首页 > 最新文献

2016 Eighth International Conference on Information and Knowledge Technology (IKT)最新文献

英文 中文
Energy-efficient cooperative spectrum sensing using two hard decision rules 基于双硬决策规则的节能协同频谱感知
M. Najimi, A. Ebrahimzadeh, S. M. Hosseini Andargoli
In this paper, we propose a sensing nodes selection scheme to achieve energy efficiency in cooperative spectrum sensing for cognitive sensor networks. In cooperative spectrum sensing, nodes send their results to a fusion center (FC) to make the final decision using a fusion rule. While minimize the energy consumption, we also consider improving the detection performance in our approach by maximizing the global probability of detection and minimizing the global probability of false alarm. Moreover, we simplify the resulted NP-complete problem by mapping the assignment indices from integer to the real domain. A closed-form equation is obtained to determine the priority of nodes for sensing and a solution is provided based on convex optimization techniques. The proposed algorithm is independent of the distribution of the global probability of detection and the type of selecting fusion rule. Simulation results is investigated for AND and OR fusion rules and show that our algorithm is very effective in saving energy in different scenarios.
本文提出了一种感知节点选择方案,以实现认知传感器网络协同频谱感知的能量效率。在协同频谱感知中,节点将结果发送到融合中心(FC),由融合中心根据融合规则做出最终决策。在最小化能量消耗的同时,我们还考虑通过最大化检测的全局概率和最小化误报的全局概率来提高我们的方法的检测性能。此外,通过将赋值指标从整数域映射到实数域,简化了所得到的np完全问题。得到了确定节点感知优先级的封闭方程,并基于凸优化技术给出了求解方法。该算法不受全局检测概率分布和选择融合规则类型的影响。对与或融合规则的仿真结果进行了研究,结果表明该算法在不同场景下都能有效地节省能量。
{"title":"Energy-efficient cooperative spectrum sensing using two hard decision rules","authors":"M. Najimi, A. Ebrahimzadeh, S. M. Hosseini Andargoli","doi":"10.1109/IKT.2016.7777768","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777768","url":null,"abstract":"In this paper, we propose a sensing nodes selection scheme to achieve energy efficiency in cooperative spectrum sensing for cognitive sensor networks. In cooperative spectrum sensing, nodes send their results to a fusion center (FC) to make the final decision using a fusion rule. While minimize the energy consumption, we also consider improving the detection performance in our approach by maximizing the global probability of detection and minimizing the global probability of false alarm. Moreover, we simplify the resulted NP-complete problem by mapping the assignment indices from integer to the real domain. A closed-form equation is obtained to determine the priority of nodes for sensing and a solution is provided based on convex optimization techniques. The proposed algorithm is independent of the distribution of the global probability of detection and the type of selecting fusion rule. Simulation results is investigated for AND and OR fusion rules and show that our algorithm is very effective in saving energy in different scenarios.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128268159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
RASMAP: An efficient heuristic application mapping algorithm for network-on-chips RASMAP:一种高效的启发式应用映射算法
Rasoul Seidipiri, A. Patooghy, Sima Afsharpour, M. Fazeli
This paper proposes and evaluates a performance efficient application mapping algorithm for mesh-based NoCs. The proposed algorithm first prioritizes tasks of the given application graph based on their total in/out communication traffic. Then a task with the most communication traffic is selected and mapped onto the center part of the mesh topology i.e., a core with the most available communication channels. After that, repeatedly, the next task is selected in a way that has the most communications with the already mapped tasks. Such a task is mapped onto the core which its degree is proportional to the tasks link degree. The proposed method is evaluated by Noxim which is a cycle-accurate NoC simulator in terms of communication cost i.e., to total number of packets traversed through the network to complete the application graph. The proposed method is compared with several previously proposed mapping algorithms including NMAP, CMAP, LMAP, PSMAP, and CASTNET. Comparisons show that the proposed method offers better performance and consumes lower energy in the network.
