2016 (371)
2015 (174)
2014 (125)
2013 (94)
2012 (43)
2011 (36)
2010 (22)
2009 (22)
2008 (15)
Study on Power Control in the Cognitive AD HOC Self-organizing Network
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.1-10
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Nodes in ad hoc networks form dynamic topologies typically with scarce resources, such as energy and bandwidth. A main challenge in the operation of such networks is the efficient allocation of resources for radio communications. In this context, the presented paper proposes a power control mechanism created as a network-assisted function of ad hoc cognitive packet-based routing and aimed at reducing both energy consumption in nodes and mutual interference of adjacent communications. Simulation results in NS-2 show significant energy savings after applying the proposed algorithm. In addition, simulation results and a mathematical analysis of interference models, depict a reduction of neighboring radio interference and results in a promising increase of network throughput.
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.11-22
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Aiming at the increasing demand of the monitoring of mechanical vibration signals, by improving the existing Sensor Monitoring Network, a low-power wireless sensor network is designed. The data transmission efficiency is increased by using the compressed sensing (CS) technology to compress the mechanical vibration signals of the devices monitored by the network. To realize real-time processing of monitoring signals, the FPGA+DSP architecture is treated as the core of the equipment processing the mechanical vibration signals of wireless sensor network. The modified designs of the hardware circuit and logic circuit with regard to the data collection, sampling, transmission, processing and the store section are introduced initially. Further, the effects of the improved Sensor Monitoring Network are tested by the experimental study on the rotating equipment. The results show that the real-time processing can be well implemented and the power can be cut down to a certain degree.
On MIMO Channel Modeling for the Mobile Wireless Systems
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.23-38
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Developments in the area of wireless communications have constantly aimed at providing higher data rates even under complex environments using multiple-input multiple-output (MIMO) systems. Hence it generates a huge demand to investigate and understand the MIMO channel models for mobile wireless systems. Channel models describe the communication environments and are necessary in developing efficient wireless communication networks. This paper surveys the different channel models used to characterize the wireless systems. Generally, the channel models are classified as Physical models and Analytical models. These models are analyzed here along with the discussion of popular examples from both model types. The MIMO channel models employed in the current standardization activities to evaluate the MIMO system are also reviewed. Finally, some issues regarding these channel models are highlighted.
Computer Network Fault Diagnosis Based On Neural Network
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.39-50
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Computer network is one of the world's most important infrastructures in twenty-first Century, network fault diagnosis has become the focus of attention. With the development of artificial intelligence, using the neural network technology into the network fault diagnosis area can play an important role to the advantages of neural network in fault diagnosis. In this paper, the method is widely used, which is combined the self organizing feature map (SOM) neural network and multilayer feedforward neural network (BP): The result of the training samples using SOM neural network clustering algorithm is added to the original training samples and set a certain weight, through iterative update to the weight, in order to improve the convergence the speed of BP neural network. Using computer network fault diagnosis as a practical example for the computer simulation and analysis developes a set of computer network diagnosis system can provide reference and assistance for the work of theory research and application.
An Integrated Approach to ARP Poisoning and its Mitigation using Empirical Paradigm
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.51-60
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The primary objective of Cyber Security is to protect data in transit. If a network is vulnerable at layer two, the good fortune opens wide up for an attacker. With the easy availability of refined offensive tools that can exploit these vulnerabilities to create havoc in networks, there is a dire need of mitigative measures that can cope up with increasing threats. ARP Protocol violation is among the most hazardous onslaughts in the wireless networks today. This paper is an effort to implement the mechanism of ARP poisoning and its mitigation by enabling DHCP Snooping and Dynamic ARP Inspection. The attack has been demonstrated under test environment using Cain & Abel, Wireshark and NetworkMiner tools because of their merits. The paper also describes the mechanism of Dynamic ARP Inspection to mitigate man-in-the-middle attacks.
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.61-70
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Multi-hop Ad-hoc networks is an important organization way for Internet of Things. Through the simulation and analysis in high data load conditions, it can be seen that packet loss is not mainly caused by the change of data links,but the data collisions in MAC layer. What's more, the data collisions affect the routing constructions in NET layer. Therefore, packet loss is not only related to the routing algorithm, but also closely connected with point-to-point transmission performance in MAC layer. So we proposed a cross-layer scheme between the MAC layer and the NET layer. Through the simulation and analysis, it can be proved that this scheme improves the packet delivery, decreases the end-to-end delay and reduces the routing cost, applies to low speed mobile net-works and high data load scene.
