minimizes the malicious nodes and consequently maximizes the overall throughput of MANET than other well known schemes.
△ Less
Submitted 9 August, 2009; v1 submitted 7 August, 2009;
originally announced August 2009.
-
Deterministic Formulization of SNR for Wireless Multiuser DS-CDMA Networks
Authors:
Syed S. Rizvi,
Khaled M. Elleithy,
Aasia Riasat
Abstract:
Wireless Multiuser receivers suffer from their relatively higher computational complexity that prevents widespread use of this technique. In addition, one of the main characteristics of multi-channel communications that can severely degrade the performance is the inconsistent and low values of SNR that result in high BER and poor channel capacity. It has been shown that the computational complex…
▽ More
Wireless Multiuser receivers suffer from their relatively higher computational complexity that prevents widespread use of this technique. In addition, one of the main characteristics of multi-channel communications that can severely degrade the performance is the inconsistent and low values of SNR that result in high BER and poor channel capacity. It has been shown that the computational complexity of a multiuser receiver can be reduced by using the transformation matrix (TM) algorithm [4]. In this paper, we provide quantification of SNR based on the computational complexity of TM algorithm. We show that the reduction of complexity results high and consistent values of SNR that can consequently be used to achieve a desirable BER performance. In addition, our simulation results suggest that the high and consistent values of SNR can be achieved for a desirable BER performance. The performance measure adopted in this paper is the consistent values of SNR.
△ Less
Submitted 9 August, 2009;
originally announced August 2009.