首页 > 最新文献

Int. J. Networked Distributed Comput.最新文献

英文 中文
Hybrid Fuzzy - Possibilistic Clustering Model based on Genetic Optimization: Case Study on Brain Tissues of Patients with Alzheimer's Disease 基于遗传优化的混合模糊-可能性聚类模型:以阿尔茨海默病患者脑组织为例
Pub Date : 2018-04-01 DOI: 10.2991/ijndc.2018.6.2.2
L. Lazli, M. Boukadoum
{"title":"Hybrid Fuzzy - Possibilistic Clustering Model based on Genetic Optimization: Case Study on Brain Tissues of Patients with Alzheimer's Disease","authors":"L. Lazli, M. Boukadoum","doi":"10.2991/ijndc.2018.6.2.2","DOIUrl":"https://doi.org/10.2991/ijndc.2018.6.2.2","url":null,"abstract":"","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116646161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Handoff Delay Optimization Using Hybrid Prediction Model 基于混合预测模型的切换延迟优化
Pub Date : 2018-04-01 DOI: 10.2991/ijndc.2018.6.2.5
M. R. Regitha, Paul Varghese, Shailesh Sivan, Antony Nijo
1 Department of Computer Science, Sacred Heart College (Autonomous), Thevara, Kochi-682013, Kerala, India E-mail: regitha.baiju@gmail.com 2 Department of Iformation Technology, CUSAT, Thrikkakara, Kochi-682021, Kerala, India E-mail: vp.it.cusat@gmail.com 3 Department of Computer Science, Sacred Heart College (Autonomous) Thevara, Kochi-682013, Kerala, India E-mail: shaileshsivan@gmail.com 4 Department of Computer Science, Sacred Heart College (Autonomous) Thevara, Kochi-682013, Kerala, India E-mail: nijocmi@gmail.com
1圣心学院(自治)计算机系,科钦-682013,印度喀拉拉邦,电子邮件:regitha.baiju@gmail.com 2 CUSAT信息技术系,科钦-682021,印度喀拉拉邦,电子邮件:vp.it.cusat@gmail.com 3圣心学院(自治),科钦-682013,印度喀拉拉邦,电子邮件:shaileshsivan@gmail.com 4印度喀拉拉邦圣心学院计算机系,Kochi-682013 E-mail: nijocmi@gmail.com
{"title":"Handoff Delay Optimization Using Hybrid Prediction Model","authors":"M. R. Regitha, Paul Varghese, Shailesh Sivan, Antony Nijo","doi":"10.2991/ijndc.2018.6.2.5","DOIUrl":"https://doi.org/10.2991/ijndc.2018.6.2.5","url":null,"abstract":"1 Department of Computer Science, Sacred Heart College (Autonomous), Thevara, Kochi-682013, Kerala, India E-mail: regitha.baiju@gmail.com 2 Department of Iformation Technology, CUSAT, Thrikkakara, Kochi-682021, Kerala, India E-mail: vp.it.cusat@gmail.com 3 Department of Computer Science, Sacred Heart College (Autonomous) Thevara, Kochi-682013, Kerala, India E-mail: shaileshsivan@gmail.com 4 Department of Computer Science, Sacred Heart College (Autonomous) Thevara, Kochi-682013, Kerala, India E-mail: nijocmi@gmail.com","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126448181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Internet of Things in the 5G Mobile Communication System: The Optimal Number of Channels in Channel Hopping 5G移动通信系统中的物联网:信道跳变中的最优信道数
Pub Date : 2018-04-01 DOI: 10.2991/ijndc.2018.6.2.6
Gayoung Kim, M. Rim
One of the typical goals of the 5G mobile communication system1 is to establish an Internet of Things (IoT)2 environment in which all objects are connected to the network to generate and share information through not only mobile terminals but also mobile communication infrastructure. 5G must support Machine-Type Communication (MTC)3 in IoT, and it must effectively support many devices distributed at high density. The IoT environment for MTC support has low transmission power and a narrowband channel environment and interference environment so that many devices can connect with minimum energy. In this environment, data transmission performance is negatively affected by retransmission, deep fading, and interference. One way of solving this problem is to propose various kinds of channel-hopping methods in which a frequency is periodically changed every time a packet is transmitted. However, current channel-hopping techniques do not indicate the proper number of channels to be used. In this paper, we propose the Optimal Number of Channels (ONC) in channel hopping algorithm, a reference method that can provide the optimal channel number to improve channel performance in 5G massive IoT environments. We show that using a hopping method that minimizes service inefficiency reduces the number of channels and improves the Quality of Service (QoS) of the channel.
