Earticle

현재 위치 Home

International Journal of Future Generation Communication and Networking

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJFGCN) [Science & Engineering Research Support Center, Republic of Korea(IJFGCN)]
  • pISSN
    2233-7857
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.7 No.2 (18건)
No
1

An Improved Method of Demodulation for Air-Ground Data Link Communication System

Yun Lin, Chao Lv, Xiaochun Xu, Bin Lin

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.7 No.2 2014.04 pp.1-8

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The Aircraft Communication Addressing and Reporting System (ACARS) is playing an increasingly important role to guarantee the safety and the efficiency of aircraft, so more effective method of receiving is necessary. The modulation of the ACARS system is MSK, the aim of this paper is to find a better demodulation method for the signal of ACARS. The characteristic of mapping relationship between code-element and the signal of waveform is analyzed. A new demodulation method is proposed based on the characteristic. Compared to the traditional demodulation method, it has a more simple structure. A simulation is made to verify its performance in the background of Gaussian noise. The comparison with traditional methods is also be made. Finally the benefit and weakness of this method is discussed.

2

Optimization of LEACH Protocol and Environmental Monitor System Design based on WSN

Xiajun Ding, Xiaodan Jiang, Lu zhang, Shuangxia Han

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.7 No.2 2014.04 pp.9-20

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In wireless sensor networks (WSN), sensor nodes just can use battery as their power resource and the power is quite limited. So, energy efficiency research is the key issue in design reasonable wireless sensor network routing protocols. In the paper, a revised cluster election method named LEACH-PSOv has been proposed to strengthen the hierarchical routing protocol low energy adaptive clustering hierarchy (LEACH). In the algorithm, particle colony optimization has been used to divide the network into more than one sub clusters and in each sub clusters head node and vice-head node would be elected to transfer the information to sink node. The algorithm proposed can be effectively to extend the lifetime of the networks. The simulation results show that the life time with new algorithm can extend the lifetime. Based on the improved LEACH algorithm, environmental monitor system has been designed.

3

A wireless sensor network (WSN) typically consists of a large number of small sensor nodes with limited energy. Prolonged network lifetime, scalability, node mobility and load balancing are important requirements for many WSN applications. Wireless Sensor networks have limited energy resources so our main aim is to enhance network lifetime by energy balancing. Dynamic clustering plays an important role in enhancing network lifetime. In this paper we propose an idea of fault tolerant optimal path determination for forwarding data to the base station to enhance the network lifetime and implement fault tolerance at the same time. Simulation results prove the betterment of our proposed method over the existing Leach protocol and DCP.

5

The Design of Wireless Sensor Network Gateway based on ZigBee and GPRS

Yanan Wang, Lingling Si, Shuo Liang

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.7 No.2 2014.04 pp.47-56

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper proposes a design of wireless sensor network gateways based on ARM to solve the poor performance of the network, and low efficiency of communication, which is caused by the poor computing capacity and limited bandwidth in wireless sensor network (WSN). The paper introduces the composition and characteristics of the gateways, and the design of their hardware and software. In this design, the data is transmitted by the network nodes to the gateways with the help of ZigBee near field communication (NFC) technology after its collection, and then the gateways transmit the data to the monitoring center through GPRS. It makes high performance of long distance transmission and the holding of gateways online come true.

6

Analysis and Simulation of Fractal Antenna for Mobile Wimax

Ashish Ranjan, Manjeet Singh, Mohit Kumar Sharma, Narendra Singh

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.7 No.2 2014.04 pp.57-64

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The growing demand of wireless services requires the definition of new standards able to provide an increased degree of mobility for the end user and a higher speed of data transmission. Among emerging standards, one of the most promising is the IEEE 802.16 Wireless Metropolitan Area network Air Interface (generally called Wimax).In last few decade the miniaturization led antenna to be conformal, low profile, multi –band, hence Fractal antennas came into existence which due to its self-similar geometry takes less area and thus its low profile. This paper presents the design of Sierpinski carpet fractal antenna for three iterations. This antenna is designed using HFSS software on FR4 substrate having dielectric constant 4.4 and having fed 50 ohms micro-strip line and optimized to operate in multiple bands between 2 – 6 GHz.