本文提出并评估了一种高性能的基于网格的noc应用映射算法。该算法首先根据应用程序图的总输入/输出通信流量对任务进行优先级排序。然后选择通信流量最大的任务并将其映射到网格拓扑的中心部分,即具有最多可用通信通道的核心。在此之后,重复地,以与已映射的任务具有最多通信的方式选择下一个任务。这样的任务被映射到核心上,其程度与任务的链接程度成正比。该方法通过Noxim(一个周期精确的NoC模拟器)在通信成本方面进行了评估,即通过网络遍历的数据包总数来完成应用图。将该方法与NMAP、CMAP、LMAP、PSMAP和CASTNET等几种已有的映射算法进行了比较。比较表明,该方法具有更好的性能和更低的网络能耗。
{"title":"RASMAP: An efficient heuristic application mapping algorithm for network-on-chips","authors":"Rasoul Seidipiri, A. Patooghy, Sima Afsharpour, M. Fazeli","doi":"10.1109/IKT.2016.7777757","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777757","url":null,"abstract":"This paper proposes and evaluates a performance efficient application mapping algorithm for mesh-based NoCs. The proposed algorithm first prioritizes tasks of the given application graph based on their total in/out communication traffic. Then a task with the most communication traffic is selected and mapped onto the center part of the mesh topology i.e., a core with the most available communication channels. After that, repeatedly, the next task is selected in a way that has the most communications with the already mapped tasks. Such a task is mapped onto the core which its degree is proportional to the tasks link degree. The proposed method is evaluated by Noxim which is a cycle-accurate NoC simulator in terms of communication cost i.e., to total number of packets traversed through the network to complete the application graph. The proposed method is compared with several previously proposed mapping algorithms including NMAP, CMAP, LMAP, PSMAP, and CASTNET. Comparisons show that the proposed method offers better performance and consumes lower energy in the network.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126365325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A novel association rule mining using genetic algorithm 一种基于遗传算法的关联规则挖掘方法
Maziyar Grami, Reza Gheibi, F. Rahimi
Today, development of internet causes a fast growth of internet shops and retailers and makes them as a main marketing channel. This kind of marketing generates a numerous transaction and data which are potentially valuable. Using data mining is an alternative to discover frequent patterns and association rules from datasets. In this paper, we use data mining techniques for discovering frequent customers' buying patterns from a Customer Relationship Management database. There are lots of algorithms for this purpose, such as Apriori and FP-Growth. However, they may not have efficient performance when the data is big, therefore various meta-heuristic methods can be an alternative. In this paper we first excerpt loyal customers by using RFM criterion to face more reliable answers and create relevant dataset. Then association rules are discovered using proposed genetic algorithm. The results showed that our proposed approach is more efficient and have some distinction in compare with other methods mentioned in this research.
在互联网发展的今天,网上商店和网上零售商迅速增长,成为主要的营销渠道。这种营销产生了大量的交易和有潜在价值的数据。使用数据挖掘是从数据集中发现频繁模式和关联规则的一种替代方法。在本文中,我们使用数据挖掘技术从客户关系管理数据库中发现频繁客户的购买模式。有很多算法用于此目的,如Apriori和FP-Growth。然而,当数据量很大时,它们可能没有有效的性能,因此各种元启发式方法可以作为替代方案。本文首先利用RFM准则抽取忠诚客户,面对更可靠的答案并创建相关数据集。然后利用提出的遗传算法发现关联规则。结果表明,本文提出的方法与本研究中提到的其他方法相比,具有更高的效率和一定的区别。
{"title":"A novel association rule mining using genetic algorithm","authors":"Maziyar Grami, Reza Gheibi, F. Rahimi","doi":"10.1109/IKT.2016.7777776","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777776","url":null,"abstract":"Today, development of internet causes a fast growth of internet shops and retailers and makes them as a main marketing channel. This kind of marketing generates a numerous transaction and data which are potentially valuable. Using data mining is an alternative to discover frequent patterns and association rules from datasets. In this paper, we use data mining techniques for discovering frequent customers' buying patterns from a Customer Relationship Management database. There are lots of algorithms for this purpose, such as Apriori and FP-Growth. However, they may not have efficient performance when the data is big, therefore various meta-heuristic methods can be an alternative. In this paper we first excerpt loyal customers by using RFM criterion to face more reliable answers and create relevant dataset. Then association rules are discovered using proposed genetic algorithm. The results showed that our proposed approach is more efficient and have some distinction in compare with other methods mentioned in this research.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128169583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Adaptation of universal dependencies to specific grammars: The case of Persian dependency grammar 通用依赖对特定语法的适应:波斯语依赖语法的例子
N. Hemmati, O. Tabibzadeh, Muharram Mansoorizadeh
Universal Dependencies is the latest standard annotation scheme available, aiming at cross-linguistically consistent treebank annotation. It has already been adapted to a large number of languages including Persian. The trend, however, has been to take into account the original principles of dependency grammar rather than a description of the specific language in dependency terms. This paper reports an attempt to adapt Universal Dependencies to form a scheme for annotation of Persian dependency structure based on a comprehensive description of Persian syntax according to a theory introduced as the Autonomous Phrases Theory. The main idea there is that the significance of phrases should be appreciated in dependency analyses due to their cognitive reality, and the notion of valency is also extended beyond verbs. On that basis, every dependent of whatever head type is classified as either a complement or an adjunct depending on whether or not it plays a role in the valency structure of the head. A tagset was proposed consisting of fifty-three dependency relations, including fifteen original labels and the rest borrowed from the universal dependencies.
