首页 > 最新文献

J. Networks最新文献

英文 中文
A Comparative Analysis of Protocols for Integrating IP and Wireless Sensor Networks 集成IP和无线传感器网络协议的比较分析
Pub Date : 2016-01-28 DOI: 10.4304/jnw.11.01.1-10
H. Ali, S. Ghani
Wireless sensor networks (WSNs) have been used to monitor, control and automate different applications on local scale. Early research therefore, focused on designing MAC, network and transport layer protocols dedicated to meet the specifications of these local WSN applications. However, the idea of integrating sensor networks with the Internet to make the local sensor data accessible on a global scale has gained popularity in recent years. Integrating IP (Internet Protocol) and WSNs pose many challenges due to the different characteristics of these heterogeneous networks. Two integration architectures, proxy-based and network-overlay based have emerged in parallel. This paper surveys the protocols implementing these two integration architectures, their limitations and the extent to which they achieve seamless interoperability of IP and wireless sensor networks. We classify the reviewed protocols at transport and network layers and compare them in terms of relevant performance matrices. Our study shows that there are many limitations in the existing techniques and protocols and the idea of achieving seamless integration is only in its initial stages
无线传感器网络(WSNs)已被用于监测、控制和自动化不同的本地应用。因此,早期的研究主要集中在设计MAC、网络和传输层协议,以满足这些本地WSN应用的规范。然而,近年来,将传感器网络与互联网相结合,使本地传感器数据在全球范围内可访问的想法越来越受欢迎。由于异构网络的不同特性,集成IP (Internet Protocol)和wsn带来了许多挑战。基于代理的集成体系结构和基于网络覆盖的集成体系结构同时出现。本文综述了实现这两种集成架构的协议、它们的局限性以及它们在多大程度上实现了IP和无线传感器网络的无缝互操作性。我们在传输层和网络层对审查的协议进行分类,并根据相关的性能矩阵对它们进行比较。我们的研究表明,现有技术和协议存在许多局限性,实现无缝集成的想法仅处于初始阶段
{"title":"A Comparative Analysis of Protocols for Integrating IP and Wireless Sensor Networks","authors":"H. Ali, S. Ghani","doi":"10.4304/jnw.11.01.1-10","DOIUrl":"https://doi.org/10.4304/jnw.11.01.1-10","url":null,"abstract":"Wireless sensor networks (WSNs) have been used to monitor, control and automate different applications on local scale. Early research therefore, focused on designing MAC, network and transport layer protocols dedicated to meet the specifications of these local WSN applications. However, the idea of integrating sensor networks with the Internet to make the local sensor data accessible on a global scale has gained popularity in recent years. Integrating IP (Internet Protocol) and WSNs pose many challenges due to the different characteristics of these heterogeneous networks. Two integration architectures, proxy-based and network-overlay based have emerged in parallel. This paper surveys the protocols implementing these two integration architectures, their limitations and the extent to which they achieve seamless interoperability of IP and wireless sensor networks. We classify the reviewed protocols at transport and network layers and compare them in terms of relevant performance matrices. Our study shows that there are many limitations in the existing techniques and protocols and the idea of achieving seamless integration is only in its initial stages","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"5 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2016-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81940784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intelligent Sampling Using an Optimized Neural Network 基于优化神经网络的智能采样
Pub Date : 2016-01-28 DOI: 10.4304/jnw.11.01.16-27
Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, Kalvinder Singh
Modern Internet has enabled wider usage, resulting in increased network traffic. Due to the high volume of data packets in networking, sampling techniques are widely used in flow-based network management software to manage traffic load. However, sampling processes reduce the likelihood of anomaly detection. Many studies have been carried out at improving the accuracy of anomaly detection. However, only a few studies have considered it with sampled flow traffic. In our study, we investigate the use of an artificial neural network (ANN)-based classifier to improve the accuracy of flow-based anomaly detection in sampled traffic. A feedback from the ANN-based anomaly detector determines the type of the flow sampling method that should be used. Our proposed technique handles malicious flows and benign flows with different sampling methods. To evaluate the proposed sampling technique, a number of flow-based datasets are generated. Our experiments confirm that the proposed technique improves the percentage of the sampled malicious flows by about 7% and it can preserve the majority of traffic information