On the Capacity of Cognitive Radio Sensor Networks : From Physical Layer to Network Layer
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.71-80
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Performance Evaluation of on Demand Energy Efficient Routing Protocol for WSN
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.81-88
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, reactivity and artificial bee colony based protocol for wireless sensor networks has been proposed. From the survey it is found that GSTEB indicates quite significant results within the available wireless sensor network protocols. The tree based routing need shortest path between the origin and the sink, however the shortest path problem is NP-Hard in nature. Therefore, the artificial bee colony is required to raise the GSTEB protocol further to find the shortest route. The use of reactivity has been ignored in the case of GSTEB routing protocol, clustering is required to decrease the redundant data. GSTEB has been applied only on small networks the aftereffect of the dense network has been ignored in GSTEB protocol. Therefore, the proposed technique has been designed and implemented in the MATLAB tool. From various metrics, evaluation of improvement of the proposed technique over GSTEB has been found.
Research of Book Positioning System Based on Wireless Sensor Network
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.89-96
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In order to meet the need of book management in smart library and achieve the positioning of perception node for book position, ZigBee wireless smart network technology is adopted to achieve the information interaction of book information and book management, and RFID technology is used to provide communication perception platform for monitoring book node. Least square method and RSSI (Received signal strength indication) are used to achieve the optimized 3d positioning for book node. The simulation result shows that the amount of calculation for the algorithm is small, whose positioning accuracy reaches 1.21%.
The Research and Application of Modular Mobile Phone Web Front-end Based on MVCS Mode
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.97-106
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With the popularity of mobile devices in recent years, the application of mobile phone Web front-end has become a research hotspot. This paper has constructed the MVCS (Model-View-Controller-Store) model by taking the MVC model as the framework, the ExtJS modular as the basis, and data storage (Store) as the data container, explained by taking the book information system the methods and steps of adopting such model to complete the design of modular mobile phone Wed front-end, and displayed the real-time data chart of mobile phone web front-end. Finally, it also has discussed the research trend.
Performance Evaluation of MAC Aware QOS Provisioned Hybrid Routing over VANET
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.107-114
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A vehicular ad-hoc network adopts some attributes of MANET and provides communication between high speed vehicles. VANET based communication can be classified into three categories i.e. Vehicle to Vehicle (V2V), Vehicle to Infrastructure and Hybrid which combines both V2V and V2I schemes. VANET has the potential of achieving goals of intelligent transport system (ITS) increasing road safety and transport efficiency. VANET though being a sub-class of MANET has distinguishing features that make routing in VANET a baffling problem. Timely and accurate information dissemination is the primary concern. QoS guaranteed routing with minimum packet collisions will increase the efficiency and throughput of the channel. Back-off algorithms are used to reduce the number of collisions when nodes try to access the channel simultaneously. In this paper, we deployed a back-off method called Modified Back-off algorithm (MBA) in the MAC layer of IEEE 802.11p. The simulations are carried out using NS-2 in order to study the behavior of hybrid routing protocol, ZRP with two different back-off mechanisms utilized at the MAC layer. Evaluations are done using Nakagami propagation model with different vehicle densities and packet sizes. The performance is investigated in terms of throughput, packet delivery ratio, routing load and end to end delay.
Research on the Multi-channel P-persistent CSMA Protocol with Monitoring Function
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.115-124
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents a new sensor network MAC protocol: the multi-channel p - persistent CSMA protocol with monitoring function (ACKPPCMA) from the perspective of improving the channel utilization and meeting the demand of the high QoS for high priority. Analyze the model by using the average cycle method. The Computer simulation results verify the correctness of the theory. Has some practical significance.
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.125-136
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, the communication mode selection issue as well as pricing mechanism in relaying enhanced device-to-device (D2D) communications is discussed. By considering the user density within the cell, the problem of “when D2D relaying mode should be selected?” is explored. Furthermore, based on game theoretical approach, the optimal pricing strategy is proposed so as to encourage D2D relaying behavior among D2D peers. Considering user’s demands and D2D devices’ constraint ability, the proposed mechanism is based on the user’s payoff model. Simulation results demonstrate that under game theoretical model, the proposed scheme can achieve the maximal utility for D2D devices when the reasonable price is adopted, hence better user experience can be obtained.
Estimates of the Restricted Isometry Constant in Super Greedy Algorithms
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.137-144
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Orthogonal Super Greedy Algorithm (OSGA) is a super greedy-type algorithm for sparse approximation. We analyze the convergence of OSGA based on Restricted Isometry Property (RIP). Our main conclusion is that if a matrix satisfies the Restricted Isometry Property of order [ sK ] with isometry constant δ < s / 2 s+ K , then OSGA ( s ) can exactly recover any K -sparse signal x from y = Φx in at most K iterations.