7

A Weight Cluster-Based Hybrid Routing Algorithm of ZigBee Network

Yan Li, An-na Yuan, Xue Liu, Yong-bin Du, Tian-xin Huang, Hao-xin Cui

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.7 No.2 2014.04 pp.65-72

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Aiming at the premature paralysis of network problem, which is caused by energy consumption imbalance of nodes in ZigBee, a weight-based clustering hybrid routing algorithm is proposed. From the viewpoint of energy, the algorithm considers the status of the node and network, selects cluster head according to the weights, and achieves energy balanced clustering of heterogeneous nodes. In the cluster, we adopt cluster-Tree routing algorithm to implement optimization of local network. And among the different clusters, we adopt the AODVjr algorithm to reduce the latency of communication between the different clusters and routing overhead by controlling the flooding direction of RREQ. The simulations reveal that the improved algorithm effectively reduces the mortality rate of nodes and decreases energy consumption in the network, balances the network energy load, and prolongs the lifetime of network.

8

In order to realize integration of the social logistics resource and provide customized logistics services to the customers, this paper presents a regional logistics platform architecture based on cloud computing through systems analysis. Subsequently, a suggestion about adopting the mode of cooperative operation leading by the enterprise is provided combining the development situation of cloud computing and logistics information public platform in china on the basis of comparative analysis of three kind of operation mode.

9

Many of papers refers to study of application for FACTS. Especially for using reactive compensators for 500KV power system in order to increase the static voltage stability margin and transient stability enhancement have considered. However the selection of suitable Var source (STATCOM or SVC) also need to be considered. The purpose of this paper is to solve the above problems in order to suggest a olution of the appropriate shunt compensator for a reality 500KV power system. All the simulations for the above work have been carried out using MATLAB-SIMULINK environment.

10

Evaluation of Trustworthiness based on Fuzzy Set Theory

Hua Sun, Jiong Yu, ZhenYu Zhang, Li Li, Bin Liao

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.7 No.2 2014.04 pp.89-102

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the heterogeneous network, trustworthiness of the entity can help other entities to decide whether or not to have a transaction with it. The feedback data used to evaluate trustworthiness always comes from different entities in different system and is expressed in all kinds of forms. This may be easy for entity to express their trustworthiness, but it will increase difficulties of evaluation of trustworthiness. This paper first introduces different express forms used to show trustworthiness of the entities, and then show how to translate different form into fuzzy form using fuzzy set theory, and give a evaluates of integrated data. The experiment data shows that the trustworthiness expressed with fuzzy form is more appropriate, and the method based on fuzzy set is more convenient for the entities to predict the risk.

11

Research on Model of Network Information Currency Evaluation Based on Web Semantic Extraction Method

Mo Chen, Xiao-Ping Yang, Meng Sun, Yun Zhao

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.7 No.2 2014.04 pp.103-116

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the arrival of the big data era, it has become a spot for research to evaluate currency of network information so far. This paper proposes a model of network information currency evaluation based on Web semantic extraction method taking Web news as object of study. The author elaborates the method, technology and main functions on every layer of the model in detail, which have been used or completed, and focus on how to extract semantic information efficiently from the contents of Web news, in order to explore a research method for network information currency evaluation. The experimental results show the validity of the model design that plays a very important role in leading network users pay attention to more valuable network information and helping Web site managers build a higher currency Web site.