现代互联网的使用范围越来越广,导致网络流量增加。由于网络中存在大量的数据包,采样技术被广泛应用于基于流的网络管理软件中来管理流量负载。然而,采样过程降低了异常检测的可能性。在提高异常检测的准确性方面进行了许多研究。然而,只有少数研究考虑了采样流交通。在我们的研究中,我们研究了使用基于人工神经网络(ANN)的分类器来提高采样流量中基于流量的异常检测的准确性。来自基于人工神经网络的异常检测器的反馈决定了应该使用的流采样方法的类型。我们提出的技术使用不同的采样方法处理恶意流和良性流。为了评估所提出的采样技术,生成了许多基于流的数据集。实验结果表明,该方法将恶意流的采样率提高了约7%,并保留了大部分流量信息
{"title":"Intelligent Sampling Using an Optimized Neural Network","authors":"Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, Kalvinder Singh","doi":"10.4304/jnw.11.01.16-27","DOIUrl":"https://doi.org/10.4304/jnw.11.01.16-27","url":null,"abstract":"Modern Internet has enabled wider usage, resulting in increased network traffic. Due to the high volume of data packets in networking, sampling techniques are widely used in flow-based network management software to manage traffic load. However, sampling processes reduce the likelihood of anomaly detection. Many studies have been carried out at improving the accuracy of anomaly detection. However, only a few studies have considered it with sampled flow traffic. In our study, we investigate the use of an artificial neural network (ANN)-based classifier to improve the accuracy of flow-based anomaly detection in sampled traffic. A feedback from the ANN-based anomaly detector determines the type of the flow sampling method that should be used. Our proposed technique handles malicious flows and benign flows with different sampling methods. To evaluate the proposed sampling technique, a number of flow-based datasets are generated. Our experiments confirm that the proposed technique improves the percentage of the sampled malicious flows by about 7% and it can preserve the majority of traffic information","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"81 1","pages":"16-27"},"PeriodicalIF":0.0,"publicationDate":"2016-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83880269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security-Aware Dynamic RWA for Reducing In-band and Out-of-band Jamming Attacks in WDM Optical Networks 安全感知的动态RWA减少WDM光网络中的带内和带外干扰攻击
Pub Date : 2016-01-28 DOI: 10.4304/jnw.10.11.587-596
Saja Al-Mamoori, A. Jaekel, S. Bandyopadhyay, Sriharsha Varanasi
The high data transfer capacities of current wavelength division multiplexing optical networks put large amounts of data at risk of getting corrupted in the presence of faults and attacks. A wide range of techniques for handling component failures in transparent optical networks are already available in the literature. In recent years, there is growing recognition of the need to develop suitable mechanisms for reducing the adverse effects of malicious attacks such as high-power jamming and tapping attacks. A number of recent papers have proposed static lightpath allocation approaches that take such security issues into consideration. However, most of these approaches consider the routing problem separately from the wavelength assignment problem. In this paper we propose a new security-aware scheme for the complete dynamic routing and wavelength assignment (RWA) problem. Unlike previous approaches, we consider both in-band and out-of-band attacks under dynamic traffic scenario and present an integer linear program (ILP) formulation with two possible objectives for solving the security-aware dynamic RWA problem. For larger networks we present an efficient heuristic algorithm SA-DRWA (Security-Aware Dynamic Routing and Wavelength Assignment) that aims to minimize both in-band and out-of-band attacks. To the best of our knowledge, this is the first such formulation to jointly consider in-band and out-of-band attacks, for dynamic traffic
