首页 > 最新文献

2014 IEEE REGION 10 SYMPOSIUM最新文献

英文 中文
Ground plane shape effects on around the body area network at 1.8GHz and 2.45GHz 地平面形状对1.8GHz和2.45GHz环体区域网络的影响
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863070
M. Shafi, M. I. Khattak, Naeem Khan, Mohammad Saleem
In design and synthesis of wearable antenna, the isolation of antenna and human body is always given paramount importance because this shielding has a pronounced effect on antenna parameters such as resonant frequency, input impedance and radiation pattern. This paper deals with the effects of different shapes of ground plane of quarter-wave monopole antenna on on-body communications around the human body model at 1.8 and 2.45GHz. A non line-of-sight (NLOS) situation is demonstrated. Results show that the circular ground plane is providing better communication link than square shape for monopole antenna at mentioned mobile communication frequencies.
在可穿戴天线的设计和合成中,天线与人体的隔离一直是重中之重,因为这种屏蔽对天线的谐振频率、输入阻抗和辐射方向图等参数有显著影响。本文研究了四分之一波单极天线不同地平面形状对人体模型周围1.8 ghz和2.45GHz下人体通信的影响。演示了非视距(NLOS)情况。结果表明,在上述移动通信频率下,圆形地平面比方形地平面提供了更好的通信链路。
{"title":"Ground plane shape effects on around the body area network at 1.8GHz and 2.45GHz","authors":"M. Shafi, M. I. Khattak, Naeem Khan, Mohammad Saleem","doi":"10.1109/TENCONSPRING.2014.6863070","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863070","url":null,"abstract":"In design and synthesis of wearable antenna, the isolation of antenna and human body is always given paramount importance because this shielding has a pronounced effect on antenna parameters such as resonant frequency, input impedance and radiation pattern. This paper deals with the effects of different shapes of ground plane of quarter-wave monopole antenna on on-body communications around the human body model at 1.8 and 2.45GHz. A non line-of-sight (NLOS) situation is demonstrated. Results show that the circular ground plane is providing better communication link than square shape for monopole antenna at mentioned mobile communication frequencies.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121150720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient authentication and key agreement protocol for 4G (LTE) networks 一种适用于4G (LTE)网络的高效认证和密钥协商协议
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863085
K. A. Alezabi, F. Hashim, S. Hashim, B. Ali
Long Term Evolution (LTE) networks designed by 3rd Generation Partnership Project (3GPP) represent a widespread technology. LTE is mainly influenced by high data rates, minimum delay and the capacity due to scalable bandwidth and its flexibility. With the rapid and widespread use LTE networks, and increase the use in data/video transmission and Internet applications in general, accordingly, the challenges of securing and speeding up data communication in such networks is also increased. Authentication in LTE networks is very important process because most of the coming attacks occur during this stage. Attackers try to be authenticated and then launch the network resources and prevent the legitimate users from the network services. The basics of Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) are used in LTE AKA protocol which is called Evolved Packet System AKA (EPS-AKA) protocol to secure LTE network, However it still suffers from various vulnerabilities such as disclosure of the user identity, computational overhead, Man In The Middle (MITM) attack and authentication delay. In this paper, an Efficient EPS-AKA protocol (EEPS-AKA) is proposed to overcome those problems. The proposed protocol is based on the Simple Password Exponential Key Exchange (SPEKE) protocol. Compared to previous proposed methods, our method is faster, since it uses a secret key method which is faster than certificate-based methods, In addition, the size of messages exchanged between User Equipment (UE) and Home Subscriber Server (HSS) is reduced, this reduces authentication delay and storage overhead effectively. The automated validation of internet security protocols and applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed EEPS-AKA is efficient and secure against active and passive attacks.