通用依赖是最新的标准注释方案,旨在实现跨语言一致的树库注释。它已经被改编成许多语言,包括波斯语。然而,现在的趋势是考虑依赖语法的原始原则,而不是用依赖术语描述特定语言。本文尝试在对波斯语语法进行全面描述的基础上,根据自治短语理论,对普遍依赖关系进行调整,形成一种波斯语依赖结构的注释方案。其主要思想是,由于短语的认知真实性,在依赖分析中应重视短语的重要性,并且价的概念也扩展到动词之外。在此基础上,任何头部类型的每一个依赖物都被归类为补体或附属物,这取决于它是否在头部的价结构中起作用。提出了一个由53个依赖关系组成的标签集,其中15个是原始标签,其余的是从通用依赖关系中借用的。
{"title":"Adaptation of universal dependencies to specific grammars: The case of Persian dependency grammar","authors":"N. Hemmati, O. Tabibzadeh, Muharram Mansoorizadeh","doi":"10.1109/IKT.2016.7777775","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777775","url":null,"abstract":"Universal Dependencies is the latest standard annotation scheme available, aiming at cross-linguistically consistent treebank annotation. It has already been adapted to a large number of languages including Persian. The trend, however, has been to take into account the original principles of dependency grammar rather than a description of the specific language in dependency terms. This paper reports an attempt to adapt Universal Dependencies to form a scheme for annotation of Persian dependency structure based on a comprehensive description of Persian syntax according to a theory introduced as the Autonomous Phrases Theory. The main idea there is that the significance of phrases should be appreciated in dependency analyses due to their cognitive reality, and the notion of valency is also extended beyond verbs. On that basis, every dependent of whatever head type is classified as either a complement or an adjunct depending on whether or not it plays a role in the valency structure of the head. A tagset was proposed consisting of fifty-three dependency relations, including fifteen original labels and the rest borrowed from the universal dependencies.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130098338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A high speed implementation counter mode cryptography using hardware parallelism 使用硬件并行的高速实现计数器模式加密
Samad Najjar-Ghabel, Shamim Yousefi, M. Z. Lighvan
Nowadays, cryptography is one of the common security mechanisms. Cryptography algorithms are used to make secure data transmission over unsecured networks. Vital applications are required to techniques that encrypt/decrypt big data at the appropriate time, because the data should be encrypted/decrypted are variable size and usually the size of them is large. In this paper, for the mentioned requirements, the counter mode cryptography (CTR) algorithm with Data Encryption Standard (DES) core is paralleled by using Graphics Processing Unit (GPU). A secondary part of our work, this parallel CTR algorithm is applied on special network on chip (NoC) architecture that designed by Heracles toolkit. The results of numerical comparison show that GPU-based implementation can be achieved better runtime in comparison to the CPU-based one. Furthermore, our final implementations show that parallel CTR mode cryptography is achieved better runtime by using special NoC that applied on FPGA board in comparison to GPU-based and CPU ones.