5G移动通信系统1的典型目标之一是建立一个物联网(IoT)2环境,其中所有对象都连接到网络,不仅通过移动终端,还通过移动通信基础设施生成和共享信息。5G必须支持物联网中的MTC (Machine-Type Communication)3,必须有效支持高密度分布的多设备。支持MTC的物联网环境具有低传输功率、窄带信道环境和干扰环境,以最小的能量连接多台设备。在这种环境下,数据传输性能受到重传、深度衰落和干扰等不利影响。解决这一问题的一种方法是提出各种信道跳频方法,在这种方法中,每次传输数据包时都会周期性地改变频率。然而,目前的信道跳频技术并没有指明要使用的信道的适当数目。本文提出了信道跳频算法中的最优信道数(ONC),这是一种在5G海量物联网环境下提供最优信道数以提高信道性能的参考方法。我们表明,使用跳频方法可以最大限度地减少服务效率低下,减少信道数量并提高信道的服务质量(QoS)。
{"title":"Internet of Things in the 5G Mobile Communication System: The Optimal Number of Channels in Channel Hopping","authors":"Gayoung Kim, M. Rim","doi":"10.2991/ijndc.2018.6.2.6","DOIUrl":"https://doi.org/10.2991/ijndc.2018.6.2.6","url":null,"abstract":"One of the typical goals of the 5G mobile communication system1 is to establish an Internet of Things (IoT)2 environment in which all objects are connected to the network to generate and share information through not only mobile terminals but also mobile communication infrastructure. 5G must support Machine-Type Communication (MTC)3 in IoT, and it must effectively support many devices distributed at high density. The IoT environment for MTC support has low transmission power and a narrowband channel environment and interference environment so that many devices can connect with minimum energy. In this environment, data transmission performance is negatively affected by retransmission, deep fading, and interference. One way of solving this problem is to propose various kinds of channel-hopping methods in which a frequency is periodically changed every time a packet is transmitted. However, current channel-hopping techniques do not indicate the proper number of channels to be used. In this paper, we propose the Optimal Number of Channels (ONC) in channel hopping algorithm, a reference method that can provide the optimal channel number to improve channel performance in 5G massive IoT environments. We show that using a hopping method that minimizes service inefficiency reduces the number of channels and improves the Quality of Service (QoS) of the channel.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134162973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
UWB, miniaturized and directive metamaterial loaded antenna for satellite applications 用于卫星的超宽带、小型化和定向超材料负载天线
Pub Date : 2017-12-01 DOI: 10.2991/ijndc.2018.6.1.3
P. Dawar, N. S. Raghava, A. De
Antenna parameter optimization using S-shaped metamaterial embedded in antenna substrate at high frequency (THz) is elucidated in this paper. Upon incorporation of proposed metamaterials’ array inside the antenna substrate, bandwidth of antenna increases by 770 GHz and directivity by about 11%. Results obtained are well in coherence between FEM based Ansoft HFSS simulation and Matlab programming based on CAD formulas using equivalent circuit analysis of patch antenna. A low frequency (scaled) prototype of the proposed structure is fabricated and nearly 15% deviation is obtained in comparison with the simulation results.