由第三代合作伙伴计划(3GPP)设计的长期演进(LTE)网络代表了一种广泛的技术。LTE主要受高数据速率、最小延迟和可扩展带宽及其灵活性带来的容量的影响。随着LTE网络的迅速和广泛使用,以及在数据/视频传输和一般互联网应用中的使用增加,相应地,在这些网络中保护和加速数据通信的挑战也增加了。在LTE网络中,身份验证是一个非常重要的过程,因为大多数攻击都发生在这一阶段。攻击者试图通过身份验证,然后启动网络资源,阻止合法用户使用网络服务。可扩展认证协议的基础-认证和密钥协议(EAP-AKA)在LTE AKA协议中使用,该协议被称为演进分组系统AKA (pps -AKA)协议,以确保LTE网络的安全,但是它仍然存在各种漏洞,如用户身份泄露,计算开销,中间人(MITM)攻击和认证延迟。本文提出了一种高效EPS-AKA协议(EEPS-AKA)来克服这些问题。该协议基于简单密码指数密钥交换(SPEKE)协议。与之前提出的方法相比,我们的方法速度更快,因为它使用了密钥方法,比基于证书的方法速度更快,并且减少了用户设备(UE)和家庭用户服务器(HSS)之间交换的消息大小,有效地减少了认证延迟和存储开销。使用互联网安全协议和应用程序自动验证(AVISPA)工具提供正式验证。实验结果表明,提出的EEPS-AKA算法对主动和被动攻击都具有高效和安全的性能。
{"title":"An efficient authentication and key agreement protocol for 4G (LTE) networks","authors":"K. A. Alezabi, F. Hashim, S. Hashim, B. Ali","doi":"10.1109/TENCONSPRING.2014.6863085","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863085","url":null,"abstract":"Long Term Evolution (LTE) networks designed by 3rd Generation Partnership Project (3GPP) represent a widespread technology. LTE is mainly influenced by high data rates, minimum delay and the capacity due to scalable bandwidth and its flexibility. With the rapid and widespread use LTE networks, and increase the use in data/video transmission and Internet applications in general, accordingly, the challenges of securing and speeding up data communication in such networks is also increased. Authentication in LTE networks is very important process because most of the coming attacks occur during this stage. Attackers try to be authenticated and then launch the network resources and prevent the legitimate users from the network services. The basics of Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA) are used in LTE AKA protocol which is called Evolved Packet System AKA (EPS-AKA) protocol to secure LTE network, However it still suffers from various vulnerabilities such as disclosure of the user identity, computational overhead, Man In The Middle (MITM) attack and authentication delay. In this paper, an Efficient EPS-AKA protocol (EEPS-AKA) is proposed to overcome those problems. The proposed protocol is based on the Simple Password Exponential Key Exchange (SPEKE) protocol. Compared to previous proposed methods, our method is faster, since it uses a secret key method which is faster than certificate-based methods, In addition, the size of messages exchanged between User Equipment (UE) and Home Subscriber Server (HSS) is reduced, this reduces authentication delay and storage overhead effectively. The automated validation of internet security protocols and applications (AVISPA) tool is used to provide a formal verification. Results show that the proposed EEPS-AKA is efficient and secure against active and passive attacks.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121379440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
QoE-aware cross-layer architecture for video traffic over Internet 面向互联网视频流量的qos感知跨层架构
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSpring.2014.6863089
Safeen Qadir, A. Kist, Zhongwei Zhang
The emergence of video applications and video capable devices have contributed substantially to the increase of video traffic on Internet. New mechanisms recommending video rate adaptation towards delivering enhanced Quality of Experience (QoE) at the same time making room for more sessions. This paper introduces a cross-layer QoE-aware architecture for video traffic over the Internet. It proposes that video sources at the application layer adapt their rate to the network environment by controlling their transmitted bit rate dynamically; and the edge of network at the network layer protects the quality of the active video sessions by controlling the acceptance of new session through a video-aware admission control. In particular, it will seek the most efficient way of accepting new video session and adapting transmission rates to free up resources for more session while maintaining the QoE of active sessions. The proposed framework will contribute to the preparation for the extreme growth of video traffic in the foreseeable future. Simulation results show that the proposed cross-layer architecture guarantees the QoE for the admitted sessions and utilizes the link more efficiently comparing to the rate adaptation only architecture.