12

A Technique for Data Encryption and Decryption

P. Srinivasarao, P. V. Lakshmipriya, P. C. S. Azad, T. Alekhya, K. Raghavendrarao, K. Kishore

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.7 No.2 2014.04 pp.117-126

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A day-to-day use of cryptography in our life is increasing tremendously; this is because of necessity of our multimedia documents to be protected from unauthorized person. As the days are passing the old algorithms are not remained so strong as cryptanalyst are familiar with them. Today the computers are faster and in feature its speed will increase more and more. Brute force attacks are made to break the encryption and they are growing so faster. These attacks are the main drawbacks of older algorithm. But with feature this algorithms will be replaced by new techniques that will provide better protection. In this paper we are going to proposed new encryption technique which is more faster, better immune to attacks, more complex, easy to encrypt and many more advanced security feature included. This Document displays the comparison between PSR algorithm and RSA Algorithm which are used in the encryption of plaintext into cipher text that are generally used in cryptography.

13

The research, made from IP measurement level, which is on behavior characteristics that affect network bottleneck delay, is a little limited.So the research scope is expanded to AS autonomous domain in this paper, which is about characteristics of propagation behavior of bottleneck delay and its evolution. This paper can serve as a reference for the further research on basic characteristics and geographical distribution

14

Network Coding-Based Priority-Packet Scheduler Multipath Routing in MANET using Fuzzy Controllers

Baolin Sun, Xiaocheng Lu, Chao Gui, Min Luo

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.7 No.2 2014.04 pp.137-148

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A Mobile Ad Hoc Network (MANET) is a dynamic wireless network that can be formed without the need for any pre-existing infrastructure in which each node can act as a router. Due to bandwidth constraint and dynamic topology of mobile ad hoc networks, multipath supported routing is a very important research issue. This paper proposes a Network Coding-based Priority-packet Scheduler Multipath routing in MANET using fuzzy controllers (NC-PSM). Specifically, differentiated packet scheme with feedback preference information (FPI) is studied in detail to illustrate the implement of the new approach. Simulation shows that the approach is efficient, promising and applicable in MANETs. The performance of the NC-PSM is studied using NS2 and evaluated in terms of the packet delivery ratio, packet overhead, and average end-to-end delay when a packet is transmitted. Simulation shows that the approach is efficient, promising and applicable in MANETs.

15

Wireless ad-hoc Network Routing Protocol Research

Liu Li

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.7 No.2 2014.04 pp.149-162

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Based on the in-depth analysis of the performance characteristics of typical routing protocols in present Adhoc, for on-demand routing protocols instability and large delay jitter characteristic is proposed based on the opportunity to forward the robustness of routing protocols. Through the simulation analysis of the its superiority compared with other certainty path as the routing protocol, gives the performance characteristics of its transmission in different environments.

16

Mobile Adhoc Routing Scheme in Reducing Energy Consuming

Jiang Xiaojie

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.7 No.2 2014.04 pp.163-172

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Mobile Ad hoc network, the author of this paper the energy consumption of a larger problem, analyses the reasons of large energy consumption. Mobile Ad Hoc network node has very limited resources, especially energy, through the design of effective power control strategy combined with routing to reduce the network energy consumption is very important and necessary. And as the goal, put forward the improvement strategy, proposed further reduce routing mechanism in mobile Ad-hoc energy costs, simulation and analysis show that the advantages of this solution.

17

Based on communication network as the background, this paper established a model to capture the cascading failures. The relationship between the local routing congestion information mean dynamics. In this model, according to new congestion function defined by each node (dynamic weight) is put forward based on the local congestion information, routing policy with adjustable parameters. On the BA scale-free network and ER random discusses caused by deliberate attacks on the network of cascading failure behavior. Through numerical simulation main findings, based on the new measure network robustness index (namely, critical production rate, there is a free flow to the phase change of the cascade configuration), the optimal value of existing routing parameters to achieve most robust network and the optimal value related to the network topology.

18

The paper analyzes the characteristics of various types of Web application system security vulnerabilities. Based on the deformation of Web attack , according to the principle of Web application vulnerabilities occur, attack methods and targets, the attack characteristics is extended, Proposed a structural model of IPS intrusion prevention based on the feature recognition. The experiments showed that the feature recognition-based Intrusion Prevention System can ensure higher performance in high-speed attack traffic network environment.

 
페이지 저장