目前,密码学是常用的安全机制之一。加密算法用于在不安全的网络上进行安全的数据传输。重要的应用程序需要在适当的时候使用加密/解密大数据的技术,因为需要加密/解密的数据大小是可变的,通常它们的大小很大。针对上述要求,本文采用图形处理单元(GPU)并行实现了以数据加密标准(DES)为核心的计数器模式加密(CTR)算法。作为我们工作的第二部分,该并行CTR算法应用于由Heracles工具包设计的特殊片上网络(NoC)架构。数值比较结果表明,基于gpu的实现比基于cpu的实现可以获得更好的运行时间。此外,我们的最终实现表明,与基于gpu和CPU的加密相比,在FPGA板上使用特殊的NoC可以实现更好的并行CTR模式加密。
{"title":"A high speed implementation counter mode cryptography using hardware parallelism","authors":"Samad Najjar-Ghabel, Shamim Yousefi, M. Z. Lighvan","doi":"10.1109/IKT.2016.7777787","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777787","url":null,"abstract":"Nowadays, cryptography is one of the common security mechanisms. Cryptography algorithms are used to make secure data transmission over unsecured networks. Vital applications are required to techniques that encrypt/decrypt big data at the appropriate time, because the data should be encrypted/decrypted are variable size and usually the size of them is large. In this paper, for the mentioned requirements, the counter mode cryptography (CTR) algorithm with Data Encryption Standard (DES) core is paralleled by using Graphics Processing Unit (GPU). A secondary part of our work, this parallel CTR algorithm is applied on special network on chip (NoC) architecture that designed by Heracles toolkit. The results of numerical comparison show that GPU-based implementation can be achieved better runtime in comparison to the CPU-based one. Furthermore, our final implementations show that parallel CTR mode cryptography is achieved better runtime by using special NoC that applied on FPGA board in comparison to GPU-based and CPU ones.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117330360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EDSS: An extended deterministic scale-free small world network 扩展确定性无标度小世界网络
Rouhollah Nabati, Ali Ghaffari Nejad, Ali Yousefi
One of the most important challenges in social network models is dissimilarity of proposed models with real networks. In this article we proposed a new small world model generator based on binary trees that simulate family and human ties. In reality family such as father, children, and grandchildren makes a path between grandfather and grandchildren. We used this property to adopt effective parameters of proposed model with real networks. Proposed model implemented in Gephi analysis and visualization software and as the result the generated graph is compared with some of the recent models.
社会网络模型中最重要的挑战之一是所提出的模型与实际网络的不相似性。在本文中,我们提出了一个新的基于二叉树的模拟家庭和人际关系的小世界模型生成器。在现实中,父亲、子女和孙辈等家庭在祖父和孙辈之间形成了一条道路。我们利用这一性质将模型的有效参数与实际网络相结合。在Gephi分析和可视化软件中实现了该模型,并将生成的图形与最近的一些模型进行了比较。
{"title":"EDSS: An extended deterministic scale-free small world network","authors":"Rouhollah Nabati, Ali Ghaffari Nejad, Ali Yousefi","doi":"10.1109/IKT.2016.7777790","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777790","url":null,"abstract":"One of the most important challenges in social network models is dissimilarity of proposed models with real networks. In this article we proposed a new small world model generator based on binary trees that simulate family and human ties. In reality family such as father, children, and grandchildren makes a path between grandfather and grandchildren. We used this property to adopt effective parameters of proposed model with real networks. Proposed model implemented in Gephi analysis and visualization software and as the result the generated graph is compared with some of the recent models.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114549694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposing an algorithm for converting published and handwritten texts to CAPTCHA by using image processing 提出了一种利用图像处理技术将出版文本和手写文本转换为验证码的算法
H. Kardanmoghaddam
Typing CAPTCHA is usually troublesome and is unpleasant for the users. But the security of some of the websites depends on it and causes that human being is distinguished from robots facing with different websites. Filling CAPTCHA by humans can be used effectively like electronization of books and different texts. In this article it has been attempted to examine using image processing for converting published and written texts to applied CAPTCHA in different websites by proposing a novel pattern.