本文研究了在天线基片内嵌入s形超材料的高频天线参数优化问题。在天线衬底内加入所提出的超材料阵列后,天线的带宽提高了770 GHz,指向性提高了约11%。通过对贴片天线等效电路的分析,得到了基于Ansoft HFSS有限元仿真与基于CAD公式的Matlab编程具有较好的一致性。制作了该结构的低频(缩放)原型,与仿真结果的偏差接近15%。
{"title":"UWB, miniaturized and directive metamaterial loaded antenna for satellite applications","authors":"P. Dawar, N. S. Raghava, A. De","doi":"10.2991/ijndc.2018.6.1.3","DOIUrl":"https://doi.org/10.2991/ijndc.2018.6.1.3","url":null,"abstract":"Antenna parameter optimization using S-shaped metamaterial embedded in antenna substrate at high frequency (THz) is elucidated in this paper. Upon incorporation of proposed metamaterials’ array inside the antenna substrate, bandwidth of antenna increases by 770 GHz and directivity by about 11%. Results obtained are well in coherence between FEM based Ansoft HFSS simulation and Matlab programming based on CAD formulas using equivalent circuit analysis of patch antenna. A low frequency (scaled) prototype of the proposed structure is fabricated and nearly 15% deviation is obtained in comparison with the simulation results.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133783754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing Risk of Security Non-compliance of Banking Security Requirements Based on Attack Patterns 基于攻击模式的银行安全不合规风险评估
Pub Date : 2017-12-01 DOI: 10.2991/ijndc.2018.6.1.1
Krissada Rongrat, T. Senivongse
Information systems such as those in the Banking sector need to comply with security regulations to assure that necessary security controls are in place. This paper presents an initial risk assessment method to assist a banking information system project in validating security requirements of the system. Dissimilarity between the textual security requirements of the system and the security regulations is determined to identify security non-compliance. A risk index model is then proposed to determine the risk level based on the severity and likelihood of exploit of any security attack patterns that could potentially affect the system if the missing regulations are not implemented. In an experiment using a case study of nine Thai commercial banks and the IT Best Practices of the Bank of Thailand as the regulations, the performance of compliance checking is evaluated in terms of F-measure and accuracy. It is also found that there is a strong positive correlation, with the coefficient of over 0.6, between the risk indices from the method and the security expert judgment.
银行等部门的信息系统需要遵守安全法规,以确保必要的安全控制措施到位。本文提出了一种初始风险评估方法,以帮助银行信息系统项目验证系统的安全需求。确定系统文本安全需求与安全法规之间的不一致,以识别安全不合规。然后提出一个风险指数模型,根据任何安全攻击模式的严重性和被利用的可能性来确定风险级别,如果没有实现缺失的法规,这些攻击模式可能会影响系统。以泰国九家商业银行为例,以泰国银行IT最佳实践为规范,从F-measure和准确性两方面对合规性检查的绩效进行了评估。研究还发现,该方法的风险指标与安全专家判断之间存在较强的正相关关系,其系数大于0.6。
{"title":"Assessing Risk of Security Non-compliance of Banking Security Requirements Based on Attack Patterns","authors":"Krissada Rongrat, T. Senivongse","doi":"10.2991/ijndc.2018.6.1.1","DOIUrl":"https://doi.org/10.2991/ijndc.2018.6.1.1","url":null,"abstract":"Information systems such as those in the Banking sector need to comply with security regulations to assure that necessary security controls are in place. This paper presents an initial risk assessment method to assist a banking information system project in validating security requirements of the system. Dissimilarity between the textual security requirements of the system and the security regulations is determined to identify security non-compliance. A risk index model is then proposed to determine the risk level based on the severity and likelihood of exploit of any security attack patterns that could potentially affect the system if the missing regulations are not implemented. In an experiment using a case study of nine Thai commercial banks and the IT Best Practices of the Bank of Thailand as the regulations, the performance of compliance checking is evaluated in terms of F-measure and accuracy. It is also found that there is a strong positive correlation, with the coefficient of over 0.6, between the risk indices from the method and the security expert judgment.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127102754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Estimating and Visualizing the Time-varying Effects of a Binary Covariate on Longitudinal Big Text Data 纵向大文本数据中二元协变量时变效应的估计和可视化
Pub Date : 2017-10-01 DOI: 10.2991/ijndc.2017.5.4.6
S. Izumi, T. Tonda, N. Kawano, K. Satoh
We propose a method to estimate and visualize effects of a binary covariate on the longitudinally observed text data. Our method consists of series of analytical methods: extracting keywords through a morphological analysis, estimating the time-varying regression coefficient of a binary covariate for keyword's appearance and frequency, classifying summary of estimates, and visualizing the time-varying effects of a binary covariate in animated scatter plots. The procedure is demonstrated with Peace Declaration text data observed for forty years in two cities.