视频应用和视频设备的出现极大地促进了互联网视频流量的增长。推荐视频速率调整的新机制,以提供增强的体验质量(QoE),同时为更多的会话腾出空间。本文介绍了一种面向Internet视频流量的跨层qos感知架构。提出应用层视频源通过动态控制传输比特率来适应网络环境;网络层的网络边缘通过视频感知的接纳控制来控制新会话的接受,从而保护活动视频会话的质量。特别是,它将寻求最有效的方式来接受新的视频会话和调整传输速率,以便在保持活动会话的QoE的同时为更多会话释放资源。拟议的框架将有助于为可预见的未来视频流量的急剧增长做好准备。仿真结果表明,与纯速率自适应结构相比,所提出的跨层结构保证了被接纳会话的QoE,并且更有效地利用了链路。
{"title":"QoE-aware cross-layer architecture for video traffic over Internet","authors":"Safeen Qadir, A. Kist, Zhongwei Zhang","doi":"10.1109/TENCONSpring.2014.6863089","DOIUrl":"https://doi.org/10.1109/TENCONSpring.2014.6863089","url":null,"abstract":"The emergence of video applications and video capable devices have contributed substantially to the increase of video traffic on Internet. New mechanisms recommending video rate adaptation towards delivering enhanced Quality of Experience (QoE) at the same time making room for more sessions. This paper introduces a cross-layer QoE-aware architecture for video traffic over the Internet. It proposes that video sources at the application layer adapt their rate to the network environment by controlling their transmitted bit rate dynamically; and the edge of network at the network layer protects the quality of the active video sessions by controlling the acceptance of new session through a video-aware admission control. In particular, it will seek the most efficient way of accepting new video session and adapting transmission rates to free up resources for more session while maintaining the QoE of active sessions. The proposed framework will contribute to the preparation for the extreme growth of video traffic in the foreseeable future. Simulation results show that the proposed cross-layer architecture guarantees the QoE for the admitted sessions and utilizes the link more efficiently comparing to the rate adaptation only architecture.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115508857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Proportional resource allocation for OFDMA system OFDMA系统的比例资源分配
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863003
Ka Kien Lo, S. Chien, D. Chieng, Heng-Siong Lim, KwongKae Hsiang
In this paper, resource allocation for OFDMA system with proportional rate constraints is studied. The objective is to optimize subcarriers and power allocation in order to maximize sum capacity subject to the constraints of total power and proportionality among users' capacity. Optimal solution to the constrained fairness maximization problem is extremely computationally expensive. Previous works have proposed suboptimal solution by separating the subcarrier and channel allocation. Although previous work offered a suboptimal solution which is 95% close to the optimal but the resource allocation algorithm is found biased to the users which suffer deep fading and can only work in high channel-to-noise ratio condition. We propose a resource allocation algorithm to overcome these issues. The numerical results show that the proposed algorithm consistently yields higher sum capacity and better fairness in resource allocation among users.
本文研究了比例速率约束下OFDMA系统的资源分配问题。目标是在总功率和用户容量比例的约束下,优化子载波和功率分配,使总容量最大化。约束公平性最大化问题的最优解在计算上是非常昂贵的。先前的研究提出了分离子载波和信道分配的次优解决方案。虽然以前的研究提供了接近最优95%的次优解,但发现资源分配算法偏向于受深度衰落影响的用户,并且只能在高信噪比条件下工作。我们提出了一种资源分配算法来克服这些问题。数值结果表明,该算法具有较高的和容量和较好的用户间资源分配公平性。
{"title":"Proportional resource allocation for OFDMA system","authors":"Ka Kien Lo, S. Chien, D. Chieng, Heng-Siong Lim, KwongKae Hsiang","doi":"10.1109/TENCONSPRING.2014.6863003","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863003","url":null,"abstract":"In this paper, resource allocation for OFDMA system with proportional rate constraints is studied. The objective is to optimize subcarriers and power allocation in order to maximize sum capacity subject to the constraints of total power and proportionality among users' capacity. Optimal solution to the constrained fairness maximization problem is extremely computationally expensive. Previous works have proposed suboptimal solution by separating the subcarrier and channel allocation. Although previous work offered a suboptimal solution which is 95% close to the optimal but the resource allocation algorithm is found biased to the users which suffer deep fading and can only work in high channel-to-noise ratio condition. We propose a resource allocation algorithm to overcome these issues. The numerical results show that the proposed algorithm consistently yields higher sum capacity and better fairness in resource allocation among users.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115308757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
List multi-coloring based fair channel allocation policy for self coexistence in cognitive radio networks with QoS provisioning 提出了基于多色的认知无线网络自共存公平信道分配策略
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863005
Mishra Vishram, L. C. Tong, Chan Syin
Recently cognitive radio has gain considerable interest by research community as a viable solution to mitigate the problems of spectrum scarcity and spectrum under-utilization. A cognitive radio selects a vacant channel opportunistically and perform its own transmission on it. Detecting an incumbent user along with self-coexistence has become one of the important aspects of the cognitive radio. The former problem is solved by spectrum sensing while the latter problem requires complex techniques. To this end we propose a graph coloring based fair channel allocation policy for self-coexistence in cognitive radio networks. The proposed scheme allows multiple cognitive radio network operating over a given region to allocate channels on non-interfering basis with a certain grade of QoS. The scheme allows fair allocation of channels among multiple participating opportunistic networks with varying priorities. Simulation analysis has been done to show the effectiveness of the proposed approach.
