首页 > 最新文献

2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
Models for an Intelligent Context-Aware Blended m-Learning System 智能上下文感知混合式移动学习系统模型
D. Newell, Philip Davies, Ron Austin, P. Moore, Mak Sharma
System requirements for an intelligent, mobile blended learning environment (m-Learning) have been elicited. Theories of ontology modelling are developed. A context-aware adaption engine using explicit and implicit knowledge of the student profile model are proposed. The context in which learning occurs is shown to be represented by a set of functions that are contextually dependent on learning modelled as a multi connected ontology. The evaluated prototype implementation is a partially context aware m-Learning presentation system. It is concluded that the m-learning environment is beneficial to programme outcomes, mainly for students who learn according to the heutagogical model. Further work is underway to capture m-Learning requirements better suited to students employing the pedagogic learning model.
智能、移动混合学习环境(m-Learning)的系统需求已经被提出。发展了本体建模理论。提出了一种利用学生档案模型的显式和隐式知识的上下文感知自适应引擎。学习发生的上下文由一组功能表示,这些功能在上下文上依赖于建模为多连接本体的学习。所评估的原型实现是一个部分上下文感知的移动学习演示系统。结论是,移动学习环境有利于项目成果,主要是对那些按照传统模式学习的学生。进一步的工作正在进行中,以捕捉更适合采用教学法学习模式的学生的移动学习需求。
{"title":"Models for an Intelligent Context-Aware Blended m-Learning System","authors":"D. Newell, Philip Davies, Ron Austin, P. Moore, Mak Sharma","doi":"10.1109/WAINA.2015.25","DOIUrl":"https://doi.org/10.1109/WAINA.2015.25","url":null,"abstract":"System requirements for an intelligent, mobile blended learning environment (m-Learning) have been elicited. Theories of ontology modelling are developed. A context-aware adaption engine using explicit and implicit knowledge of the student profile model are proposed. The context in which learning occurs is shown to be represented by a set of functions that are contextually dependent on learning modelled as a multi connected ontology. The evaluated prototype implementation is a partially context aware m-Learning presentation system. It is concluded that the m-learning environment is beneficial to programme outcomes, mainly for students who learn according to the heutagogical model. Further work is underway to capture m-Learning requirements better suited to students employing the pedagogic learning model.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"45 1","pages":"405-410"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82570992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Parallel Processing Simulator for Separate Sensor of WSN Simulator with GPU 基于GPU的WSN独立传感器并行处理模拟器
Hyun-Woo Kim, Eun-Ha Song, J. Park, Y. Jeong
Recently wireless sensor networks have been used as the technology that is actively grafted onto industries and daily living. Sensors should have built-in routing functions and basic sensing functions for the self-configuration of topologies. The number of sensors necessary for using them in an actual observation ranges from tens to hundreds or thousands. When theses sensors are wrongly placed in an observation region, they can quickly run out of batteries or be disconnected. These incidents may result in huge losses in terms of sensing data from numerous sensors and their costs. Therefore a number of simulators have been developed as tools for effective design and verification before the actual arrangement of sensors. While a number of simulators have been developed, simulation results can be fairly limited and the execution speed can be markedly slow depending on the function of each simulator. To improve the performance of existing simulators, this paper aimed to develop a parallel processing simulator for separate sensor (P2S3) that enables users to selectively use the GPU mode. It enables parallel and independent operations by matching GPU with many cores in order to resolve the slowdown of the execution speed when numerous sensor nodes are used for simulations. Also, P2S3 include the analyzed of sensor nodes with log data and visualization. The P2S3 supports the GPU mode in an environment that allows the operation of compute unified device architecture (CUDA), and performs the parallel simulation processing of multiple sensors using the mode within a short period of time.
