International Journal of Wireless and Microwave Technologies (IJWMT)

IJWMT Vol. 5, No. 6, Nov. 2015

Cover page and Table of Contents: PDF (size: 308KB)

Table Of Contents

REGULAR PAPERS

CoAP Protocol for Constrained Networks

By Manveer Joshi Bikram Pal Kaur

DOI: https://doi.org/10.5815/ijwmt.2015.06.01, Pub. Date: 8 Nov. 2015

This paper discusses the Constrained Application Protocol (CoAP), an application layer protocol introduced by Internet Engineering Task Force (IETF) Constrained RESTful environment (CoRE) Working Group for use with low power and resource constrained nodes in the internet of things. The paper discusses the CoAP architecture supported with suitable examples. CoAP protocol message format, types, methods and security feature is also discussed. In this paper, we present a CoAP based car parking system implemented using Contiki, an open source operating system for resource constrained device. The Cooper (Cu) CoAP user agent for Firefox browser is used for handling CoAP URI scheme.

[...] Read more.
Cybercrimes Solutions using Digital Forensic Tools

By Dhwaniket Ramesh Kamble Nilakshi Jain Swati Deshpande

DOI: https://doi.org/10.5815/ijwmt.2015.06.02, Pub. Date: 8 Nov. 2015

The crimes using computers is growing with rapid speed. As computer crimes have hit up to a high mark, the tools used to fight such crimes is budding faster. In today's world the use of Digital Forensics have also become vital. Digital Forensics is a step-by-step process of scientific methods and techniques to investigate crime obtained from digital evidences. For investigating the digital evidence there are many Digital Forensic tools which are used to investigate digital crimes by identifying the digital evidences. The study results in giving the solutions for Digital Forensic tools for investigators looking to spread out their serviceability in using Digital Forensic tools.

[...] Read more.
Loss Less and Privacy Preserved Data Retrieval in Cloud Environment using TRSE

By T. Kavitha B. Narendra K.Thejaswi P. Nageswara Rao

DOI: https://doi.org/10.5815/ijwmt.2015.06.03, Pub. Date: 8 Nov. 2015

In the modern era of the computing world, the data producing and using it is becoming large and instant at various places. For availing the data at different locations for processing we need to store it in the global platform. Cloud environment provides a best and easy way for this. Cloud computing is becoming as the essential thing for high-quality data services. However there are some potential problems with respect to data security. Here encryption techniques can be used for providing security, but with restricted efficiency. In this paper we propose a new encryption mechanism for providing data security in cloud environment. We propose a two round searchable encryption which supports multi keyword retrieval. Here we adapted a vector space model for improving search accuracy; the elgamal encryption technique allows users to involve in the ranking, while the essential key part of encryption will be done at the source itself. The proposed improves the data security and reduces data leakage.

[...] Read more.
An Extended Research on the Blood Donor Community as a Mobile Application

By A Bhowmik N A Nabila M A Imran M A U Rahman D Karmaker

DOI: https://doi.org/10.5815/ijwmt.2015.06.04, Pub. Date: 8 Nov. 2015

In the developing and the least developed countries, the number of blood banks are limited and it is hard to find a blood donor with exact blood group in a crucial moment. Patients have to suffer a lot and in some cases, death is inevitable. Emergency situations like- accidents, ongoing treatments and elective surgeries create critical and immediate need for specific group of blood. In this regards, a little attention has been given on the easier availability of blood from nearest locations. In this paper, we propose a mobile phone application by which anyone will be able to look for their desired blood group at the nearest location. A large number of people is currently using smartphones running on different operating systems. The application will be developed in different platforms e.g. Android, Windows Phone or iOS, where only registered person, with willingness to donate blood will be able to access the service.

[...] Read more.
A Design Approach of GSM, Bluetooth and Dual band Notched UWB Antenna

By Durgesh Katre Rekha Labade

DOI: https://doi.org/10.5815/ijwmt.2015.06.05, Pub. Date: 8 Nov. 2015

In this paper, printed GSM Bluetooth dual band notch UWB antenna is presented. In this prototype corner cut patch for Bluetooth application and dual band notch characteristics of UWB antenna perform by inverting U- Slot in the radiation patch of antenna. With the enclosing of λ/4 stub in the patch of antenna for GSM (1.710-1.885 GHz) band operation. Simulation results show that the antenna yields an impedance bandwidth of 2.4-2.48 and 3-11 GHz with -10 dB reflection coefficients, except for the dual notched bands of 3.3-3.7 for Wi-MAX and 5.15-5.825 GHz for WLAN. The electrical characteristics in frequency domain show suitability of this antenna for use in UWB systems.

[...] Read more.
Optimum Resource Allocation in Orthogonal Frequency Division Multiplexing Communication System using Fuzzy Rule Base System and Particle Swarm Optimization and Comparison with Conventional other Techniques

By Farhana Mustafa Padma Lohiya

DOI: https://doi.org/10.5815/ijwmt.2015.06.06, Pub. Date: 8 Nov. 2015

OFDM is a technique that is chosen for high data rate communication and is important for 4th generation communication systems. To provide best possible quality of service, intelligent allocation of resources such as power, bandwidths are necessary. Various algorithms have been proposed for allocation of resources. Fuzzy Rule Based System (FRBS) and Particle Swarm Optimization (PSO) algorithm are used for optimization of code rate, modulation and power. FRBS is used to choose the best possible modulation and code rate and PSO is used for better power allocation.

[...] Read more.
A New Technique for Detection and Prevention of Passive Attacks in Web Usage Mining

By Roop Kamal Kaur Kamaljit Kaur

DOI: https://doi.org/10.5815/ijwmt.2015.06.07, Pub. Date: 8 Nov. 2015

Data theft and data attack is very common with internet users and web log files. Web log file is the proof of authentication of any user over any website. Many unauthorized users change them according to their requirement. Attacks like sql injection, brute force attack, IP spoofing might cause severe damage to the database system In this encryption techniques and optimization technique have been applied in order to check the unexpected arrival of messages or queries and the system parameter.

[...] Read more.