Earticle

현재 위치 Home

International Journal of Multimedia and Ubiquitous Engineering

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJMUE) [Science & Engineering Research Support Center, Republic of Korea(IJMUE)]
  • pISSN
    1975-0080
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.5 No.1 (5건)
No
1

A Novel Security Algorithm for Universal Mobile Telecommunication System

Murtaza Naveed Akhtar, Abid Ali Minhas, Jehanzeb Ahmad

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.5 No.1 2010.01 pp.1-18

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The user authentication process is an important task in mobile networks. With the development of new standard Universal Mobile Telecommunication System (UMTS), the security weaknesses of previous standards are removed. However one security weakness has been found by researchers in UMTS, which is the sending of user's International Mobile Subscriber Identity (IMSI) in plain text over the air interface during authentication process. In order to address this issue, a novel security algorithm named as Airam is presented in this research work. Airam algorithm uses hybrid cryptography technique to resolve the problem of sending user's IMSI is plain text over the air interface during authentication process. Simulation results show that the proposed Airam algorithm also provides adequate security against replay and imposition attacks.

2

Anonymity Leakage Reduction in Network Latency

Longy O. Anyanwu, Ed.D., Jared Keengwe, Ph.D., Gladys Arome, Ph.D.

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.5 No.1 2010.01 pp.19-28

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users’' identity as to personal, source and destination location and content information. Notably, no network capability is in existence to completely negate anonymity leakage in network latency, thus, the minimization of anonymity leakage in network latency becomes critically salient. The purpose of this paper is to investigate network latency anonymity leaks, and propose practical techniques for their reduction. In this direction, we investigate the following technical question: what implementation techniques can be configured to truly reduce anonymity leaks using deployable systems. Here, an extension of the popular Tor security strategies and unique configuration of the popular network anonymity techniques (algorithms) for future implementation are presented.

3

An Efficient Bundle Replacement Algorithm for OSGi Platform

brahim Kamel

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.5 No.1 2010.01 pp.29-40

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

OSGi is a middleware standard for home gateways, designed for smart home applications. OSGi models services as separate components, called bundles. Smart home applications might differ in their importance. For example, home security system is more important than Internet game. Bundles collaborate to provide the required service. This paper proposes a bundle replacement algorithm that takes into account the priority of the bundle and the interdependence between different bundles. Thus, given a home gateway that hosts several applications with different priorities and arbitrary dependencies among them. When the home gateway runs out of memory, which bundles will be stopped or kicked out of memory to start a new service. Because of the bundle dependencies, traditional memory management algorithms might not be efficient. Efficient replacement algorithm should stop the least important and a small number of bundles. The proposed algorithm takes into consideration the priority of the bundle or application and dependencies between different bundles, in addition to the amount of memory occupied by each service. We implement the proposed algorithms and performed many experiments to evaluate its performance and execution time. We used best fit and worst fit as yardstick to show the effectiveness of the proposed algorithms. The proposed algorithms are implemented as a part of the OSGi framework(Open Service Gateway initiative).

4

Parallel Mass Transfer Simulation of Nanoparticles using Nonblocking Communication

Chantana Chantrapornchai (Phonpensri), Banpot Dolwithayakul, Kanok Huankumnerd, Sergei Gorlatch

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.5 No.1 2010.01 pp.41-52

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper presents experiences and results obtained in optimizing parallelization of the mass transfer simulation in the High Gradient Magnetic Separation (HGMS) of nanoparticles using nonblocking communication techniques in the point-to-point and collective model. We study the dynamics of mass transfer statistically in terms of particle volume concentration and the continuity equation, which is solved numerically by using the finite-difference method to compute concentration distribution in the simulation domain at a given time. In the parallel simulation, total concentration data in the simulation domain are divided row-wise and distributed equally to a group of processes. We propose two parallel algorithms based on the row-wise partitioning: algorithms with nonblocking send/receive and nonblocking scatter/gather using the NBC library. We compare the performance of both versions by measuring their parallel speedup and efficiency. We also investigate the communication overhead in both versions. Our results show that the nonblocking collective communication can improve the performance of the simulation when the number of processes is large.

5

Texture Classification Based on Random Threshold Vector Technique

B.V. Ramana Reddy, M.Radhika Mani, B.Sujatha, Dr.V.Vijaya Kumar

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.5 No.1 2010.01 pp.53-62

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A new feature set derived from the fractal geometry, called the random threshold vector (RTV) is proposed for texture analysis. The RTV is computed for different run length entropy dimensions. The run length entropy dimensions are calculated based on different thresholds. To test the rotationally invariant feature, the run length entropies are calculated in different directions. The experimental results show that the RTV contains great discriminatory information needed for a successful classification.

 
페이지 저장