近年来,无线传感器网络作为一种技术被积极地嫁接到工业和日常生活中。传感器应具有内置路由功能和基本感知功能,以实现拓扑的自配置。在实际观测中使用它们所需的传感器数量从数十到数百或数千不等。当这些传感器被错误地放置在观测区域时,它们很快就会耗尽电池或断开连接。这些事件可能会导致来自众多传感器的传感数据及其成本的巨大损失。因此,在实际布置传感器之前,已经开发了一些模拟器作为有效设计和验证的工具。虽然已经开发了许多模拟器,但根据每个模拟器的功能,模拟结果可能相当有限,执行速度可能显着缓慢。为了提高现有模拟器的性能,本文旨在开发一种独立传感器并行处理模拟器(P2S3),使用户能够有选择地使用GPU模式。它通过多核匹配GPU实现并行和独立操作,以解决使用多个传感器节点进行模拟时执行速度减慢的问题。此外,P2S3还包括对传感器节点的日志数据分析和可视化。P2S3支持在CUDA (compute unified device architecture)运行环境下的GPU模式,可在短时间内完成多个传感器的并行仿真处理。
{"title":"Parallel Processing Simulator for Separate Sensor of WSN Simulator with GPU","authors":"Hyun-Woo Kim, Eun-Ha Song, J. Park, Y. Jeong","doi":"10.1109/AINA.2015.193","DOIUrl":"https://doi.org/10.1109/AINA.2015.193","url":null,"abstract":"Recently wireless sensor networks have been used as the technology that is actively grafted onto industries and daily living. Sensors should have built-in routing functions and basic sensing functions for the self-configuration of topologies. The number of sensors necessary for using them in an actual observation ranges from tens to hundreds or thousands. When theses sensors are wrongly placed in an observation region, they can quickly run out of batteries or be disconnected. These incidents may result in huge losses in terms of sensing data from numerous sensors and their costs. Therefore a number of simulators have been developed as tools for effective design and verification before the actual arrangement of sensors. While a number of simulators have been developed, simulation results can be fairly limited and the execution speed can be markedly slow depending on the function of each simulator. To improve the performance of existing simulators, this paper aimed to develop a parallel processing simulator for separate sensor (P2S3) that enables users to selectively use the GPU mode. It enables parallel and independent operations by matching GPU with many cores in order to resolve the slowdown of the execution speed when numerous sensor nodes are used for simulations. Also, P2S3 include the analyzed of sensor nodes with log data and visualization. The P2S3 supports the GPU mode in an environment that allows the operation of compute unified device architecture (CUDA), and performs the parallel simulation processing of multiple sensors using the mode within a short period of time.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"3 1","pages":"255-262"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73062620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DNS Name Autoconfiguration for IoT Home Devices 物联网家庭设备DNS名称自动配置
Sejun Lee, J. Jeong, Jungsoo Park
This paper proposes an auto configuration scheme for DNS names of home network devices. By this scheme, the DNS name of a home network device can be auto configured with the devices category and model in a home network. This DNS name lets home residents easily identify each device for monitoring and remote-controlling it in a home network.
