Earticle

현재 위치 Home

International Journal of Future Generation Communication and Networking

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJFGCN) [Science & Engineering Research Support Center, Republic of Korea(IJFGCN)]
  • pISSN
    2233-7857
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.9 No.12 (37건)
No
1

Emergency Broadcasting over CATV Channel using FM Subcarrier Technology

Yan Ma, Chunjiang Liu, SenHua Ding, Naiguang Zhang

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.1-16

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Emergency broadcasting is of importance method to alert people when disaster happens, but the development of network is slow in Chinese rural areas. So it is necessary to propose an emergency broadcasting solution for Chinese rural areas based on the available network. In this paper, a method that adopts FM subcarrier technology over CATV channel to broadcast emergency message have been proposed. In the method, emergency program is transmitted by CATV channel and emergency order is carried in FM subcarrier. As usual, to communicate emergency message to the public efficiently and effectively, a complete emergency broadcasting system should have following functions such as parallel broadcasting, compatibility, robustness, security, and so on. In the context, to satisfy above requirements, corresponding system construction, communication scheme, and message transmission protocol have been proposed as well. To verify the practicability, the solutions have been test in Chinese rural areas MiYun and gain good results.

2

Mobility-Aware Node Clustering with Fuzzy Logic for Wireless Mesh Network

Tapodhir Acharjee, Sudipta Roy

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.17-28

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In recent times, Wireless Mesh Network (WMN) has received prominence worldwide due to the evolution of wireless networks as a ubiquitous and seamless broadband service provider. Routing on WMNs is one of the most prominent research issues on these days. Hierarchical clustering based routing protocols are proposed by the researchers for large networks. In these protocols, all the available nodes are grouped into clusters. Each clus-ter consists of cluster members, cluster head and gateway nodes where cluster head plays the most vital role to form an efficient cluster. Selection of a better cluster head depends on the decisions made from different parameters and their relations. In this situation, fuzzy logic suits better by providing better analysis and helps to make the right decision based on different parameter values and their relations. In this paper, a fuzzy logic based hierarchical clustering technique is proposed for WMN. The proposed technique along with the existing Fuzzy Logic Control Clustering Algorithm(FLCCA) are experimented using the simulation software NS3 and the simulated results are compared to establish the efficiency of the proposed technique.

3

To investigate the reasonable method for selecting persons in organization personnel training, our study focuses on the formulation of personnel selection in organization personnel training based on knowledge supernetwork. First, this paper states the process of constructing organization training supernetwork and formulates the model for selecting single person. Subsequently, we establish the model for selecting multiple persons based on training knowledge supernetwork and analyze the complexity and the shortcomings in detail. Third, to improve the accuracy of personnel selection, we build the model for selecting multiple persons based on step-by-step method and analyze the complexity. Final, the proposed models are verified by an application case.

4

A Power and Performance Management Simulation Platform for Web Application Server Cluster

Zhi Xiong, Zhongliang Xue, Weihong Cai, Lingru Cai, Juan Yang

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.39-54

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Web application server cluster has been widely used to improve the performance of web application servers. Because web load is highly variable, we need to dynamically manage cluster’s deployment so as to reduce power consumption and meanwhile satisfy load performance demand. To facilitate researchers to evaluate a management strategy or choose key parameters for it, we propose a CloudSim-based simulation platform in this paper. It can simulate different cluster deployment algorithm, request scheduling algorithm and load feature, where cluster’s deployment includes the on/off state, CPU frequency and request scheduling parameter(s) of each server. By the aid of HookTimer component, the platform supports periodical and conditional deployment trigger modes, and can calculate some common performance indicators. The usage of interface, dynamic proxy technique and XML configuration file make the platform have good extensibility and configurability. In addition, a request-number-triggered management strategy is proposed and simulated by the platform. The simulation results demonstrate the feasibility of the platform.

5

Wireless Sensor Network has many sensor nodes that are used to monitor the physical and environmental condition such as Vibration, Temperature Sound and so on. In Wireless sensor network all sensor cooperately pass their data to the base station from where data are transmitted via satellite or internet to the base station. Wireless sensor network has some constraints like power or energy is limited, computational capability is limited, storage capability is limited. Energy efficiency of sensor nodes is very big issue in wireless sensor network because sensor nodes have low energy. To improve energy-efficiency of sensor nodes various routing protocols have been proposed in wireless sensor network like Cluster based routing protocols-LEACH (Low-Energy Adaptive Clustering Hierarchy), LEACH-C (Low-Energy Adaptive Clustering Hierarchy-Centralized), EEPSC (Energy-Efficient Protocol with Static Clustering), Cross-layered modification technique and other routing protocols like AODV, DSR, Bellman Ford, DSDV and DYMO Routing protocols. So in this work we try to analyze the performance of AODV, DYMO and DSR routing protocol for improvement Quality of Service (QoS) in Wireless Sensor Network. The parameters used for the performance analysis include average jitter, throughput, average end to end delay.