近年来,认知无线电作为缓解频谱短缺和频谱利用不足问题的一种可行的解决方案受到了研究界的广泛关注。认知无线电机会性地选择一个空信道,并在该信道上进行自己的传输。检测现有用户和自共存已成为认知无线电的一个重要方面。前者可以通过频谱传感来解决,而后者则需要复杂的技术。为此,我们提出了一种基于图着色的认知无线网络自共存信道公平分配策略。该方案允许在给定区域内运行的多个认知无线网络在不干扰的基础上以一定的QoS等级分配信道。该方案允许在不同优先级的多个参与机会主义网络之间公平分配信道。仿真分析表明了该方法的有效性。
{"title":"List multi-coloring based fair channel allocation policy for self coexistence in cognitive radio networks with QoS provisioning","authors":"Mishra Vishram, L. C. Tong, Chan Syin","doi":"10.1109/TENCONSPRING.2014.6863005","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863005","url":null,"abstract":"Recently cognitive radio has gain considerable interest by research community as a viable solution to mitigate the problems of spectrum scarcity and spectrum under-utilization. A cognitive radio selects a vacant channel opportunistically and perform its own transmission on it. Detecting an incumbent user along with self-coexistence has become one of the important aspects of the cognitive radio. The former problem is solved by spectrum sensing while the latter problem requires complex techniques. To this end we propose a graph coloring based fair channel allocation policy for self-coexistence in cognitive radio networks. The proposed scheme allows multiple cognitive radio network operating over a given region to allocate channels on non-interfering basis with a certain grade of QoS. The scheme allows fair allocation of channels among multiple participating opportunistic networks with varying priorities. Simulation analysis has been done to show the effectiveness of the proposed approach.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115462162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Singular point detection in fingerprint images: An investigation on quantization approach 指纹图像奇异点检测:量化方法的研究
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863106
S. C. Chua, E. K. Wong, Alan Wee Chiat Tan
This paper presents a quantization approach to the detection of singular points in fingerprint images. Singular points in fingerprint images referred to the core and delta points. They are the global features found in the orientation field image of a fingerprint. A singular point is normally detected at the intersection of three gray levels of a quantized orientation field image at quantization level-3 but no study has been carried out for higher quantization level. In this paper, the singular point detection has been investigated up to quantization level-8 by employing two performance measures: sensitivity and precision. The performance at level-5 has been found to be optimal when both measures are combined.
提出了一种用于指纹图像奇异点检测的量化方法。指纹图像中的奇异点指的是核心点和delta点。它们是在指纹方向场图像中发现的全局特征。在量化3级的量化方向场图像中,通常在三个灰度级的交点处检测到奇异点,但在更高的量化级别上尚未进行研究。本文采用灵敏度和精度两种性能指标对奇异点检测进行了量化8级的研究。当两种措施相结合时,发现第5级的性能是最佳的。
{"title":"Singular point detection in fingerprint images: An investigation on quantization approach","authors":"S. C. Chua, E. K. Wong, Alan Wee Chiat Tan","doi":"10.1109/TENCONSPRING.2014.6863106","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863106","url":null,"abstract":"This paper presents a quantization approach to the detection of singular points in fingerprint images. Singular points in fingerprint images referred to the core and delta points. They are the global features found in the orientation field image of a fingerprint. A singular point is normally detected at the intersection of three gray levels of a quantized orientation field image at quantization level-3 but no study has been carried out for higher quantization level. In this paper, the singular point detection has been investigated up to quantization level-8 by employing two performance measures: sensitivity and precision. The performance at level-5 has been found to be optimal when both measures are combined.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131660470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adapting geographical DTN routing for enhanced connectivity in partitioned VANETs on highways 调整地理DTN路由以增强高速公路上分区vanet的连通性
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863006
Mostofa Kamal Nasir, Syed Adeel Ali Shah, M. A. Qureshi, M. Oche, R. M. Noor
Vehicular Ad hoc Networks (VANETs) have significant potential to host diverse applications associated with traffic safety, traffic efficiency and infotainment. VANETs have distinct characteristics and adapting routing protocols for effective communication is a subject of interest for many researchers in this domain. In this paper, we propose a position based Delay Tolerant Network (DTN) routing protocol in VANET for the highways. The solution is designed for partitioned environments which suffer from frequent network disconnections. Our solution presents the most suitable next hop selection mechanism through a filtration process. The filtration process utilizes node position, current direction, speed and the predicted direction that are acquired by Direction Indicator Light (DIL). NS-2 is used to evaluate the performance of the proposed routing protocol. The results show increment in packet transmission as compared to previous works. Finally, the proposed protocol contributes to route stability in VANET.