提出了一种家庭网络设备DNS名称自动配置方案。通过该方案,可以根据家庭网络中的设备类别和型号自动配置家庭网络设备的DNS名称。这个DNS名称可以让家庭居民轻松识别每个设备,以便在家庭网络中监视和远程控制它。
{"title":"DNS Name Autoconfiguration for IoT Home Devices","authors":"Sejun Lee, J. Jeong, Jungsoo Park","doi":"10.1109/WAINA.2015.104","DOIUrl":"https://doi.org/10.1109/WAINA.2015.104","url":null,"abstract":"This paper proposes an auto configuration scheme for DNS names of home network devices. By this scheme, the DNS name of a home network device can be auto configured with the devices category and model in a home network. This DNS name lets home residents easily identify each device for monitoring and remote-controlling it in a home network.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"36 1","pages":"131-134"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75769144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Probabilistic Key Pre-Distribution for Heterogeneous Mobile Ad Hoc Networks Using Subjective Logic 基于主观逻辑的异构移动自组网的概率密钥预分配
Mahdieh Ahmadi, Mohammed Gharib, F. Ghassemi, A. Movaghar
Public key management scheme in mobile ad hoc networks (MANETs) is an inevitable solution to achieve different security services such as integrity, confidentiality, authentication and non reputation. Probabilistic asymmetric key pre-distribution (PAKP) is a self-organized and fully distributed approach. It resolves most of MANET's challenging concerns such as storage constraint, limited physical security and dynamic topology. In such a model, secure path between two nodes is composed of one or more random successive direct secure links where intermediate nodes can read, drop or modify packets. This way, intelligent selection of intermediate nodes on a secure path is vital to ensure security and lower traffic volume. In this paper, subjective logic is used to improve PAKP method with the aim to select the most trusted and robust path. Consequently, our approach results in a better data traffic and also improve the security. Proposed algorithm chooses the least number of nodes among the most trustworthy nodes which are able to act as intermediate stations. We exploit two subjective logic based models: one exploits the subjective nature of trust between nodes and the other considers path conditions. We then evaluate our approach using network simulator ns-3. Simulation results confirm the effectiveness and superiority of the proposed protocol compared to the basic PAKP scheme.
移动自组网(manet)中的公钥管理方案是实现完整性、机密性、认证和非信誉等不同安全服务的必然解决方案。概率非对称密钥预分发(PAKP)是一种自组织的全分布方法。它解决了大多数MANET具有挑战性的问题,如存储约束、有限的物理安全性和动态拓扑。在该模型中,两个节点之间的安全路径由一个或多个随机连续的直接安全链路组成,中间节点可以读取、丢弃或修改数据包。因此,在安全路径上智能选择中间节点对于保证安全性和降低流量至关重要。本文利用主观逻辑对PAKP方法进行改进,以选择最可信、最鲁棒的路径。因此,我们的方法带来了更好的数据流量,也提高了安全性。该算法在最可信的节点中选择最少数量的节点作为中间站。我们利用了两个基于主观逻辑的模型:一个利用了节点之间信任的主观性质,另一个考虑了路径条件。然后,我们使用网络模拟器ns-3评估我们的方法。仿真结果验证了该协议与基本PAKP协议相比的有效性和优越性。
{"title":"Probabilistic Key Pre-Distribution for Heterogeneous Mobile Ad Hoc Networks Using Subjective Logic","authors":"Mahdieh Ahmadi, Mohammed Gharib, F. Ghassemi, A. Movaghar","doi":"10.1109/AINA.2015.184","DOIUrl":"https://doi.org/10.1109/AINA.2015.184","url":null,"abstract":"Public key management scheme in mobile ad hoc networks (MANETs) is an inevitable solution to achieve different security services such as integrity, confidentiality, authentication and non reputation. Probabilistic asymmetric key pre-distribution (PAKP) is a self-organized and fully distributed approach. It resolves most of MANET's challenging concerns such as storage constraint, limited physical security and dynamic topology. In such a model, secure path between two nodes is composed of one or more random successive direct secure links where intermediate nodes can read, drop or modify packets. This way, intelligent selection of intermediate nodes on a secure path is vital to ensure security and lower traffic volume. In this paper, subjective logic is used to improve PAKP method with the aim to select the most trusted and robust path. Consequently, our approach results in a better data traffic and also improve the security. Proposed algorithm chooses the least number of nodes among the most trustworthy nodes which are able to act as intermediate stations. We exploit two subjective logic based models: one exploits the subjective nature of trust between nodes and the other considers path conditions. We then evaluate our approach using network simulator ns-3. Simulation results confirm the effectiveness and superiority of the proposed protocol compared to the basic PAKP scheme.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"27 1","pages":"185-192"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74551181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
TeleBuilder: A 3DCG Builder System for Multiplayers via Network TeleBuilder:一个基于网络的多人游戏的3DCG建造系统
Ningping Sun, Masataka Murakami, Youhei Yamashita, Tomonori Yagi
Computer graphics application becomes more and more attractive recently as the popularization of the smart phone and computer tablet. It is interested us what we can do through network for making 3DCG models. We have designed and developed an interactive 3DCG Builder system and tried to apply it on internet environment for on-line multi-player. In this paper, we shall provide our design policy and development process.