当前波分复用光网络的高数据传输能力使大量数据在出现故障和攻击时面临被破坏的风险。在透明光网络中处理组件故障的广泛技术已经在文献中可用。近年来,越来越多的人认识到需要开发合适的机制来减少恶意攻击(如高功率干扰和窃听攻击)的不利影响。最近的一些论文提出了静态光路分配方法,考虑到这些安全问题。然而,这些方法大多将路由问题与波长分配问题分开考虑。针对完全动态路由和波长分配(RWA)问题,提出了一种新的安全感知方案。与以前的方法不同,我们考虑了动态流量场景下的带内和带外攻击,并提出了一个具有两个可能目标的整数线性规划(ILP)公式来解决安全感知的动态RWA问题。对于较大的网络,我们提出了一种有效的启发式算法SA-DRWA(安全感知动态路由和波长分配),旨在最大限度地减少带内和带外攻击。据我们所知,这是第一个针对动态流量联合考虑带内和带外攻击的公式
{"title":"Security-Aware Dynamic RWA for Reducing In-band and Out-of-band Jamming Attacks in WDM Optical Networks","authors":"Saja Al-Mamoori, A. Jaekel, S. Bandyopadhyay, Sriharsha Varanasi","doi":"10.4304/jnw.10.11.587-596","DOIUrl":"https://doi.org/10.4304/jnw.10.11.587-596","url":null,"abstract":"The high data transfer capacities of current wavelength division multiplexing optical networks put large amounts of data at risk of getting corrupted in the presence of faults and attacks. A wide range of techniques for handling component failures in transparent optical networks are already available in the literature. In recent years, there is growing recognition of the need to develop suitable mechanisms for reducing the adverse effects of malicious attacks such as high-power jamming and tapping attacks. A number of recent papers have proposed static lightpath allocation approaches that take such security issues into consideration. However, most of these approaches consider the routing problem separately from the wavelength assignment problem. In this paper we propose a new security-aware scheme for the complete dynamic routing and wavelength assignment (RWA) problem. Unlike previous approaches, we consider both in-band and out-of-band attacks under dynamic traffic scenario and present an integer linear program (ILP) formulation with two possible objectives for solving the security-aware dynamic RWA problem. For larger networks we present an efficient heuristic algorithm SA-DRWA (Security-Aware Dynamic Routing and Wavelength Assignment) that aims to minimize both in-band and out-of-band attacks. To the best of our knowledge, this is the first such formulation to jointly consider in-band and out-of-band attacks, for dynamic traffic","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"73 1","pages":"587-596"},"PeriodicalIF":0.0,"publicationDate":"2016-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78690783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Interference Aware Heuristic Routing Protocol for Wireless Home Automation Networks 一种无线家庭自动化网络干扰感知启发式路由协议
Pub Date : 2016-01-28 DOI: 10.4304/jnw.10.11.616-624
Kamanashis Biswas, V. Muthukkumarasamy, Xin-Wen Wu, Kalvinder Singh
Wireless Home Automation Networks consist of battery powered sensors and actuators that communicate with each other over wireless channels. The sensor nodes collect environmental information such as temperature, light intensity, humidity, and pressure to provide context-aware services and to facilitate smart home control. However, resource limitations, unpredictable topology changes, and interference introduce a number of challenges to the design of home automation protocols. One of the challenging tasks is developing energy efficient routing protocols to prolong the network lifetime. This paper proposes an interference aware heuristic routing protocol which determines the forwarding path between sensors and the base station using a heuristic function and a heuristic search algorithm. On the basis of local and global distance, longevity factor (LF), and link quality (LQ), the heuristic function generates a heuristic value for each node and this value is used in A_ search algorithm to determine the efficient route. Simulation results show that the proposed routing scheme outperforms GAHR and AODVjr protocols in terms of network lifetime, energy consumption, and message throughput. Furthermore, it achieves up to 15% increase in packet delivery ratio over GAHR protocol in a noisy environment
无线家庭自动化网络由电池供电的传感器和执行器组成,它们通过无线信道相互通信。传感器节点收集温度、光照强度、湿度、压力等环境信息,提供情境感知服务,方便智能家居控制。然而,资源限制、不可预测的拓扑变化和干扰给家庭自动化协议的设计带来了许多挑战。其中一个具有挑战性的任务是开发节能路由协议,以延长网络的生命周期。本文提出了一种干扰感知的启发式路由协议,该协议利用启发式函数和启发式搜索算法确定传感器与基站之间的转发路径。启发式函数根据局部和全局距离、寿命因子(LF)和链路质量(LQ)为每个节点生成一个启发式值,并在A_搜索算法中使用该值来确定有效路由。仿真结果表明,所提出的路由方案在网络生存时间、能耗和消息吞吐量方面都优于GAHR和AODVjr协议。此外,在噪声环境下,它比GAHR协议的分组传输率提高了15%