车辆自组织网络(vanet)在承载与交通安全、交通效率和信息娱乐相关的各种应用方面具有巨大的潜力。vanet具有独特的特性,适应路由协议以实现有效通信是该领域许多研究人员感兴趣的课题。本文提出了一种基于位置的高速公路VANET容延迟网络(DTN)路由协议。该解决方案是为经常出现网络中断的分区环境而设计的。我们的解决方案通过过滤过程提出了最合适的下一跳选择机制。过滤过程利用方向指示灯(direction Indicator Light, DIL)获取的节点位置、当前方向、速度和预测方向。NS-2用于评估所提议的路由协议的性能。结果表明,与以前的工作相比,分组传输有所增加。最后,该协议有助于VANET中的路由稳定性。
{"title":"Adapting geographical DTN routing for enhanced connectivity in partitioned VANETs on highways","authors":"Mostofa Kamal Nasir, Syed Adeel Ali Shah, M. A. Qureshi, M. Oche, R. M. Noor","doi":"10.1109/TENCONSPRING.2014.6863006","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863006","url":null,"abstract":"Vehicular Ad hoc Networks (VANETs) have significant potential to host diverse applications associated with traffic safety, traffic efficiency and infotainment. VANETs have distinct characteristics and adapting routing protocols for effective communication is a subject of interest for many researchers in this domain. In this paper, we propose a position based Delay Tolerant Network (DTN) routing protocol in VANET for the highways. The solution is designed for partitioned environments which suffer from frequent network disconnections. Our solution presents the most suitable next hop selection mechanism through a filtration process. The filtration process utilizes node position, current direction, speed and the predicted direction that are acquired by Direction Indicator Light (DIL). NS-2 is used to evaluate the performance of the proposed routing protocol. The results show increment in packet transmission as compared to previous works. Finally, the proposed protocol contributes to route stability in VANET.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131141359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards virtual honeynet based on LXC virtualization 基于LXC虚拟化的虚拟蜜网研究
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863084
Nogal Memari, K. Samsudin, S. J. Hashim
Honeynet represents the new theory in network protection. Unlike purely defensive methods such as Intrusion Detection Systems (IDS), Data Encryption and Firewalls that try to avoid interaction with the attacker, Honeynet is based on the idea of interaction with the attacker. During this interaction, the Honeynet records all of the attacker's actions and tools used without the attacker knowing, representing them to the security analyzers to study and prepare defensive methods. A hybrid honeynet including both the high-interaction and low-interaction honeypots was developed and implemented utilizing virtualization technology, representing a typical laboratory environment.
蜜网代表了网络保护的新理论。与入侵检测系统(IDS)、数据加密和防火墙等试图避免与攻击者交互的纯粹防御方法不同,蜜网基于与攻击者交互的思想。在此交互过程中,Honeynet在攻击者不知情的情况下记录攻击者的所有操作和使用的工具,并将其呈现给安全分析人员,以研究和准备防御方法。利用虚拟化技术开发并实现了一个包含高交互和低交互蜜罐的混合蜜网,代表了典型的实验室环境。
{"title":"Towards virtual honeynet based on LXC virtualization","authors":"Nogal Memari, K. Samsudin, S. J. Hashim","doi":"10.1109/TENCONSPRING.2014.6863084","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863084","url":null,"abstract":"Honeynet represents the new theory in network protection. Unlike purely defensive methods such as Intrusion Detection Systems (IDS), Data Encryption and Firewalls that try to avoid interaction with the attacker, Honeynet is based on the idea of interaction with the attacker. During this interaction, the Honeynet records all of the attacker's actions and tools used without the attacker knowing, representing them to the security analyzers to study and prepare defensive methods. A hybrid honeynet including both the high-interaction and low-interaction honeypots was developed and implemented utilizing virtualization technology, representing a typical laboratory environment.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124511035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Adaptive Chebyshev polynomial analysis for fusion of remote sensing vegetation imagery 基于自适应切比雪夫多项式分析的遥感植被影像融合
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863094
Z. Omar, N. Hamzah, T. Stathaki
This paper describes a novel approach of an adaptive fusion method by using Chebyshev polynomial analysis (CPA) for use in remote sensing vegetation imagery. Chebyshev polynomials have been effectively used in image fusion mainly in medium to high noise conditions, though its application is limited to heuristics. In this research, we have proposed a way to adaptively select the optimal CPA parameters according to user specifications. Performance evaluation affirms the approach's ability in reducing computational complexity for remote sensing images affected by noise.