近年来,随着智能手机和平板电脑的普及,计算机图形学应用变得越来越有吸引力。我们对如何通过网络制作3DCG模型很感兴趣。我们设计并开发了一个交互式的3DCG Builder系统,并尝试将其应用于网络环境下的在线多人游戏。在本文中,我们将提供我们的设计策略和开发过程。
{"title":"TeleBuilder: A 3DCG Builder System for Multiplayers via Network","authors":"Ningping Sun, Masataka Murakami, Youhei Yamashita, Tomonori Yagi","doi":"10.1109/AINA.2015.197","DOIUrl":"https://doi.org/10.1109/AINA.2015.197","url":null,"abstract":"Computer graphics application becomes more and more attractive recently as the popularization of the smart phone and computer tablet. It is interested us what we can do through network for making 3DCG models. We have designed and developed an interactive 3DCG Builder system and tried to apply it on internet environment for on-line multi-player. In this paper, we shall provide our design policy and development process.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"142 1","pages":"287-293"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80205022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technology Research of Tibetan Hot Topics Extraction 藏文热点话题提取技术研究
Guixian Xu, L. Qiu
With the increase of a large numbers of Tibetan information, Tibetan text processing has become popular and important. Tibetan hot topics extraction has become one of the Tibetan information analysis tools. This paper describes a method of the hot topics extraction from Tibetan text. First, construction of the dataset is described. Second, Tibetan word segmentation is presented. Third, the feature selection and the text representation are conducted. The classical TFIDF is used to calculate the weights of features. At last, statistical-based method is utilized to extract the hot topics. The experiment shows it can extract the topics effectively and the results can reflect the characteristics of hot topic category. It is helpful and meaningful for text classification, information retrieval as well as construction of high-quality corpus.
随着大量藏文信息的增加,藏文处理变得流行和重要。藏文热点话题提取已成为藏文信息分析的工具之一。本文介绍了一种从藏文文本中提取热点话题的方法。首先,描述了数据集的构建。其次,提出了藏文分词方法。第三,进行特征选择和文本表示。经典的TFIDF用于计算特征的权重。最后,利用基于统计的方法提取热点话题。实验结果表明,该方法能有效地提取话题,提取结果能较好地反映热点话题类别的特征。这对文本分类、信息检索以及高质量语料库的构建都有一定的帮助和意义。
{"title":"Technology Research of Tibetan Hot Topics Extraction","authors":"Guixian Xu, L. Qiu","doi":"10.1109/WAINA.2015.17","DOIUrl":"https://doi.org/10.1109/WAINA.2015.17","url":null,"abstract":"With the increase of a large numbers of Tibetan information, Tibetan text processing has become popular and important. Tibetan hot topics extraction has become one of the Tibetan information analysis tools. This paper describes a method of the hot topics extraction from Tibetan text. First, construction of the dataset is described. Second, Tibetan word segmentation is presented. Third, the feature selection and the text representation are conducted. The classical TFIDF is used to calculate the weights of features. At last, statistical-based method is utilized to extract the hot topics. The experiment shows it can extract the topics effectively and the results can reflect the characteristics of hot topic category. It is helpful and meaningful for text classification, information retrieval as well as construction of high-quality corpus.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"6 1","pages":"204-208"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76943564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Causally Ordered Delivery of Event Messages with Keyword Vectors in P2P Publish/Subscribe Systems 基于关键字向量的P2P发布/订阅系统中事件消息的因果顺序传递
Hiroki Nakayama, Dilawaer Duolikun, T. Enokido, M. Takizawa