{"title":"An Interference Aware Heuristic Routing Protocol for Wireless Home Automation Networks","authors":"Kamanashis Biswas, V. Muthukkumarasamy, Xin-Wen Wu, Kalvinder Singh","doi":"10.4304/jnw.10.11.616-624","DOIUrl":"https://doi.org/10.4304/jnw.10.11.616-624","url":null,"abstract":"Wireless Home Automation Networks consist of battery powered sensors and actuators that communicate with each other over wireless channels. The sensor nodes collect environmental information such as temperature, light intensity, humidity, and pressure to provide context-aware services and to facilitate smart home control. However, resource limitations, unpredictable topology changes, and interference introduce a number of challenges to the design of home automation protocols. One of the challenging tasks is developing energy efficient routing protocols to prolong the network lifetime. This paper proposes an interference aware heuristic routing protocol which determines the forwarding path between sensors and the base station using a heuristic function and a heuristic search algorithm. On the basis of local and global distance, longevity factor (LF), and link quality (LQ), the heuristic function generates a heuristic value for each node and this value is used in A_ search algorithm to determine the efficient route. Simulation results show that the proposed routing scheme outperforms GAHR and AODVjr protocols in terms of network lifetime, energy consumption, and message throughput. Furthermore, it achieves up to 15% increase in packet delivery ratio over GAHR protocol in a noisy environment","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"187 1","pages":"616-624"},"PeriodicalIF":0.0,"publicationDate":"2016-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75403416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on Environmental Monitoring Systems using Wireless Sensor Networks 基于无线传感器网络的环境监测系统研究进展
Pub Date : 2016-01-28 DOI: 10.4304/jnw.10.11.606-615
T. Alhmiedat
Air pollution is considered as crucial for people’s comfort, health, and safety. Monitoring the air pollution is crucial in both environments (indoors and outdoors), and can be accomplished using a small number of inexpensive sensing unities, distributed over an area of interest to measure the level of various critical gases including CO , H 2 S , and NO 2 . The deployment of Wireless Sensor Network offers an alternative solution through scattering a large number of disposable sensor nodes over an area of interest. Scientists may directly retrieve the sensed data from sensor field through a web server application. This paper provides a comprehensive review on the available solutions that support the wireless sensor network environmental monitoring. The existing systems are intensively studied and categorized into: indoor, outdoor, and greenhouse environmental monitoring systems
空气污染被认为对人们的舒适、健康和安全至关重要。监测空气污染在室内和室外环境中都是至关重要的,并且可以使用少量廉价的传感装置来完成,分布在感兴趣的区域,以测量各种关键气体的水平,包括CO, h2s和NO 2。无线传感器网络的部署通过在感兴趣的区域上分散大量一次性传感器节点提供了另一种解决方案。科学家可以通过web服务器应用程序直接从传感器现场检索感知数据。本文全面综述了支持无线传感器网络环境监测的现有解决方案。对现有系统进行了深入研究,并将其分为室内、室外和温室环境监测系统
{"title":"A Survey on Environmental Monitoring Systems using Wireless Sensor Networks","authors":"T. Alhmiedat","doi":"10.4304/jnw.10.11.606-615","DOIUrl":"https://doi.org/10.4304/jnw.10.11.606-615","url":null,"abstract":"Air pollution is considered as crucial for people’s comfort, health, and safety. Monitoring the air pollution is crucial in both environments (indoors and outdoors), and can be accomplished using a small number of inexpensive sensing unities, distributed over an area of interest to measure the level of various critical gases including CO , H 2 S , and NO 2 . The deployment of Wireless Sensor Network offers an alternative solution through scattering a large number of disposable sensor nodes over an area of interest. Scientists may directly retrieve the sensed data from sensor field through a web server application. This paper provides a