我们提出了一种方法来估计和可视化二进制协变量对纵向观察文本数据的影响。我们的方法包括一系列的分析方法:通过形态学分析提取关键字,估计关键字出现和频率的二元协变量的时变回归系数,对估计的汇总进行分类,并在动画散点图中可视化二元协变量的时变效应。该程序用在两个城市观察了四十年的《和平宣言》文本数据进行了演示。
{"title":"Estimating and Visualizing the Time-varying Effects of a Binary Covariate on Longitudinal Big Text Data","authors":"S. Izumi, T. Tonda, N. Kawano, K. Satoh","doi":"10.2991/ijndc.2017.5.4.6","DOIUrl":"https://doi.org/10.2991/ijndc.2017.5.4.6","url":null,"abstract":"We propose a method to estimate and visualize effects of a binary covariate on the longitudinally observed text data. Our method consists of series of analytical methods: extracting keywords through a morphological analysis, estimating the time-varying regression coefficient of a binary covariate for keyword's appearance and frequency, classifying summary of estimates, and visualizing the time-varying effects of a binary covariate in animated scatter plots. The procedure is demonstrated with Peace Declaration text data observed for forty years in two cities.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131612783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Evaluation of Coding Violation Focusing on Change History and Authorship of Source File 基于源文件变更历史和作者身份的编码违章评价
Pub Date : 2017-09-01 DOI: 10.2991/ijndc.2017.5.4.3
Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara
This paper focuses on an evaluation of coding violation warned by a static code analysis tool while considering the change history of violation and the authorship of source file. Through an empirical study with data collected from seven open source software projects, the following findings are reported: (1) the variety and the evaluation of a coding violation tend to vary accroding to the authoring type of the source file; (2) while important violations tend to vary from project to project, about 30% of violations are commonly disregarded by many programmers.
本文在考虑代码违例变化历史和源文件作者身份的情况下,对静态代码分析工具警告的代码违例进行了评价。通过对七个开源软件项目数据的实证研究,报告了以下发现:(1)编码违规的种类和评估倾向于根据源文件的创作类型而变化;(2)虽然重要的违规行为往往因项目而异,但大约30%的违规行为通常被许多程序员忽略。
{"title":"An Evaluation of Coding Violation Focusing on Change History and Authorship of Source File","authors":"Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara","doi":"10.2991/ijndc.2017.5.4.3","DOIUrl":"https://doi.org/10.2991/ijndc.2017.5.4.3","url":null,"abstract":"This paper focuses on an evaluation of coding violation warned by a static code analysis tool while considering the change history of violation and the authorship of source file. Through an empirical study with data collected from seven open source software projects, the following findings are reported: (1) the variety and the evaluation of a coding violation tend to vary accroding to the authoring type of the source file; (2) while important violations tend to vary from project to project, about 30% of violations are commonly disregarded by many programmers.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114593780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement and Evaluation of Estimation of Time Series Data of Daily Life 日常生活时间序列数据估计的改进与评价
Pub Date : 2017-09-01 DOI: 10.2991/ijndc.2017.5.4.5
T. Hochin, Hiroki Nomiya
This paper improves the estimation of the amounts of sewage flow, which is one of daily life data, in order to manage them efficiently. The amounts of flow of a typical day are tried to be adjusted to those of a non-regular day. A typical (non-regular, respectively) day is a non-rainy day having good data and no (a few) outliers. The values for the adjustment are tried to be estimated by using the multiple regression analysis. It is shown that the estimation can be improved, and these values can be estimated by using the temperature of that day, the amount of the rain fall of the previous day, and the day type, which distinguishes a weekday, Saturday, Sunday, and a national holiday. The estimation is tried to be used in estimating the data of a regular day. It is experimentally shown that the estimation works well.
本文对日常生活数据之一的污水流量估算进行了改进,以便对其进行有效的管理。一个典型的一天的流量试图调整到那些不规律的一天。一个典型的(分别是非规则的)日子是一个没有下雨的日子,有良好的数据,没有(几个)异常值。尝试用多元回归分析对平差值进行估计。结果表明,可以改进估计,利用当天的温度、前一天的降雨量和区分工作日、星期六、星期日和国家法定假日的日类型来估计这些值。试图将该估计用于估计常规日的数据。实验结果表明,该方法具有良好的估计效果。
{"title":"Improvement and Evaluation of Estimation of Time Series Data of Daily Life","authors":"T. Hochin, Hiroki Nomiya","doi":"10.2991/ijndc.2017.5.4.5","DOIUrl":"https://doi.org/10.2991/ijndc.2017.5.4.5","url":null,"abstract":"This paper improves the estimation of the amounts of sewage flow, which is one of daily life data, in order to manage them efficiently. The amounts of flow of a typical day are tried to be adjusted to those of a non-regular day. A typical (non-regular, respectively) day is a non-rainy day having good data and no (a few) outliers. The values for the adjustment are tried to be estimated by using the multiple regression analysis. It is shown that the estimation can be improved, and these values can be estimated by using the temperature of that day, the amount of the rain fall of the previous day, and the day type, which distinguishes a weekday, Saturday, Sunday, and a national holiday. The estimation is tried to be used in estimating the data of a regular day. It is experimentally shown that the estimation works well.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115660714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Burst Transmission and Frame Aggregation for VANET Communications VANET通信的突发传输和帧聚合
Pub Date : 2017-09-01 DOI: 10.2991/ijndc.2017.5.4.1
W. Lai, Mei-Tso Lin, Ting-Huan Kuo
In vehicular ad hoc networks (VANETs), due to highly mobile and frequently changing topology, available resources and transmission opportunities are restricted. To address this, we propose a burst transmission and frame aggregation (FAB) scheme to enhance transmission opportunity (TXOP) efficiency of IEEE 802.11p. Aggregation and TXOP techniques are useful for improving transmission performance. FAB aggregates frames in the relay node and utilizes the TXOP to transmit these frames to the next hop with a burst transmission. Simulation results show that the proposed FAB scheme can significantly improve the performance of inter-vehicle communications.
