Advances in Networks

Volume 6, Issue 1, June 2018

  • Identifying the Top Threats in Cloud Computing and Its Suggested Solutions: A Survey

    Najib A. Kofahi, Areej Rasmi Al-Rabadi

    Issue: Volume 6, Issue 1, June 2018
    Pages: 1-13
    Received: 14 February 2018
    Accepted: 1 March 2018
    Published: 20 March 2018
    Abstract: The interest in cloud computing has increased rapidly in the last two decades. This increased interest is attributed to the important role played by cloud computing in the various aspects of our life. Cloud computing is recently emerged as a new paradigm for hosting and delivering services over the Internet. It is attractive to business owners as w... Show More
  • Method for Constructing the Topological Structure of an Access Network with a Distributed Structure

    Nishanbayev Tuygun Nishanbayevich, Abdullaev Mirjamol Mirkamilovich, Matkurbonov Dilshod Matkurbon Ogli

    Issue: Volume 6, Issue 1, June 2018
    Pages: 14-20
    Received: 12 February 2018
    Accepted: 5 March 2018
    Published: 26 March 2018
    Abstract: The article proposes a method for constructing the topological structure of the access network of the information and communication network (ICN), which has a distributed structure. The essence of the method is reduced to the fact that initially the region is divided into zones, then in each zone a star-shaped graph with a vertex in one of the poss... Show More
  • An Improved Forest Fire Alerting System Using Wireless Sensor Network

    Saeed Ullah Jan, Fazal Khaliq

    Issue: Volume 6, Issue 1, June 2018
    Pages: 21-39
    Received: 17 February 2018
    Accepted: 10 March 2018
    Published: 29 March 2018
    Abstract: Wireless Sensor Network is a self-organization network that consists of a distributed number of minor devices for performing the monitoring activities within the deployed environment. Many wildfires cause forest damages affecting a large number of living organisms. This research study discusses a system design approach to wireless sensor network (W... Show More
  • Rivest Shamir Adleman Encryption Scheme Based on the Chinese Remainder Theorem

    Salifu Abdul-Mumin, Kazeem Alabge Gbolagade

    Issue: Volume 6, Issue 1, June 2018
    Pages: 40-47
    Received: 19 February 2018
    Accepted: 13 March 2018
    Published: 4 April 2018
    Abstract: Sensitive information is transmitted across the internet every day and keeping such information as sacred is an important adventure. This is because malicious activities are on the increase as hackers are doing everything possible to steal such information. In this paper, we have implemented a new Rivest Shamir Adleman (RSA) encryption scheme based... Show More
  • Communication Technologies and Network Protocols of Automotive Systems

    Aroosa Umair, Muhammad Gufran Khan

    Issue: Volume 6, Issue 1, June 2018
    Pages: 48-65
    Received: 31 May 2018
    Accepted: 19 June 2018
    Published: 11 July 2018
    Abstract: Automotive industry has gone through rapid changes in the past few years. The usage of electronics and electronic control units (ECUs) have increased manifold, and this has also affected the way different subsystems communicate. Communication technologies and protocols are required to fulfill demands of fault-tolerance, dependability, bandwidth and... Show More