Volume 28, Issue 2, December 2014

High Performance of the Coaxial Cable Based on Different Dielectrics [Full Text]

Mohammed Q. Taha, Yousif I. Al-Mashhadany and Aymen Lpizra

Abstract—This paper presents the analysis of high performance for coaxial cable with different parameters. The modeling for performance of coaxial cable contains many parameters, in this paper will discuss the more effective parameter is the type of dielectric mediums (Polyimide, Polyethylene, and Teflon). This analysis of the performance related to dielectric mediums with respect to: dielectric losses and its effect upon cable properties, dielectrics versus characteristic impedance, and the attenuation in the coaxial line for different dielectrics. The analysis depends on a simple mathematicalmodel for coaxial cables to test the influence of the insulators (Dielectrics) performance. The simulation of this work is done using Matlab/Simulink and presents the results according to the construction of the coaxial cable with its physical properties, the types of losses in both the cable and the dielectric, and the role of dielectric in the propagation of electromagnetic waves. Satisfied results are obtained that concluded the condition of high performance for coaxial cable. 


Data Network Threats and Penetration Testing [Full Text]

Vladimir Sanchez Padilla

Abstract—Currently data communications are available to many members of the society, such as children in a school learning environment to adults who access networks for work or entertainment issues, both from different locations, as in home environments or shared networks. Whether accessing a browser application or sharing data online, from the moment a person validates their accounts by users and passwords is already prone to share network resources with many other users, some of them trying to obtain such information. The intent of this paper is to show types of threats, as denial of service and malware which could harm a data networks, and tools and recommendations that may be useful to prevent access of information from unauthorized or unprivileged agents. 


Monitoring of a Wireless Network Using a Password Recovery Tool [Full Text]

Vladimir Sanchez Padilla and Miguel E. Palacios

Today there are different applications useful for network administrators to monitor wireless networks for measuring purposes or to expose security vulnerabilities. Information extraction of different types is possible when a network is accessed, highlighting files and passwords. If this is done for purposes unrelated to the interests of a particular organization, it could become harmful in a measure not quantifiable. Tools to achieve it are available through the Internet and it is not necessary to have an engineering background, which indicates that anyone with the desire and patience to carry out attacks is a potential attacker. 


Rural Area Development and Society Performance Improvement in Ghana [Full Text]

Sudhakar Murugesan, Nivash Thirunavukarasu and Nicholas Asabere

Abstract—This study examined the performance and future improvements of Ghanaian society. Moore’s law, Amdahl’s law and Regression analysis was the major tools used to analyze the data collected. The development of computer information and communication technology has continually affected the creation of new applications based on emergent technologies. The dark side of Moore’s law is our society’s insatiable need to constantly upgrade our computing devices. As per Moore’s law demonstrates the potential benefits of reusing mobile phones by analyzing their design for accumulate energy. The main aim of this research paper is to improve rural people life style in Ghana and Ghana economy. The first wave of these efforts is commonly identified as “Green computing” where the emphasis has been primarily minimizing power usage for datacenters and technical equipments. As part of ensuring productivity in the both urban and especially the rural areas of Ghana we propose an Electronic –pay- in system (E-pay-in). where a customer of a bank just needs to reload a recharge card to our system and the said amount shall be credited to his bank account of the respective bank of the customer.