comprehensive review on the available solutions that support the wireless sensor network environmental monitoring. The existing systems are intensively studied and categorized into: indoor, outdoor, and greenhouse environmental monitoring systems","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"51 1","pages":"606-615"},"PeriodicalIF":0.0,"publicationDate":"2016-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85105522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Using Visualization Algorithms for Discovering Patterns in Groups of Users for Tutoring Multiple Languages through Social Networking 利用可视化算法在用户群中发现模式,通过社交网络进行多语言教学
Pub Date : 2016-01-28 DOI: 10.4304/jnw.10.12.668-674
C. Troussas, M. Virvou, K. Espinosa
Social networks are addressed to a very large and heterogeneous audience of people. When trying to incorporate an intelligent language learning system in social networks, a problem of user diversity emerges and thus, user clustering based on their characteristics is necessary. In view of this compelling need, this paper concerns the pattern discovery of user clusters in social networks. In this research, we have modeled the Facebook user characteristics that determine the clustering process. An unsupervised clustering algorithm was used so that coherent groups of users with the same learning styles and capabilities are generated. This algorithm clusters users by taking as input their several fundamental characteristics, such as their age, educational level, number of languages spoken and computer knowledge level. The general objective of this data mining process is to extract important information and to gain knowledge from the user data set and transform it into a manageable and intelligible structure with a view to ameliorating the learning process. These experimental results show that the Facebook user characteristics, which were chosen at the clustering process, seem to be significant determinants for the clusters and the whole learning experience of each user.
社交网络面向的是一个非常庞大且多样化的受众群体。当试图将智能语言学习系统整合到社交网络中时,会出现用户多样性的问题,因此,基于用户特征的用户聚类是必要的。鉴于这种迫切的需求,本文关注社交网络中用户集群的模式发现。在这项研究中,我们对决定聚类过程的Facebook用户特征进行了建模。使用无监督聚类算法生成具有相同学习风格和能力的连贯用户组。该算法通过将用户的几个基本特征(如年龄、教育程度、使用语言的数量和计算机知识水平)作为输入对用户进行聚类。这种数据挖掘过程的总体目标是从用户数据集中提取重要信息和获取知识,并将其转换为可管理和可理解的结构,以改进学习过程。这些实验结果表明,在聚类过程中选择的Facebook用户特征似乎是聚类和每个用户的整个学习体验的重要决定因素。
{"title":"Using Visualization Algorithms for Discovering Patterns in Groups of Users for Tutoring Multiple Languages through Social Networking","authors":"C. Troussas, M. Virvou, K. Espinosa","doi":"10.4304/jnw.10.12.668-674","DOIUrl":"https://doi.org/10.4304/jnw.10.12.668-674","url":null,"abstract":"Social networks are addressed to a very large and heterogeneous audience of people. When trying to incorporate an intelligent language learning system in social networks, a problem of user diversity emerges and thus, user clustering based on their characteristics is necessary. In view of this compelling need, this paper concerns the pattern discovery of user clusters in social networks. In this research, we have modeled the Facebook user characteristics that determine the clustering process. An unsupervised clustering algorithm was used so that coherent groups of users with the same learning styles and capabilities are generated. This algorithm clusters users by taking as input their several fundamental characteristics, such as their age, educational level, number of languages spoken and computer knowledge level. The general objective of this data mining process is to extract important information and to gain knowledge from the user data set and transform it into a manageable and intelligible structure with a view to ameliorating the learning process. These experimental results show that the Facebook user characteristics, which were chosen at the clustering process, seem to be significant determinants for the clusters and the whole learning experience of each user.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"53 1","pages":"668-674"},"PeriodicalIF":0.0,"publicationDate":"2016-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74417516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Data Hiding Based on Intelligent Optimized Edges for Secure Multimedia Communication 基于智能优化边的安全多媒体通信数据隐藏