6

The British and American English are the most common target accents. British and American English have different phonetic symbol and pronunciation system. These two accents have many learners. And some learners have mixed phenomenon of British and American accent. Based on the mixed phenomenon British and American English accent for English learners, this paper put forwarder a model of American and British accent fusion method, improve the quality of the pronunciation evaluation performance system, and realize the embedded compressed acoustic model. This method divide acoustic model into alternative model, fusion model and encourage model by replace probability. The alternative model could be removed, and isolated model could be reserved. The fusion model could be merged based on model interpolation and model clip. Pronunciation quality evaluation results showed that the correlation of speaker level increased by 14.1%, compared with single accent model and in fusion model,; fusion model was similar to the performance of the hybrid model, the figure of gaussian component compressed by 10.7%.

7

Performance Analysis of IEEE 802.15.4/Zigbee Networks Under Route Information Based AODV Routing Algorithm

Rohit Ranjan, Harsukhpreet Singh, Anurag Sharma

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.75-86

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the field of wireless communication, zigbee is a latest technology in wireless network based on IEEE 802.15.4 standard. On IEEE 802.15.4 standard based zigbee network uses low power sensor nodes to ensure reliable, process, collect, and store the data. The sensor nodes have low cost, smaller in memory size and used in lower coverage area first two layers based on IEEE 802.15.4 standard are PHY and MAC layer. Routing protocols are divided in two categories that are reactive protocol and proactive protocol. AODV routing protocol comes under reactive protocol. It creates route between source and destination when needed. When source node has data to transmit to the destination node then it will create RREQ (route request message) and send to all neighbors in the network, when the destination node found or neighbor node found the route to destination then they will generate a RREP (route reply message) and forward back to source node. After the creation of route between source node and destination node they can exchange the data.

8

Three-phase Cooperative Jamming Based Improving PHY Security for Multicast Network with an Untrusted Relay

Xingqun Fu, An Li, Panagiotis G Sarigiannidis

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.87-96

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, a multicast network in the presence of an untrusted relay is investigated. A three-phase AF-based cooperative jamming with power allocation is proposed to enhance the system secrecy rate. Based on time division based cooperative multicast (TDCM) protocol, the source uses part of its available power to broadcast pre-defined jamming signals in order to create interference at the untrusted relay, while the relay amplifies the linearly combined two received signals and then re-transmits it to the destination. Optimum power allocation policy involving the allocation between the information and jamming signals at the source and between two combined signal factors at the relay to maximize the achievable worse secrecy rate or sum-rate are derived and analyzed. Numerical results are provided to demonstrate our analytical results and reveal that compared with the two benchmarks schemes, the proposed scheme can obtain significantly higher positive secrecy rate for the same transmit power budget, especially in the case of maximizing secrecy sum-rate.

9

The Design of S-box Based on Cascaded Integer Chaos Applied to Wireless Sensor Network

Juan Wang, Yan Lu, Qun Ding

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.97-106

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the block cryptogram algorithm of wireless sensor network, the emphasis is how to design a secure and efficient S-box. A design method of S-box is proposed based on dynamic iteration of the cascaded integer chaos, which is obtained by the cascade and integer quantization of one-dimensional discrete chaotic map logistic and tent. the S-box not only conform to the application requirements of node operation and computational efficiency, but also compensate the degradation of dynamic characteristics of the single-level integer chaos. The performance tests of S-box were carried out, including nonlinearity degree, differential uniformity, strict avalanche criterion, out-put bit independence criterion and bijective property. In contrast to the existing classical S-box based on chaotic map, the results indicate that the S-box has more excellent cryptographic properties, and it can be used as a candidate nonlinear component in the design of block cryptogram algorithm for wireless sensor network.

