2016 (80)
2015 (71)
2014 (86)
2013 (123)
2012 (121)
2011 (116)
2010 (65)
2009 (68)
2008 (12)
Performance Evaluation of ADV DSR and God in VANET for City and Highway Scenario
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.82 2015.09 pp.1-10
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Vehicular Ad-Hoc network has taken the enormous attention from various researchers due to its vast applications like traffic management, electronic toll collection, parking lot payment, multimedia and many more. Vehicular Ad-Hoc network is an emerging network. It is a special type of Intelligent Transport System which provides an improved vehicle to vehicle and vehicle to interface communication and inform the vehicles about road and dynamic traffic conditions so as to provide efficient data dissemination among the vehicles. Routing protocols play a vital role in communication among entities which exchanges information to establish a route, decision in forwarding and action in maintaining the route or recovering from routing failure. While analyzing traditional routing protocols for MANETs it is demonstrated that their performance is poor in VANET. So there is frequent need of performance evaluation in real scenarios. The work done in this paper has considered ad-hoc nodes to test the performance of routing protocols in city and highway scenario. In doing so, the performance evaluation has been done here in terms of quality of service parameters like throughput ratio, packet drop rate and collision rate using exhaustive simulations.
Imperceptible 3D Video Watermarking Technique Based on Scene Change Detection
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.82 2015.09 pp.11-22
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In the recent past years the newly emerging trend of 3D movies and projection drawn huge attention of researchers and enterprises, ranging from movie producing companies and entertainment to researchers and program developers, similar to other multimedia files these types of media need to copyrighted, a 3D video required a significant amount of effort to become a tangible product. In this paper we will present a technique to watermark such media for copyright protection purposes for 3D video to achieve both imperceptibility and robustness, using a scene change detection technique to identify the best location (frame) to be impregnated with the watermark. The 3D video file has attributes such as color channel, stereo objects and depth prospective, in this paper we will focus on such features to inject our watermark, and then discuss the impact of such process on the resulting file. From the experimental results we have concluded that our algorithm has proven imperceptibility and robustness.
A Fog-Based DSS Model for Driving Rule Violation Monitoring Framework on the Internet of Things
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.82 2015.09 pp.23-32
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In recent days for logistics as well as common peoples of developing and developed countries are in need of transportation policy including road safety, which can be achieved only when well-managed driving rule violation monitoring takes place to monitor the flow of increasing number of vehicles. Manual detection of driving rule breakers leads to overhead of today’s traffic monitoring body. Switching to an automated decision support driving rule violation monitoring system based on sensor network is one of the paradigms to solve this issue. Upcoming cloud researchers have already felt the demand of designing such a sensor-based driver’s driving rule violation monitoring cloud application that can release the overhead of the current traffic monitoring bodies. To accomplish the client’s expectation researchers have realized such cloud application based on sensor network or Internet of Things (IoT) is not so satisfactory. To solve these bottleneck conditions of the cloud computing, researchers have introduced the future of cloud computing called fog computing in this aspect, where computing services reside at the network edge. This paper proposed novel fog-based intelligent decision support system (DSS) for driver safety and traffic violation monitoring based on the IoT. Our conceptual framework could easily be adapted in current scenario and can also become a de facto decision support system model for future hassle-free driving rule violation monitoring system.
A Novel Optimal 2-D Layout for Cache Memory at 45nm CMOS Technology
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.82 2015.09 pp.33-44
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents a novel optimal 2-D layout using PN and PNN pattern during placement, we utilize the device merging, abutment and alignment technique to enhance the wire-length and area-efficiency. A placement objective is formulated balancing the symmetry for routing and the area efficiency. To the best of my knowledge, this is the first piece of work that can handle PN and PNN pattern for placement and using device merging, abutment and alignment technique simultaneously. Two cell (MTIP3&IP3) are used to demonstrate the effectiveness of approach. Moreover, the proposed method generates more area-efficient transistor placements than the conventional method. In experiment we applied PN and PNN pattern for placement of devices with the device merging and abutment technique to attain the results for MTIP3 and IP3 cell 6.5025umsq and 3.114umsq respectively. Result shows that the area of IP3 cell is improved by 50%.
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.82 2015.09 pp.45-62
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The concentrations of 226Ra, 232Th and 40K in the commonly used building materials of Tabuk area, Saudi Arabia were measured using γ-ray spectrometry. The mean activity concentration with standard deviation was found to be 27.52±11.28, 37.44±14.51 and 175.52±113.87 Bqkg-1 and ranged from 11.11 to 52.58 Bqkg-1, 10.99 to 59.72 Bqkg-1, 60.70 to 394.46 Bqkg-1 for, 226Ra, 232Th and 40 K, respectively. The associated radiological hazards of natural radioactivity in the studied materials were evaluated by radium equivalent activity, external hazard index, internal hazard index, indoor air absorbed dose rate and annual effective dose rate. Basic statistics and frequency distributions for all radionuclides were used to describe the statistical characteristics of the radionuclide activities. This data will serve as the baseline level for naturally occurring radionuclides in the study area and will be useful for tracking and assessing any pollution inventory in the environment of this region.
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.82 2015.09 pp.63-70
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A mobile Adhoc Network is a collection of various mobile nodes that can change it and configure itself on the network. In MANET, Ad-hoc On-Demand Distance Vector (AODV) floods the packets to discover route. In Ad hoc On Demand Vector (AODV) routing protocol for MANET (Mobile Ad hoc Networks), malicious nodes can easily disrupt the communication because of inherent limitations. In this paper, performance of AODV Routing Protocol is analyzed with and without malicious attack. A malicious node disrupts the limit and floods the network with false control packets. Malicious node affects the whole network as it consumes more bandwidth and drops packets which in turn degrade the performance of AODV routing protocol. Performance is carried out under various parameters like Throughput, packet delivery ratio, packets dropped and normalized routing load.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.