Pub Date : 2015-09-22 DOI: 10.4304/jnw.10.8.477-485
Raniyah Wazirali, Z. Chaczko
Recently, image steganography has received a lot of attention as it enables for secure multimedia communication. Payload capacity and stego image imperceptibility are a critical factors of any steganographic technique. In order to receive maximum embedding capacity with a minimum degradation of stego images, secret data should be embedded carefully in a specific regions. In this paper, data hiding is considered as an optimization problem related to achieving optimum embedding level of the cover image. Embedding data in edge area provide high imperceptibility. However, the embedding capacity of edge region is very limited. The work attempt to improve the edge based steganography by incorporates edge detection and vision science research. Genetic Algorithm that uses human visual system characteristics approach for data hiding is presented. Primarily, the approach applies Differences of Gaussian detector which closely resembles the human visual behavior. Secondly, the edge profusion indicates the level of threshold visibility with the help of Genetic Algorithm training. The suggested solution uses Contrast Sensitivity Function (CSF) which produces the edges based on the size of the embedding information. The authors of this paper compared their technique with other classical and recent works. The quality of the steganography is measured based on various quality metrics such as PSNR, wPSNR, SSIM and UIQI. These metrics declare the stability between imperceptibility and large embedding capacity.
近年来,图像隐写术因其能够实现安全的多媒体通信而受到广泛关注。有效载荷能力和隐写图像的隐蔽性是任何隐写技术的关键因素。为了在最小化隐写图像退化的情况下获得最大的嵌入容量,必须将秘密数据小心地嵌入到特定的区域。在本文中,数据隐藏被认为是一个优化问题,涉及到实现最优的覆盖图像嵌入水平。在边缘区域内嵌入数据具有较高的不可感知性。然而,边缘区域的嵌入能力非常有限。本文试图通过结合边缘检测和视觉科学的研究来改进基于边缘的隐写。提出了一种利用人类视觉系统特征方法进行数据隐藏的遗传算法。该方法主要应用了近似于人类视觉行为的高斯差分检测器。其次,在遗传算法训练的帮助下,边缘丰富度表示阈值可见性的水平。建议的解决方案使用对比灵敏度函数(CSF),它根据嵌入信息的大小产生边缘。本文的作者将他们的技术与其他古典和现代作品进行了比较。隐写的质量是根据各种质量指标来衡量的,如PSNR、wPSNR、SSIM和UIQI。这些指标表明了隐密性与大嵌入容量之间的稳定性。
{"title":"Data Hiding Based on Intelligent Optimized Edges for Secure Multimedia Communication","authors":"Raniyah Wazirali, Z. Chaczko","doi":"10.4304/jnw.10.8.477-485","DOIUrl":"https://doi.org/10.4304/jnw.10.8.477-485","url":null,"abstract":"Recently, image steganography has received a lot of attention as it enables for secure multimedia communication. Payload capacity and stego image imperceptibility are a critical factors of any steganographic technique. In order to receive maximum embedding capacity with a minimum degradation of stego images, secret data should be embedded carefully in a specific regions. In this paper, data hiding is considered as an optimization problem related to achieving optimum embedding level of the cover image. Embedding data in edge area provide high imperceptibility. However, the embedding capacity of edge region is very limited. The work attempt to improve the edge based steganography by incorporates edge detection and vision science research. Genetic Algorithm that uses human visual system characteristics approach for data hiding is presented. Primarily, the approach applies Differences of Gaussian detector which closely resembles the human visual behavior. Secondly, the edge profusion indicates the level of threshold visibility with the help of Genetic Algorithm training. The suggested solution uses Contrast Sensitivity Function (CSF) which produces the edges based on the size of the embedding information. The authors of this paper compared their technique with other classical and recent works. The quality of the steganography is measured based on various quality metrics such as PSNR, wPSNR, SSIM and UIQI. These metrics declare the stability between imperceptibility and large embedding capacity.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"46 1","pages":"477-485"},"PeriodicalIF":0.0,"publicationDate":"2015-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79958924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Propagation of Low Variability in Video Traffic 视频流量中低变异性的传播