输入验证码通常很麻烦,而且对用户来说很不愉快。但一些网站的安全性依赖于它,并导致人类区别于机器人面对不同的网站。人工填写验证码可以像书籍和不同文本的电子化一样有效地使用。在本文中,通过提出一种新颖的模式,试图研究使用图像处理将不同网站的出版和书面文本转换为应用CAPTCHA。
{"title":"Proposing an algorithm for converting published and handwritten texts to CAPTCHA by using image processing","authors":"H. Kardanmoghaddam","doi":"10.1109/IKT.2016.7777762","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777762","url":null,"abstract":"Typing CAPTCHA is usually troublesome and is unpleasant for the users. But the security of some of the websites depends on it and causes that human being is distinguished from robots facing with different websites. Filling CAPTCHA by humans can be used effectively like electronization of books and different texts. In this article it has been attempted to examine using image processing for converting published and written texts to applied CAPTCHA in different websites by proposing a novel pattern.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124371536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An improved OLSR routing protocol for reducing packet loss ratio in ad-hoc networks 减少ad-hoc网络丢包率的改进OLSR路由协议
Yousef Mostafaei, S. Pashazadeh
Ad-hoc networks consist of collections of wireless mobile nodes. Due to mobility, there exists frequent link breakage, packet loss, and need for route discovery. OLSR is proactive routing protocol that is developed for mobile ad-hoc networks. OLSR reduces the network traffic by flooding control packets efficiently and reducing unnecessary and redundant control packets. OLSR reduces the overhead of control packets using a subset of one-hop neighbors called multipoint relays for flooding control packets. Although OLSR is dedicated for mobile ad-hoc networks, but mobility of nodes does not considered in MPR selection procedure. In this paper is assumed that some nodes are stationary and packet delivery rate of the OLSR routing protocol is improved by preventing mobile nodes from being selected as multipoint relay as much as is possible. Simulation results which are implemented on Visualsense simulator, demonstrate that our proposed method reduces the packet loss ratio and number of control packets and consequently increases lifetime of networks.
自组织网络由无线移动节点集合组成。由于网络的可移动性,存在频繁的链路断裂、丢包和路由发现等问题。OLSR是针对移动自组织网络开发的主动路由协议。OLSR通过有效地扩散控制报文,减少不必要和冗余的控制报文,减少网络流量。OLSR使用一跳邻居的子集(称为多点中继)来减少控制数据包的开销。虽然OLSR是专门用于移动自组织网络的,但在MPR选择过程中没有考虑节点的移动性。本文假设部分节点是静止的,通过尽可能避免移动节点被选为多点中继来提高OLSR路由协议的分组传输速率。在视觉感知模拟器上的仿真结果表明,该方法降低了丢包率和控制包数量,从而提高了网络的生存期。
{"title":"An improved OLSR routing protocol for reducing packet loss ratio in ad-hoc networks","authors":"Yousef Mostafaei, S. Pashazadeh","doi":"10.1109/IKT.2016.7777778","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777778","url":null,"abstract":"Ad-hoc networks consist of collections of wireless mobile nodes. Due to mobility, there exists frequent link breakage, packet loss, and need for route discovery. OLSR is proactive routing protocol that is developed for mobile ad-hoc networks. OLSR reduces the network traffic by flooding control packets efficiently and reducing unnecessary and redundant control packets. OLSR reduces the overhead of control packets using a subset of one-hop neighbors called multipoint relays for flooding control packets. Although OLSR is dedicated for mobile ad-hoc networks, but mobility of nodes does not considered in MPR selection procedure. In this paper is assumed that some nodes are stationary and packet delivery rate of the OLSR routing protocol is improved by preventing mobile nodes from being selected as multipoint relay as much as is possible. Simulation results which are implemented on Visualsense simulator, demonstrate that our proposed method reduces the packet loss ratio and number of control packets and consequently increases lifetime of networks.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116363620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Decreasing of trust-based routing delay in vehicular ad hoc networks 降低车载自组网中基于信任的路由延迟
Somayeh Heibati, N. Movahedinia
Routing is considered as one of the most important processes in computer networks especially ad hoc networks. Vehicular ad hoc networks require to use efficient protocols for routing in order to exchange data between network nodes for various reasons including lack of infrastructure in some circumstances, high mobility of nodes, network dynamics and lack of trusted nodes. Because of the need for security and high reliability in vehicular ad hoc networks, one of the criteria considered in routing in these networks is inter-vehicular trust for data transmissions. In this paper, a trust-based routing protocol is proposed which takes reduced routing delay into account using fuzzy logic and improves routing. The simulation results show the effectiveness of the proposed method in terms of end-to-end latency, network efficiency, correct reception rate and incoming packets error rate compared to one of the earlier methods presented in this respect.