Research on the Optimization of the Performance of CTL Loop Discriminator
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.145-156
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Chip Tracking Loop (CTL) is the key to ensure the accuracy of regenerative pseudo-noise ranging in the deep space measurement and control communication system. However, due to the impact of the code imbalance, clock attenuation rate and noise, the loop locking time of CTL is prolonged and the ranging accuracy is degraded. In this paper, we proposed the discriminator optimization algorithm to address this problem. This algorithm is based on the loop discrimination performance of clock code and composite code, and the impact of the noise on the discrimination performance. In order to improve the tracking accuracy and shorten the loop locking time, this algorithm corrected the curve of discriminator’s gain by compensating discriminator’s gain. Both the theory analysis and simulation results illustrate that the algorithm can correct the discriminator’s gain curve, reduce the loop locking time and ensure the significant tracking accuracy in low SNR.
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.157-166
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Aggressive packet combining (APC) was introduced to correct error with low latency in wireless network. Wireless Network is high error prone (Bit error rate varies from 10-2 to 10-4). Several modified APC have been studied elsewhere for improving throughput and error correction. In this paper we propose new investigations of different basic protocols of APC to reduce transmission delay by checking Hamming Distance. Three state Markov model using multiple routes is studied to achieve high throughput.
The Experimental Practices of VoIP Based on the Commercial Softswitch Device
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.167-176
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A softswitch is the central device of the next-generation network (NGN) which is the hotspot in telecommunication industry. So it’s of great significance for the students and related companies to carry out practical experiments and researches based on the commercial softswitch device. Three stage targets of the VoIP, from the elementary to the profound, are proposed according to the characters of the softswitch teaching. The hardware and the software queuing system of the NGN laboratory of Harbin University of Science and Technology, which was designed and built for the targets, are introduced. Students can be queued for experiments with commercial VoIP devices in the NGN laboratory. Three categories of experiments, IP to IP, IP to Phone, and Softphone application development, are designed to cultivate innovative talents.
An Automatic Software Requirement Analysis Model based on Planning and Machine Learning Techniques
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.177-188
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In the past years, the scale of software is growing quickly as more and more organizations begin to deploy their business on Internet. As a result, requirement analysis becomes a challenging issue and conventional approaches might significantly increase the costs of software development. Therefore, automatic requirement analysis techniques have attract more and more attentions, which allows for modeling and analyzing requirements formally, rapidly and automatically, avoiding mistakes made by misunderstanding between engineers and users, and saving lots of time and manpower. In this paper, we propose an approach to acquiring requirements automatically, which adopts automated planning techniques and machine learning methods to convert software requirement into an incomplete planning domain. By this approach, we design an algorithm called Intelligent Planning based Requirement Analysis (IPRA), to learn action models with uncertain effects. A concrete experiment is conducted to investigate the proposed algorithm, and the results indicate that it can obtain a complete planning domain and convert it into software requirement specification.
Performance Evaluation of Two Reactive Routing Protocols for RWP Mobility Model with Different Speed
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.189-194
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Wireless adhoc network are self creating self organizing and self administrating. The nodes within the network are free to move thus network do not rely on the preexisting infrastructure. Due to ease in deployment of mobile adhoc network wireless network are widely used. In the wireless network topology continuously changes according to the data packets to be sent at the destination path. With this so many best results in the wireless communication in this era wireless network over took wired network. In this paper we have compared the performance of two reactive MANET routing protocols AODV and DSR by using random way point mobility model. Both share similar On-Demand behavior, but the protocol's internal mechanism leads to significant performance difference. We have analyzed the performance of protocols by network load, mobility model and type of traffic (CBR). A detailed simulation has been carried out in QUALNET 6.1. The metrics used for performance analysis are Throughput, Average end-to-end Delay and Average jitter.
Adaptive Network Traffic Prediction Algorithm based on BP Neural Network
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.195-206
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With the rapid development of Internet technology, the network now has a large size and high complexity, and consequently the network management is becoming increasing difficult and complexity, so traffic forecast play a more and more role in network management. With a large amount of real traffic data collected from the actual network, an adaptive network traffic prediction algorithm based on BP neural network was proposed in this paper, it use an adaptive learning rate method to adjust the learning rate according to total error changing trend of decreased or increased and the difference of changing; and then it corrects the weights in each layers according to forward and reverse calculation. Simulation results show that, compared with the traditional BP neural network, our algorithm has better performance in the prediction results, and has smaller error.
Reliability Evaluation of Mobile Ad-hoc Networks
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.207-220
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Reliability is the important concern in wireless ad hoc networks. Therefore, evaluating reliability has become the essential in MANET. Many existing wireless ad hoc network routing protocols assume the availability of reliable nodes. This, however, is not a realistic assumption given the dynamics of wireless ad hoc networks. Also, due to frequent changes in topology, link failures and node failures are possible. Therefore, a realistic method is needed to evaluate reliability of ad-hoc networks in case of such uncertainties. In this paper, we propose a node failure model, which is injected into the MANET. We then illustrate the effect of node failure on the performance of the mobile ad-hoc networks. This paper evaluates how well a DSR protocols for MANETs behave when under a realistic scenario of momentary node failures and topology changes, which is represented by a node failure model. A gap analysis is then carried out and strategies are planned to improve the performance and reliability of MANET.