In distributed systems, a group of multiple processes are cooperating with one another by exchanging messages in networks. A process is modeled to be a finite state machine. In this paper, we discuss a peer-to-peer (P2P) model of a publish/subscribe (P2PPS) system composed of peer processes (peers). Each peer can both subscribe a subscription and publish event messages with a publication. In this paper, subscriptions and publications are specified in terms of keywords. If a subscription of a subscriber peer and a publication of an event message include some common keywords, the subscriber peer is a target peer of the event message. The event message is notified to the target subscriber peer. A pair of event messages are related, which have a common target subscriber peer. Only a pair of related event messages are required to be delivered to common target subscriber peers in the causal order. We newly propose vectors of 〈V<;sub>1<;/sub>, ..., V<;sub>m<;/sub>〉 of keywords k , ..., k<;sub>m<;/sub> to causally order event messages. Each event message e carries the keyword vector e.V. An event message e<;sub>1<;/sub> causally precedes an event message e<;sub>2<;/sub> with respect to a subscription S<;sub>i<;/sub> iff e<;sub>1<;/sub>·V<;sub>h<;/sub> <; e<;sub>2<;/sub>·V<;sub>h<;/sub> for every keyword k<;sub>h<;/sub> which is in the publications of the event messages e<;sub>1<;/sub> and e<;sub>2<;/sub> and the subscription S<;sub>i<;/sub>. Only a pair of related messages are causally delivered to common subscriber peers.
在分布式系统中,一组多个进程在网络中通过交换消息相互协作。流程被建模为有限状态机。本文讨论了由对等进程组成的发布/订阅(P2PPS)系统的点对点(P2P)模型。每个对等点既可以订阅订阅,也可以使用发布发布事件消息。在本文中,订阅和出版物是根据关键词来指定的。如果订阅者对等体的订阅和事件消息的发布包含一些通用关键字,则订阅者对等体是事件消息的目标对等体。将事件消息通知给目标订阅者对等体。一对事件消息是相关的,它们有一个共同的目标订阅者对等体。只需要按照因果顺序将一对相关的事件消息传递给共同的目标订阅者对等点。我们提出了< V1,…, Vm >的关键字k,…, km对事件消息进行随机排序。每个事件消息e都携带关键字向量e.V。对于事件消息e1和e2以及订阅Si发布中的每个关键字kh,事件消息e1因果关系地先于事件消息e2。只有一对相关的消息被偶然地传递给公共订阅者对等体。
{"title":"Causally Ordered Delivery of Event Messages with Keyword Vectors in P2P Publish/Subscribe Systems","authors":"Hiroki Nakayama, Dilawaer Duolikun, T. Enokido, M. Takizawa","doi":"10.1109/AINA.2015.233","DOIUrl":"https://doi.org/10.1109/AINA.2015.233","url":null,"abstract":"In distributed systems, a group of multiple processes are cooperating with one another by exchanging messages in networks. A process is modeled to be a finite state machine. In this paper, we discuss a peer-to-peer (P2P) model of a publish/subscribe (P2PPS) system composed of peer processes (peers). Each peer can both subscribe a subscription and publish event messages with a publication. In this paper, subscriptions and publications are specified in terms of keywords. If a subscription of a subscriber peer and a publication of an event message include some common keywords, the subscriber peer is a target peer of the event message. The event message is notified to the target subscriber peer. A pair of event messages are related, which have a common target subscriber peer. Only a pair of related event messages are required to be delivered to common target subscriber peers in the causal order. We newly propose vectors of 〈V<;sub>1<;/sub>, ..., V<;sub>m<;/sub>〉 of keywords k , ..., k<;sub>m<;/sub> to causally order event messages. Each event message e carries the keyword vector e.V. An event message e<;sub>1<;/sub> causally precedes an event message e<;sub>2<;/sub> with respect to a subscription S<;sub>i<;/sub> iff e<;sub>1<;/sub>·V<;sub>h<;/sub> <; e<;sub>2<;/sub>·V<;sub>h<;/sub> for every keyword k<;sub>h<;/sub> which is in the publications of the event messages e<;sub>1<;/sub> and e<;sub>2<;/sub> and the subscription S<;sub>i<;/sub>. Only a pair of related messages are causally delivered to common subscriber peers.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"534-541"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80759864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Stateless Adaptive Reliable Broadcast Protocol for Heterogeneous Wireless Networks 异构无线网络的无状态自适应可靠广播协议