提出了一种基于切比雪夫多项式分析(CPA)的植被遥感影像自适应融合方法。切比雪夫多项式主要用于中高噪声条件下的图像融合,但其应用仅限于启发式算法。在本研究中,我们提出了一种根据用户需求自适应选择最优CPA参数的方法。性能评估证实了该方法在降低受噪声影响的遥感图像的计算复杂度方面的能力。
{"title":"Adaptive Chebyshev polynomial analysis for fusion of remote sensing vegetation imagery","authors":"Z. Omar, N. Hamzah, T. Stathaki","doi":"10.1109/TENCONSPRING.2014.6863094","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863094","url":null,"abstract":"This paper describes a novel approach of an adaptive fusion method by using Chebyshev polynomial analysis (CPA) for use in remote sensing vegetation imagery. Chebyshev polynomials have been effectively used in image fusion mainly in medium to high noise conditions, though its application is limited to heuristics. In this research, we have proposed a way to adaptively select the optimal CPA parameters according to user specifications. Performance evaluation affirms the approach's ability in reducing computational complexity for remote sensing images affected by noise.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124067120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of fractional frequency reuse with comp at the cell-edge 基于小区边缘比较的分数频率复用性能
Pub Date : 2014-04-14 DOI: 10.1109/TENCONSPRING.2014.6863004
A. Mahmud, K. Hamdi, N. Ramli
Fractional Frequency Reuse (FFR) is a simple and efficient method to suppress inter-cell interference (ICI) in multi-cell OFDMA networks. Base station cooperation, or a coordinated multipoint (CoMP) multiple access strategy in the FFR cell-edge, will further improve the performance of the systems. This paper presents analytical performance analysis for the downlink FFR scheme in a cluster of three or seven cells with CoMP over generalized composite fading consisting of Nakagami-m fading, path-loss and log-normal shadowing. Our analysis include the effect of full and partial loading of inter-group interference (IGI) on the capacity of the cellular system. We demonstrate that by reducing the number of participating CoMP base stations in cooperating cluster, the IGI is reduced, maximizing the capacity of the system. Our framework able to compute the spectral efficiency via a single numerical integral and is applicable to arbitrary fading distribution. Numerical and simulation results are provided.
分数频率复用(FFR)是抑制多小区OFDMA网络中小区间干扰的一种简单有效的方法。基站合作或FFR蜂窝边缘的协调多点(CoMP)多址策略将进一步提高系统的性能。本文给出了在由Nakagami-m衰落、路径损失和对数正态阴影组成的广义复合衰落下,具有CoMP的三或七单元簇下行FFR方案的解析性能分析。我们的分析包括群间干扰(IGI)的全部和部分负载对蜂窝系统容量的影响。我们证明了通过减少合作集群中参与的CoMP基站的数量,可以减少IGI,使系统的容量最大化。该框架能够通过单个数值积分计算频谱效率,适用于任意衰落分布。给出了数值和仿真结果。
{"title":"Performance of fractional frequency reuse with comp at the cell-edge","authors":"A. Mahmud, K. Hamdi, N. Ramli","doi":"10.1109/TENCONSPRING.2014.6863004","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863004","url":null,"abstract":"Fractional Frequency Reuse (FFR) is a simple and efficient method to suppress inter-cell interference (ICI) in multi-cell OFDMA networks. Base station cooperation, or a coordinated multipoint (CoMP) multiple access strategy in the FFR cell-edge, will further improve the performance of the systems. This paper presents analytical performance analysis for the downlink FFR scheme in a cluster of three or seven cells with CoMP over generalized composite fading consisting of Nakagami-m fading, path-loss and log-normal shadowing. Our analysis include the effect of full and partial loading of inter-group interference (IGI) on the capacity of the cellular system. We demonstrate that by reducing the number of participating CoMP base stations in cooperating cluster, the IGI is reduced, maximizing the capacity of the system. Our framework able to compute the spectral efficiency via a single numerical integral and is applicable to arbitrary fading distribution. Numerical and simulation results are provided.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122065962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2014 IEEE REGION 10 SYMPOSIUM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1