2016 (371)
2015 (174)
2014 (125)
2013 (94)
2012 (43)
2011 (36)
2010 (22)
2009 (22)
2008 (15)
Efficient Routing using Partitive Clustering Algorithms in Ferry-based Delay Tolerant Networks
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking vol.2 no.4 2009.12 pp.1-14
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The Delay Tolerant Networks (DTNs) generally contain relatively sparse nodes that are frequently disconnected. Message Ferrying (MF) is a mobility-assisted approach which utilizes a set of mobile elements to provide communication service in ferry-based DTNs. In this paper, we propose a Density-Aware Route Design (DARD) algorithm using partitive clustering algorithms along a validity index for identifying the suitable node clusters and assigning ferries to these clusters. In the proposed algorithm, unlike using multiple ferries in a single route (SIRA algorithm) or dividing the deployment area into grid as static (NRA and FRA algorithms), the manner of node’s distribution and their density in network are regarded as clustering metric. Evaluation results for comparing our scheme with existing routing algorithms demonstrate that DARD either minimizes message delivery delay or by preserving message delay, it reduces resource requirements in both ferries and nodes resulting in increasing ferries efficiency.
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking vol.2 no.4 2009.12 pp.15-28
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper proposes a method to realize sensor function allocation and effective data aggregation simultaneously in wireless sensor networks. This method realizes dynamic allocation of sensor functions so as to balance the distribution of each sensor function in a target monitoring area. In addition, effective data aggregation is performed by using a tree network topology and time division multiple access (TDMA), which is a collision-free communication scheme. By comparing the results from the proposed method with the results from non-optimized methods, it can be validated that the proposed method is 1.7 times more efficient than non-optimized methods in distributing sensor functions. With this method, the network lifetime is doubled, and the number of data packets received at a base station is considerably increased by avoiding packet collisions.
Weaknesses and Improvements of a One-time Password Authentication Scheme
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking vol.2 no.4 2009.12 pp.29-38
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Authentication of communicating entities and confidentiality of transmitted data are fundamental procedures to establish secure communications over public insecure networks. Recently, many researchers proposed a variety of authentication schemes to confirm legitimate users. Among the authentication schemes, a one-time password authentication scheme requires less computation and considers the limitations of mobile devices. The purpose of a one-time password authentication is to make it more difficult to gain unauthorized access to restricted resources. This paper discusses the security of Kuo-Lee's one-time password authentication scheme. Kuo-Lee proposed to solve the security problem based on Tsuji-Shimizu's one-time password authentication scheme. It was claimed that their proposed scheme could withstand a replay attack, a theft attack and a modification attack. Therefore, the attacker cannot successfully impersonate the user to log into the system. However, contrary to the claim, Kuo-Lee's scheme does not achieve its main security goal to authenticate communicating entities. We show that Kuo-Lee's scheme is still insecure under a modification attack, a replay attack and an impersonation attack, in which any attacker can violate the authentication goal of the scheme without intercepting any transmitted message. We also propose a scheme that resolves the security flaws found in Kuo-Lee's scheme.
RTL : Reduced Texture spectrum with Lag value Based Image Retrieval for Medical Images
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking vol.2 no.4 2009.12 pp.39-48
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Medical images have become the recent key investigation tools for medical diagnosis and treatment planning. Due to the advent of digital imaging the need of data storage and retrieval of medical images increased rapidly. Some difficulties in retrieving the medical images are: medical images have only intensity images that carry less information, more noise and records of medical images are large and complex to analyze. To address these problems the present work proposes a novel scheme based on Texture Unit. The proposed scheme reduces texture unit values from 0 to 6561 to 0 to 255 based on Lag values. The Similarity measures are extracted on both schemes and a good comparison is made. The experimental results on MRI images indicate reliability, feasibility and efficacy of the proposed method.
An Analysis of Parallel Approaches for a Mobile Robotic Self-localization Algorithm
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking vol.2 no.4 2009.12 pp.49-64
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Self-localization is a fundamental problem in mobile robotics. It consists of estimating the position of a robot given a map of the environment and information obtained by sensors. Among the algorithms used to address this issue, the Monte Carlo technique has obtained a considerable attention by the scientific community due to its simplicity and efficiency. Monte Carlo localization is a sample-based technique that estimates robot´s pose using a probability density function represented by samples (particles). The complexity of this algorithm scales proportionally to the number of particles used. The larger the environment, the more particles are required for robot localization. This fact limits the use of this algorithm in large size environments. In order to improve the efficiency of the Monte Carlo technique and allow it to be used in large environments we propose a parallel implementation of it. Our implementation is based on OpenMP and MPI message passing interface. Experimental results are used to show the efficiency of our approach.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.