V. Paruchuri, A. Durresi
We address the problem of reliable broadcasting in spite of collisions and transmission losses. We do not aim to achieve reliable broadcast to all nodes in the network, rather, we seek to ensure reliable broadcast to a desired percentage of nodes. We first present a geometric based, probabilistic model to predict the optimal transmission range for maximizing 1-hop broadcast coverage in wireless networks as a function of range, sending rate and density. Though this adaptation technique can be incorporated into any broadcasting protocol, we extend Broadcast Protocol for Sensor Networks (BPS) [1] because of its simplicity, scalability and adaptability. The protocol can be applied under node heterogeneity in terms of transmission/reception ranges and packet delivery rate. Through extensive analytical and experimental results, we show multi fold advantages of adapting the protocol to network conditions.
我们解决了在碰撞和传输损失的情况下可靠广播的问题。我们的目标不是实现向网络中所有节点的可靠广播,而是寻求确保向所需百分比的节点进行可靠广播。我们首先提出了一个基于几何的概率模型,以预测无线网络中最大化1跳广播覆盖的最佳传输范围,作为距离,发送速率和密度的函数。虽然这种自适应技术可以合并到任何广播协议中,但由于其简单,可扩展性和适应性,我们扩展了传感器网络广播协议(BPS)[1]。该协议可以在节点异构的情况下适用于传输/接收范围和数据包发送速率。通过大量的分析和实验结果,我们展示了使协议适应网络条件的多重优势。
{"title":"Stateless Adaptive Reliable Broadcast Protocol for Heterogeneous Wireless Networks","authors":"V. Paruchuri, A. Durresi","doi":"10.1109/AINA.2015.280","DOIUrl":"https://doi.org/10.1109/AINA.2015.280","url":null,"abstract":"We address the problem of reliable broadcasting in spite of collisions and transmission losses. We do not aim to achieve reliable broadcast to all nodes in the network, rather, we seek to ensure reliable broadcast to a desired percentage of nodes. We first present a geometric based, probabilistic model to predict the optimal transmission range for maximizing 1-hop broadcast coverage in wireless networks as a function of range, sending rate and density. Though this adaptation technique can be incorporated into any broadcasting protocol, we extend Broadcast Protocol for Sensor Networks (BPS) [1] because of its simplicity, scalability and adaptability. The protocol can be applied under node heterogeneity in terms of transmission/reception ranges and packet delivery rate. Through extensive analytical and experimental results, we show multi fold advantages of adapting the protocol to network conditions.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"47 1","pages":"860-867"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86357718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New (n, 2n) Double Block Length Hash Function Based on Single Key Scheduling 一种新的基于单键调度的(n, 2n)双块长度哈希函数
A. Miyaji, M. Rashed
In this paper we propose a double block length hash function called MR-MMO. Our scheme satisfies two calls of (n, 2n) block cipher and can compress 3n bits to 2n bits (n = 128 bits). The Collision Resistance (CR) and Preimage Resistance (PR) of MR-MMO are respectively 2126.70 and 2252.5. Surprisingly, the collision security bound of our scheme is the best in compare with other existing schemes. We use a single key scheduling for each compression function which is great in respect of cost and time. Additionally, it can be said that the proof technique of Weimar-DM, Tandem-DM, Hirose-DM are based on Ideal Cipher Model (ICM) while we use Weak Cipher Model (WCM) tool. Davies Meyer (DM) mode is used in the above all schemes, we also made a change using Matyas Meyer Oseas (MMO) mode. It is also obvious that the proof technique of our scheme is very simple, straightforward and easy to understand.