Pub Date : 2015-09-22 DOI: 10.4304/jnw.10.8.448-461
K. Oida
Currently popular HTTP-based video delivery services generate highly variable video traffic over small time scales. This paper confirms that with sufficient transmission bandwidth available to the video traffic, small time scale variations can be reduced to a level approaching the Poisson arrivals without experiencing degradation in the video quality. The primary result in this paper is that upon establishment of a low variability state, this state shows stable behavior. The state remains intact even under a high network load, a high packet loss rate, or a long propagation delay. Furthermore, the state traverses wired/wireless LANs and the Internet. This attractive feature can facilitate the development of more basic and efficient traffic control schemes. The feasibility of this approach to reducing video traffic variability is discussed from the viewpoint of the perceived video quality
目前流行的基于http的视频传输服务在小时间尺度上产生高度可变的视频流量。本文证实,如果视频流量有足够的传输带宽可用,小的时间尺度变化可以减少到接近泊松到达的水平,而不会导致视频质量下降。本文的主要结果是,在建立低变率状态后,该状态表现出稳定的行为。即使在高网络负载、高丢包率或长传播延迟的情况下,状态也保持不变。此外,国家穿越有线/无线局域网和互联网。这一吸引人的特点可以促进更基本和有效的交通管制计划的发展。从感知视频质量的角度讨论了该方法降低视频流量可变性的可行性
{"title":"Propagation of Low Variability in Video Traffic","authors":"K. Oida","doi":"10.4304/jnw.10.8.448-461","DOIUrl":"https://doi.org/10.4304/jnw.10.8.448-461","url":null,"abstract":"Currently popular HTTP-based video delivery services generate highly variable video traffic over small time scales. This paper confirms that with sufficient transmission bandwidth available to the video traffic, small time scale variations can be reduced to a level approaching the Poisson arrivals without experiencing degradation in the video quality. The primary result in this paper is that upon establishment of a low variability state, this state shows stable behavior. The state remains intact even under a high network load, a high packet loss rate, or a long propagation delay. Furthermore, the state traverses wired/wireless LANs and the Internet. This attractive feature can facilitate the development of more basic and efficient traffic control schemes. The feasibility of this approach to reducing video traffic variability is discussed from the viewpoint of the perceived video quality","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"25 1","pages":"448-461"},"PeriodicalIF":0.0,"publicationDate":"2015-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86952245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Way to Construct the Parity-check Equations in Fast Correlation Attacks 一种构造快速相关攻击奇偶校验方程的改进方法
Pub Date : 2015-09-22 DOI: 10.4304/jnw.10.8.443-447
Shiwei Chen, Chenhui Jin
How to construct the parity-check equations is an open problem in the topic of fast correlation attack. In this paper, we present an improved method to construct the parity-check equations used in the fast correlation attacks. By utilizing the idea of multi-layer match-and-sort combined with the exhaustive searching, we construct the parity-check equations to be used in the decoding, which is not relevant to the number of the LFSR’s feedback taps. Finally, we analyze the time complexity and memory complexity of our method, which are about and respectively (where is the weight of the parity-checks), and the memory complexity is the square root of the Chose et al.’s
如何构造奇偶校验方程是快速相关攻击中的一个开放性问题。本文提出了一种构造用于快速相关攻击的奇偶校验方程的改进方法。利用多层匹配排序与穷举搜索相结合的思想,构造了用于译码的奇偶校验方程,该方程与LFSR反馈抽头的个数无关。最后,我们分析了我们的方法的时间复杂度和内存复杂度,它们分别是大约和(其中是奇偶校验的权重),内存复杂度是select等人的平方根