在车载自组织网络(vanet)中,由于高度移动和频繁变化的拓扑结构,可用资源和传输机会受到限制。为了解决这个问题,我们提出了一种突发传输和帧聚合(FAB)方案来提高IEEE 802.11p的传输机会(TXOP)效率。聚合和TXOP技术对提高传输性能非常有用。FAB在中继节点中聚合帧,并利用TXOP将这些帧以突发传输的方式传输到下一跳。仿真结果表明,该方案能显著提高车辆间通信性能。
{"title":"Burst Transmission and Frame Aggregation for VANET Communications","authors":"W. Lai, Mei-Tso Lin, Ting-Huan Kuo","doi":"10.2991/ijndc.2017.5.4.1","DOIUrl":"https://doi.org/10.2991/ijndc.2017.5.4.1","url":null,"abstract":"In vehicular ad hoc networks (VANETs), due to highly mobile and frequently changing topology, available resources and transmission opportunities are restricted. To address this, we propose a burst transmission and frame aggregation (FAB) scheme to enhance transmission opportunity (TXOP) efficiency of IEEE 802.11p. Aggregation and TXOP techniques are useful for improving transmission performance. FAB aggregates frames in the relay node and utilizes the TXOP to transmit these frames to the next hop with a burst transmission. Simulation results show that the proposed FAB scheme can significantly improve the performance of inter-vehicle communications.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120937408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Load Experiment of the vDACS Scheme in case of the 300 Clients vDACS方案在300个客户端的负载实验
Pub Date : 2017-09-01 DOI: 10.2991/ijndc.2017.5.4.2
Kazuya Odagiri, Shogo Shimizu, N. Ishii
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the path between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, as the progression phase for the last goal, we perform the load experiment of the cloud type virtual PBNM named the vDACS Scheme, which can be used by plural organizations, for applications to the small and medium size scale organization. The number of clients used in an experiment is 300.
在目前的互联网系统中,存在着许多使用网络通信匿名性的问题,如个人信息泄露和利用互联网系统犯罪。这就是Internet系统中使用的TCP/IP协议在通信数据上没有用户身份信息的原因,很难对用户进行上述行为的即时监督。基于策略的网络管理(PBNM)就是为了解决上述问题而进行的研究。这是一种通过对每个用户的通信控制来管理整个局域网(LAN)的方案。在这种PBNM中,存在两种类型的方案。第一个是通过在网络服务器和客户端之间的路径上定位通信控制机制来管理整个局域网的方案。二是通过在客户端上定位通信控制机制来管理整个局域网的方案。作为第二种方案,我们对目的寻址控制系统(DACS)方案进行了理论研究。将该DACS方案应用于Internet系统管理,实现基于策略的Internet系统管理。在本文中,作为最后一个目标的推进阶段,我们对可用于多个组织的云型虚拟PBNM vDACS方案进行了负载实验,并将其应用于中小型组织。实验中使用的客户机数量为300。
{"title":"Load Experiment of the vDACS Scheme in case of the 300 Clients","authors":"Kazuya Odagiri, Shogo Shimizu, N. Ishii","doi":"10.2991/ijndc.2017.5.4.2","DOIUrl":"https://doi.org/10.2991/ijndc.2017.5.4.2","url":null,"abstract":"In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the path between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, as the progression phase for the last goal, we perform the load experiment of the cloud type virtual PBNM named the vDACS Scheme, which can be used by plural organizations, for applications to the small and medium size scale organization. The number of clients used in an experiment is 300.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124332905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Networked Distributed Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1