10

Underwater Acoustic (UWA) channels are known as some of the most challenging communication media. Since the Underwater acoustic channels are time varying multipath channel achieving the high data rate, a low latency and a high throughput which often is a very difficult objective. In this work, we designed an OFDM transceiver system which is suitable for underwater acoustic communication with limited bandwidth to enhance the data rate at the receiver. To enhance the data rate at the OFDM receiver we have used efficient adaptive modulation scheme, channel estimation and channel equalization schemes for UWA communication. We have focused on the efficient modulation schemes like QPSK, DPSK and 16-QAM which is best suited for adaptive techniques based on the SNR of the Rayleigh fading channel to enhance the data rate. The simulation results show that the performance of the OFDM system with the use of Adaptive modulation is better when compared to the OFDM system without Adaptive modulation schemes. Also we have used the Kalman filter for channel estimation which minimizes the mean squared error and gives us the best estimation even in the presence of noise. From the simulation results, we have found that these modulation techniques and channel estimation method are best suited to achieve high data rate for underwater acoustic communication.

11

A Clustering Algorithm Based on Zone in Vehicular Ad Hoc Networks

Zhijun Yan, Yang Tao, Fangjin Zhao, QianJin He

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.117-128

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Vehicular Ad Hoc Networks (VANET) is a wireless mobile ad hoc networks established on the inter-vehicle communication. Due to the special characteristics and the restrictions of roads, VANET shows characteristics of uneven nodes density, fast moving, high dynamic topology. So it is difficult to establish a stable link between nodes, and the reliability of data transmission declines rapidly with the increase of hops. Therefore, ensuring data reliability and rapid distribution is always a difficult point in the VANET research. Through analysis of vehicular ad hoc networks environment, we propose the node connectivity and the connectivity strength. By dividing the road environment into the segment area and the intersection area, respectively calculating and predicting the connectivity according to the road environment, we propose the zone based adaptive clustering algorithm (ZACA).

12

Network Traffic Identification Algorithm Based on Neural Network

Fei Wu, Yong Ye, Hongfa Li, Shilong Ni, Jiangwen Su

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.129-138

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, a network traffic identification model is established using a multilayer excitation function quantum neural network which is suitable for data classification. Because the conventional quantum neural network has different target function in the training of the weights of the network and the sigmoid function of the neurons in the hidden layer, the coupling effect of the two parameters is not processed. This will result in the middle and later stage of the training iteration process, and it may be possible to reduce the objective function value of a kind of parameter, and make the objective function value of another kind of parameter increase. In order to avoid this situation, using LM algorithm to optimize, using the same objective function not only as the target function of the network weight, but also the function of translational spacing of sigmoid function of neurons in the hidden layer, and the training objective is to minimize the sum of squared error of the neural network output and the desired value. Finally, the recognition performance of the proposed algorithm is compared with that of the conventional quantum neural network and LM-BP neural network. The results show that the convergence rate of the proposed algorithm is the fastest and the convergence accuracy is the highest.

13

SDN-based Handover in Future WLAN

Syed Mushhad M. Gilani, Wenqiang Jin

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.139-154

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Presently, the smart devices consumers prefer IEEE 802.11-based wireless local area network (WLAN) to access the Internet due to ease of access, low cost, tremendous throughput, and provision for multimedia applications. However, traditional WLAN suffers from a critical issue regarding handover management because it has not been well-announced in IEEE 802.11 according to future Internet demands. Researchers argue that Software Defined Network (SDN) be future Internet technology revolution that brings significant impact on a wireless network. In this paper, we propose a framework within the SDN paradigm, which enables mobility management, load balancing, and position management applications on top of the centralized controller. The proposed framework implements load targeted handover (LTH) scheme for mobile stations to offers seamless handover and targeted association with underloaded APs. We evaluate LTH approach in a simulation environment then implement in real-time WLAN tested, and results demonstrate that SDN-enabled handover process leads to consistent throughput as compared to a traditional approach.

14

P2P Traffic Detection Based on Particle Swarm Optimization Algorithm

Song Rong, Li Xiating

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.155-164

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Considering the shortcomings of the conventional BP neural network, such as slow learning speed, weak anti-interference ability and easy to fall into local minimum, the detection accuracy of P2P traffic detection model is low and the speed is slow, the particle swarm optimization algorithm is used to optimize it here. As the conventional algorithm's optimization ability is the initial parameters, the algorithm is easy to be early, and the convergence speed is slow. Therefore, grouping, organizing, fission and mutation operation on the conventional algorithm have been carried on in order to improve the defect of conventional algorithm. Finally, the P2P traffic detection model is built by using MATLAB software, and traffic detection experiments are carried out on Bittorrent, EMule, PPlive and PPStream 4 P2P network applications. The test data show that the average recognition rate of the recognition model is 96.14%, which is 13.3% higher than that of the conventional PSO-BP model, and9.4% higher than that of the QPSO-BP recognition model for the four P2P network applications.