{"title":"An Improved Way to Construct the Parity-check Equations in Fast Correlation Attacks","authors":"Shiwei Chen, Chenhui Jin","doi":"10.4304/jnw.10.8.443-447","DOIUrl":"https://doi.org/10.4304/jnw.10.8.443-447","url":null,"abstract":"How to construct the parity-check equations is an open problem in the topic of fast correlation attack. In this paper, we present an improved method to construct the parity-check equations used in the fast correlation attacks. By utilizing the idea of multi-layer match-and-sort combined with the exhaustive searching, we construct the parity-check equations to be used in the decoding, which is not relevant to the number of the LFSR’s feedback taps. Finally, we analyze the time complexity and memory complexity of our method, which are about and respectively (where is the weight of the parity-checks), and the memory complexity is the square root of the Chose et al.’s","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"1 1","pages":"443-447"},"PeriodicalIF":0.0,"publicationDate":"2015-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83880684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coordinates and Bearing of Submerged Sensors Using a Single Mobile Beacon (CSMB) 基于单个移动信标(CSMB)的水下传感器坐标与方位分析
Pub Date : 2015-09-22 DOI: 10.4304/jnw.10.8.462-469
Anisur Rahman, V. Muthukkumarasamy, Xin-Wen Wu
This paper investigates the problem of localizing submerged sensors and provides a new mechanism to determine the coordinates and bearing of those sensors using only one beacon node. In underwater wireless sensor networks (UWSN), precise coordinates of the sensors that actuate or collect data is vital, as data without the knowledge of its actual origin has limited value. Mostly, the multilateration technique is used to determine the location of the sensors with respect to three or more known beacon nodes, besidesincorporated nonlinear distance equations are solved in conventional method whereby degree-of-freedom does not guarantee a unique solution. In this study, a new method of determining the coordinates of submerged sensors with a single mobile beacon has been devised which requires no preinstalled infrastructure or reference point. Moreover, Cayley-Menger determinant and linearized trilateration are used to determine the coordinates of the nodes where none of the nodes have a priori knowledge about its location. Simulation results validate the proposed mathematical model by computing coordinates of sensor nodes with bearing information generating negligible errors
本文研究了水下传感器的定位问题,提出了一种只用一个信标节点确定水下传感器坐标和方位的新机制。在水下无线传感器网络(UWSN)中,驱动或收集数据的传感器的精确坐标至关重要,因为不知道其实际来源的数据价值有限。在大多数情况下,多重定位技术用于确定传感器相对于三个或更多已知信标节点的位置,此外,采用传统方法求解非线性距离方程,其中自由度不能保证唯一解。在本研究中,设计了一种利用单个移动信标确定水下传感器坐标的新方法,该方法不需要预先安装基础设施或参考点。此外,使用Cayley-Menger行列式和线性化三边测量来确定没有节点对其位置有先验知识的节点的坐标。仿真结果验证了该数学模型的正确性,该模型计算了传感器节点的方位坐标,误差可以忽略不计
{"title":"Coordinates and Bearing of Submerged Sensors Using a Single Mobile Beacon (CSMB)","authors":"Anisur Rahman, V. Muthukkumarasamy, Xin-Wen Wu","doi":"10.4304/jnw.10.8.462-469","DOIUrl":"https://doi.org/10.4304/jnw.10.8.462-469","url":null,"abstract":"This paper investigates the problem of localizing submerged sensors and provides a new mechanism to determine the coordinates and bearing of those sensors using only one beacon node. In underwater wireless sensor networks (UWSN), precise coordinates of the sensors that actuate or collect data is vital, as data without the knowledge of its actual origin has limited value. Mostly, the multilateration technique is used to determine the location of the sensors with respect to three or more known beacon nodes, besidesincorporated nonlinear distance equations are solved in conventional method whereby degree-of-freedom does not guarantee a unique solution. In this study, a new method of determining the coordinates of submerged sensors with a single mobile beacon has been devised which requires no preinstalled infrastructure or reference point. Moreover, Cayley-Menger determinant and linearized trilateration are used to determine the coordinates of the nodes where none of the nodes have a priori knowledge about its location. Simulation results validate the proposed mathematical model by computing coordinates of sensor nodes with bearing information generating negligible errors","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"6 1","pages":"462-469"},"PeriodicalIF":0.0,"publicationDate":"2015-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80368636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
J. Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1