Research on PN Code Acquisition Strategy
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.221-230
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
PN code acquisition is the key to synchronization in direct-sequence spread-spectrum(DSSS) systems. Aiming at the problems in the process of PN code acquisition, the block diagram of acquisition strategy is illustrated firstly. Then, with the choice of different search mode, determination mode and verification mode in the block diagram, the detection probabilities and false alarm probabilities are presented separately, and the false alarm probability of threshold detection method, the detection probability and false alarm probability of maximum-selection determination method are deduced, and all kinds of acquisition strategies are given. Finally, Simulation results shows that the detection probabilities and false alarm probabilities in theory and experiment is consistent with different acquisition strategy, and so does the validation of detection probabilities by maximum-selection method in multiple dwell times.
Co-Centric Cell-Splitting Technique Using Frequency Reuse
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.231-238
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
When a MS or mobile node (MN) moves out from a base station (BS) to another base station then it needs to perform a handoff or handover. Here we will propose a method that minimizes the handoff failure probability by increasing the total number of channel with help cell splitting process. This is Mother and child cell concept.
Adaptive Synchronization of Chaotic Systems with known Response System Parameters
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.239-248
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A kind of adaptive synchronous control method was proposed to solve a special synchronization problem between two chaotic systems, where the response system is totally known without uncertainty but the driven system contains both unknown parameters and uncertain nonlinear functions. An update law of estimation of unknown parameters of driven system by constructing a proper Lyapunov energy function and the stability of the whole system was guaranteed by Lyapunov stability theorem. What is worthy pointing out is that the chaotic systems are not required to satisfy the Lipscitz condition. At last, detailed numerical situation was done to show the rightness and effectiveness of the proposed method.
TDOA-Based and RSSI-Based Underground Wireless Positioning Methods and Performance Analysis
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.249-258
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Wireless location has become one of the important technologies of wireless sensor network application. Due to the underground wireless location affected by various factors, the positioning system cannot meet the actual demand. In this paper, Time Difference of Arrival (TDOA) and Received Signal Strength Indicator (RSSI) location technologies have been investigated, then various impact factors on the TDOA and RSSI location systems have been discussed, multipath channel, different shapes of the roadway on the propagation loss. In order to reduce the error, estimation error has been correlated and compensated. Simulations show that the proposed system consistently outperforms other existing localization methods and can achieve higher accuracy.
Routing Protocol of Cognitive Ad Hoc Network
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.259-272
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper proposes a priori cross layer routing protocol CLC-DSDV routing protocol in cognitive Ad Hoc network, the protocol will combine channel management mechanism and DSDV routing protocol in Ad Hoc network, and aiming at the existing problem of multi channel DSDV-MC routing protocol such as primary user interference, routing load imbalance, routing reconfiguration have been improved, in order to achieve the effective use of wireless spectrum of cognitive Ad Hoc networks. Concrete improvements on the routing protocol are described: joining the node load considerations in the routing process; through the information of the global routing table of each node for distribution in channel allocation; channel allocation information embedded in routing newspaper information and broadcasting timely; starting routing update packets to ensure compliance with the neighbor node information synchronization at the channel switching time. The simulation of the routing protocol based on NS2, the simulation results show that the CLC-DSDV routing protocol can effectively improve the utilization of licensed spectrum rate, throughput, delay, packet loss rate, routing load and other aspects can be more outstanding than the original multi channel routing protocol DSDV-MC.
A Novel and Efficient Wireless Communication System
보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.8 No.5 2015.10 pp.273-288
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper aims to construct a novel wireless communication system, in which source signals are transmitted simultaneously in the same frequency band. The transmitted signals are only required to be statistically independent or statistically distinguished. Therefore, the source signals can be recovered at the receiver by utilizing the classical algorithms of blind source separation (BSS) and independent component analysis (ICA) such as the fast fixed-point algorithm (FastICA). On the one hand, because the source signals are transmitted simultaneously in the same frequency band, the spectrum efficiency of this novel system is much higher than those of time division multiplexing (TDM), frequency division multiplexing (FDM), and code division multiplexing (CDM) systems, in which TDM, FDM and CDM signals are limited in time interval, frequency band and code. On the other hand, inspired by recently proposed reference-based schemes, the reference signals are introduced to the classical separation algorithms of BSS and ICA, which makes this novel system much more efficient than classical ones in terms of computational speed. The performance of this new system is validated through realistic experiments. Additionally, it is theoretically shown that the information content of all the source signal inputs can be recovered by this novel wireless communication system.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.