15

Simulative Analysis of Hybrid Dispersion Compensation Based on 16x40 Gbps DWDM System Using RZ Modulator

Meenakshi, Nitika Soni, Harmandar Kaur

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.165-172

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper 16x40 Gbps hybrid dispersion compensation schemes with RZ modulation format over SSMF link based on DWDM optical system. Power losses substitute by the EDFA and DCF. Error probability is minimizing the system and optimizing the system performance for all users and channel using in system. The average total output power of the system is -53.65 dBm and the maximum Q-factor is 5.87 and range of BER is <10-12. The simulation results show that data transmission rate successfully transmitted with low cost effective infrastructure with good system performance.

16

In this paper, it has made a deep research to the application of RFID positioning in sports competitions. It also researched the application of VIRE algorithm in positioning system, and proposed an improved VIRE algorithm, also chose the appropriate interpolation method. Through the improved location algorithm, it builds a relationship between the distance and time in finish line of the athlete, and solves the function to make sure the time that athletes reach the finish line, so that it can achieve the purpose of timing.

17

A Node Importance Measuring Method based on Hypernetwork

Quan Xiao, Fangli Yang, Song Luo, Lihong Zhang, Hua Zhao, Wei Shu

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.187-196

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Measuring the importance of nodes in network is an important issue in the study of complex networks. The networks in current researches are mostly based on classical graph theory, which have limitations on describing certain complex relations. In this work, we introduce hypernetwork, taking hypergraph as representation foundation, to describe relations. Hypernetwork is able to extend the modeling and describing capability of traditional network and may be a promising representation model of complex relations. However, a general lack of attention to the node importance measuring in hypernetwork, an important fundamental issue for its further application, has been noted across the majority of related published works. In this paper, we utilize the idea of deleting method, to measure the importance of node in hypernetwork through investigating the influence on the whole network when deleting it. Specifically, the influence is measured by direct loss and indirect loss. Through a calculating example, our method is compared with node degree, betweenness, closeness centrality, degree of neighbor nodes etc., the result shows this method has better adaptability and accuracy.

18

Secure Mobile Commerce in Ad hoc Network Using CAEC2M

Khaleel Ahmad, Md Shoaib Alam, M A Rizvi

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.197-204

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

M-Commerce applications in the world have grown exponentially over the years. It had set up for mobile users to engage wirelessly of ad hoc network infrastructure in online business irrespective of place or time. Providing anonymous, secure and trust based connection service in ad hoc network is quite a challenging task. Anonymity, security and privacy of the transaction or message transmission are the highest priority need to be delivered to the destination node on time. In this paper, a CAEC2M (Cellular Automata Elliptic Curve Cryptography Mix network) algorithm to secure Mobile Commerce over ad hoc network is proposed. An attempt is made to design a mix-network (Mix-Net) using elliptic curve cryptography based on cellular automata which creates a hard to trace communication to protect the anonymity of the sender and encrypt the sensitive information to avoid any eavesdropper trying to access the data during transmission. CAEC2M provides also confidentiality, integrity and authentication.

19

Method for Network Traffic Generation Based on User Behavior of Streaming Media

Shuai Zeng, Zhongying Wang, Guofeng Zhao, Shaocong Gai, Jie Duan, Yi Zhang

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.205-220

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Existing traffic generation methods generate traffic by the flow generator structured and then sent data packets, which had two problems, one is that the traffic generated is not enough authenticity, the other one is that the rate of flow is not high. For coping with the method for network traffic generation based on user behavior of streaming media and streaming media server was presented. The test results show that comparing with D-ITG, the size of traffic produced by this method has been obviously improved, and its principle indicates that the flow is highly authentic. The proposed method breaks through the traditional thinking of traffic generator sends packet by itself, which decreases the difficulty of the realization of the traffic generator and has good reference value for the researches and development of traffic generator.