路由被认为是计算机网络尤其是自组织网络中最重要的过程之一。车辆自组织网络需要使用有效的路由协议,以便在网络节点之间交换数据,原因包括在某些情况下缺乏基础设施、节点的高移动性、网络动态和缺乏可信节点。由于车辆自组织网络对安全性和高可靠性的要求,在这些网络中进行路由时考虑的标准之一是车辆间数据传输的信任。本文提出了一种基于信任的路由协议,利用模糊逻辑降低了路由延迟,提高了路由性能。仿真结果表明,该方法在端到端延迟、网络效率、正确接收率和入包错误率等方面均优于已有的方法。
{"title":"Decreasing of trust-based routing delay in vehicular ad hoc networks","authors":"Somayeh Heibati, N. Movahedinia","doi":"10.1109/IKT.2016.7777759","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777759","url":null,"abstract":"Routing is considered as one of the most important processes in computer networks especially ad hoc networks. Vehicular ad hoc networks require to use efficient protocols for routing in order to exchange data between network nodes for various reasons including lack of infrastructure in some circumstances, high mobility of nodes, network dynamics and lack of trusted nodes. Because of the need for security and high reliability in vehicular ad hoc networks, one of the criteria considered in routing in these networks is inter-vehicular trust for data transmissions. In this paper, a trust-based routing protocol is proposed which takes reduced routing delay into account using fuzzy logic and improves routing. The simulation results show the effectiveness of the proposed method in terms of end-to-end latency, network efficiency, correct reception rate and incoming packets error rate compared to one of the earlier methods presented in this respect.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125398645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improve the quality of services to help congestion control flows to send a video in wireless multimedia sensor networks 在无线多媒体传感器网络中提高服务质量,帮助拥塞控制流发送视频
Neda Borzouie, Negar Borzouie
The quality of service in Wireless Multimedia Sensor Networks (WMSN) is related to packet loss rate. Recently different studies have been done on developing efficient protocols in the transport layer for controlling packet loss in WMSN. However, all of these protocols are independent of the characteristics of multimedia content. Transport layer for wireless sensor networks have many challenges. One of these challenges is the congestion. It leads to undesirable effects such as increased the packet delay, energy consumption and decrease quality of video. Considering these effects provide appropriate congestion control mechanisms can lead to improve the quality of service (QoS) requirements. This paper introduces a new congestion control method for transmitting the video stream. This method gives the faster congestion detection and congestion control based on the property of video information. The experimental results shows that our method provide performance improvement in terms of high video quality, packet loss, energy conservation and delay compared to other protocols.
无线多媒体传感器网络(WMSN)的业务质量与丢包率密切相关。近年来,人们对在WMSN中开发有效的传输层协议来控制丢包进行了不同的研究。然而,所有这些协议都独立于多媒体内容的特性。无线传感器网络的传输层面临许多挑战。其中一个挑战就是交通拥堵。它会导致诸如数据包延迟增加、能耗增加和视频质量下降等不良影响。考虑到这些影响,提供适当的拥塞控制机制可以改善服务质量(QoS)需求。本文介绍了一种新的视频流传输拥塞控制方法。该方法基于视频信息的特性,实现了更快的拥塞检测和拥塞控制。实验结果表明,与其他协议相比,我们的方法在高视频质量、丢包、节能和延迟方面提供了性能改进。
{"title":"Improve the quality of services to help congestion control flows to send a video in wireless multimedia sensor networks","authors":"Neda Borzouie, Negar Borzouie","doi":"10.1109/IKT.2016.7777774","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777774","url":null,"abstract":"The quality of service in Wireless Multimedia Sensor Networks (WMSN) is related to packet loss rate. Recently different studies have been done on developing efficient protocols in the transport layer for controlling packet loss in WMSN. However, all of these protocols are independent of the characteristics of multimedia content. Transport layer for wireless sensor networks have many challenges. One of these challenges is the congestion. It leads to undesirable effects such as increased the packet delay, energy consumption and decrease quality of video. Considering these effects provide appropriate congestion control mechanisms can lead to improve the quality of service (QoS) requirements. This paper introduces a new congestion control method for transmitting the video stream. This method gives the faster congestion detection and congestion control based on the property of video information. The experimental results shows that our method provide performance improvement in terms of high video quality, packet loss, energy conservation and delay compared to other protocols.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117320936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2016 Eighth International Conference on Information and Knowledge Technology (IKT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1