20

Cooperative Spectrum Sensing Optimization Algorithm Based on Adaptive Threshold Setting

Tangsen Huang, Jie-tai Wang

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.221-230

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Energy detection performance in the signal to noise ratio (SNR) fluctuation needs to be improved. In order to obtain the highest probability of detection, a new cooperative spectrum sensing algorithm is proposed. Dynamic double energy thresholds and adaptive grid search are utilized to obtain the highest probability detection. Double thresholds are adaptive to noise fluctuation, and in order to obtain the best sensing performance, adaptive grid search is used firstly to find the optimal double thresholds. Simulation results show that the proposed algorithm has excellent robustness to noise fluctuation and good sensing performance even under the low signal to noise ratio.

21

MANET Parameter Analysis and its Impact on Next Generation Network

Shadab Pasha Khan, M. A. Rizvi, Sitendra Tamrakar

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.231-240

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A mobile ad-hoc network is a type of network in which all the nodes can communicate each other without any fixed infrastructure. This unique property of MANET is useful in conditions where exchange of information is the prime objective under any circumstances. In this type of network all communicating nodes cooperate with each other in the distributed manner and offer dual responsibility, one as a host and the other as router. This quality of MANET paves the way for numerous new and exciting applications over Next Generation MANET. These applications may include, such as group communication, data telemetry, automotive applications, music and video streaming, real time mobile applications. Two main evolutions of multihop next generation ad hoc networks are projected, namely WMN and Opportunistic Networks. In this paper an honest attempt is made to enumerate and briefly discuss issues and challenges of Next Generation Network, parameters analysis and its impact.

22

Recently, the issue of excessive energy consumption in wireless communications has become increasing critical, and the energy harvesting as a renewable energy resource, has received extensive attractions. In this paper, a wireless sensor network (WSN) is considered, where the source-destination pair communicates via an energy harvesting relay links. We study the problem of the harvested energy distribution among the source, relay and destination nodes. An effective power allocation scheme is developed which exploits the decode-and-forward (DF) relaying strategy and channel state information. The outage probability is analyzed and simulation results show that the outage performance for two sub-channels is always performs well in the cases of different threshold target data rate. Moreover, the effect of the different radio of the optimal sub-channel gain and Rayleigh channel gain on the outage performance is evaluated.

23

Internet of things is a major change in the development of science and technology; it combines the virtual information with the physical world, so that economic activity and social activities are more intelligent, convenient and efficient. In this paper, the author research on the innovation and development strategy of logistics service under the internet of things. The essence of modern logistics is to take the information technology as the core competitiveness, pay attention to the integration of resources and the whole process of logistics optimization, it is the ablest to play the advantages of Internet of things technology applications. The application of communication and network technology in real-time transfer of information, it can realize the logistics operation agility and integration.

24

Design and Implementation of Router for NOC on FPGA

Gaurav Verma, Harsh Agarwal, Shreya Singh, Shaheem Nighat Khanam, Prateek Kumar Gupta, Vishal Jain

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.263-272

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In today’s technological era, SOC has undergone rapid evolution and is still processing at a swift pace. But due to this explosive evolution of semiconductor industry, the devices are scaling down at a rapid rate and hence, SOC today have become communication-centric. However, the existing bus architectures comprising of wires for global interconnection in SOC design are undergoing design crises as they are not able to keep up with the rate of scaling down of devices. To overcome bottleneck of communication system, NOC is an upcoming archetype. In on-chip network, router is considered as an important component. This paper proposes router, its components and parameters which affects the entire design. Thus, to validate the functioning of NOC on hardware, router has been designed in VHDL and simulated in Xilinx ISE 14.1 targeting Xilinx XC5VLX30-3 FPGA.

25

An Improved Energy Balance Routing Protocol based on LEACH Protocol

Xiang Lin Qin

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.273-280

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

LEACH algorithm is a classical hierarchical routing algorithm; it uses the cluster head rotation mechanism to allocate the energy consumption to the whole network. But because of the randomness of the cluster head selection, the optimal number of cluster heads can not be obtained, at the same time, its position cannot do the best, some regions of the cluster head may be more concentrated, some areas may not cluster head, lead to the distance of non-cluster head node and cluster head node is too large, the energy consumption is too large. Soan improved routing algorithm based on LEACH algorithm is proposed, the basic idea is to determine the optimal number of cluster heads, non-uniform clustering, at the same time, the threshold is added in the LEACH algorithm, the nodes with high residual energy become cluster heads, in the process of transmission, multi hop transmission mechanism is adopted among cluster heads. Simulation results show that, this algorithm further reduces the energy consumption in the network, effectively extending the life cycle of the network.

26

A Research of Sensors Complementary for the RFID Wireless Network Based on the Variable Coverage Radius

Hongzhi Wang, Yang Zhao, Haixia Zhou

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.281-294

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In order to solve the problems of sensors complementary, algorithm sensors complementary for the RFID wireless network is proposed in this paper. Based upon the fundamental definitions about the probabilistic events and the data generated by the particle filtering algorithm, the paper considers the factors of the number of locations covered and the probability the object appears. In view of the definition of the covering variability and the cover ratio, 5kinds of RFID sensors covering radius are considered. Finally, the experiment is carried out in order to improve the algorithm’s availability and effectiveness.

27

A Survey of Black Hole Detection Policies in Mobile Ad Hoc Networks

Kanchan Bala

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.295-304

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A mobile ad hoc network (MANET) is defined as a network that has many free nodes that are composed of mobile devices that can arrange themselves in various ways. The important aspect of the MANET is security. In MANET the nodes are connected with the help of its dynamic topology and leave network at arbitrary locations. Ad-hoc On-Demand Distance Vector (AODV) protocol provides dynamic routing between mobile nodes that wish to establish and maintain an ad hoc network. The working of AODV protocol is affected by a particular type of attack called black hole attack.

28

An Interference Suppression Method in Wireless Network of C-RAN Architecture

Liu Zhanjun, Li Zhaoyi, He Hongzhi, Peng Xia, Zeng Xiaoping

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.305-316

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The channel sharing in wireless networks leads to user mutual interference, which also exists in the centralized, cooperative, cloud, and clean-radio access network (C-RAN) which is considered as the access architecture of the 5G mobile communication system. In this paper, the problem of uplink interference suppression in the architecture of C-RAN wireless network was investigated. Taking advantage of the centralized processing in the C-RAN architecture, the correlations of the signals from each RRU are analyzed, based on which we proved that under certain condition, interference can be eliminated by utilizing the correlations among signals. According to the theory before, interference matrix between network users was established based on signals from each user to its nearby RRU. Then, the interference cancellation matrix can be gotten. The uplink signals in the network were processed by making use of the interference cancellation matrix, which can turn the interference part caused by the transmit signal of mobile terminal into useful signal.

29

Node-disjoint multiple routing is an effective mechanism for delivering rich multimedia in wireless multimedia sensor networks. And congestion is one of main problem must be addressed in routing scheme. Considering routing paths established are of non-interference and node-disjoint, each routing path can be viewed as a node. And then a queueing network model is introduced to abstract multiple type multimedia packets delivery process through node-disjoint routing paths in cluster based wireless multimedia sensor networks. At cluster header, QoS-aware traffic schedule scheme is adopted to dispatch packets of different priorities. The scheme consists of receiving buffer queue, traffic packets dispatching service based on generalized Erlang distribution, and priority-based sending buffer queue. Then we model the optimal decision control process of multipath routing in congestion state. Finally, we simulate the proposed queueing network model with trust-based load balancing scheme. And the results reveal that our proposed model is more suitable for node-disjoint multiple paths to deliver rich multimedia information, such as video and images.

30

Developmental Approaches Covering Context Area Mobile Applications Service Oriented Architecture and Model Driven Architecture

Haeng-Kon Kim, Hyun Yeo, Tai-hoon Kim, Carlos Ramos, Goreti Marreiros, Ha Jin Hwang

보안공학연구지원센터(IJFGCN) International Journal of Future Generation Communication and Networking Vol.9 No.12 2016.12 pp.329-338

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Model Driven Architecture (MDA), as we consider the growing significance and utility of modeling in the development of software and solutions, it reflects the benefits of MDA to transform one PIM into several PSMs, each for platform or technology in which the final system will be deployed, and the automatic code generation that implements the system for those platforms from the corresponding PSMs. Service-oriented architectures (SOA) are also presented as the key to business agility, especially when combined with a model-driven approach. Model-Driven Architecture (MDA) is a well-developed idea that fits well with SOA, but as of today, it has been a specialized technique that is beyond practical application scope of most enterprises. We describe the MDA and SOA abstract components to be useful in mobile business applications in the future, allowing to add the features of the two modeling architectures, concentrating on the classification of models that is embodied individually. The framework given, a unified modeling architecture, which illustrates how the two architectures can be brought together into one.

 
1 2
페이지 저장