在本文中,我们提出了一个双块长度哈希函数MR-MMO。我们的方案满足两次(n, 2n)分组密码调用,可以将3n位压缩为2n位(n = 128位)。MR-MMO的抗碰撞性(CR)和抗预像性(PR)分别为2126.70和2252.5。令人惊讶的是,与现有方案相比,我们方案的碰撞安全边界是最好的。我们对每个压缩函数使用单个键调度,这在成本和时间方面都很好。此外,可以说Weimar-DM、Tandem-DM、Hirose-DM的证明技术都是基于理想密码模型(ICM),而我们使用的是弱密码模型(WCM)工具。Davies Meyer (DM)模式用于以上所有方案,我们还使用Matyas Meyer Oseas (MMO)模式进行了更改。很明显,我们方案的证明技术非常简单、直接、容易理解。
{"title":"A New (n, 2n) Double Block Length Hash Function Based on Single Key Scheduling","authors":"A. Miyaji, M. Rashed","doi":"10.1109/AINA.2015.237","DOIUrl":"https://doi.org/10.1109/AINA.2015.237","url":null,"abstract":"In this paper we propose a double block length hash function called MR-MMO. Our scheme satisfies two calls of (n, 2n) block cipher and can compress 3n bits to 2n bits (n = 128 bits). The Collision Resistance (CR) and Preimage Resistance (PR) of MR-MMO are respectively 2126.70 and 2252.5. Surprisingly, the collision security bound of our scheme is the best in compare with other existing schemes. We use a single key scheduling for each compression function which is great in respect of cost and time. Additionally, it can be said that the proof technique of Weimar-DM, Tandem-DM, Hirose-DM are based on Ideal Cipher Model (ICM) while we use Weak Cipher Model (WCM) tool. Davies Meyer (DM) mode is used in the above all schemes, we also made a change using Matyas Meyer Oseas (MMO) mode. It is also obvious that the proof technique of our scheme is very simple, straightforward and easy to understand.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"71 1","pages":"564-570"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86796274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Optimizing Cached Route Time-to-Live in Mobile Ad-Hoc Networks 移动Ad-Hoc网络中缓存路由生存时间优化
Q. Tran, A. Dadej
As reactive routing protocols take advantage of using recently active routes in the route cache, determining appropriate cached route Time-To-Live plays an important role in reducing the routing overhead by avoiding misrouting overhead caused by route errors. In this paper, an analytical model is presented for quantifying the bandwidth necessary to facilitate routing. Then, a numerical model for determining the optimal cached route Time-To-Live is derived to minimize the reactive routing overhead depending on network mobility and data traffic load. We show that cached route Time-To-Live should be set far shorter than that commonly seen in or recommended for simulations to save bandwidth. This paper provides a valuable insight into the fundamental limits of routing performance in MANETs in response to mobility.
由于响应式路由协议利用路由缓存中最近活动的路由,因此确定适当的缓存路由生存时间对于减少路由开销(避免由路由错误引起的误路由开销)起着重要作用。本文提出了一种分析模型,用于量化路由所需的带宽。然后,导出了确定最优缓存路由生存时间的数值模型,以最小化依赖于网络移动性和数据流量负载的响应路由开销。我们表明,缓存路由的生存时间应该设置得比通常在模拟中看到的或推荐的要短得多,以节省带宽。本文提供了一个有价值的见解,基本限制路由性能在manet响应移动性。
{"title":"Optimizing Cached Route Time-to-Live in Mobile Ad-Hoc Networks","authors":"Q. Tran, A. Dadej","doi":"10.1109/AINA.2015.185","DOIUrl":"https://doi.org/10.1109/AINA.2015.185","url":null,"abstract":"As reactive routing protocols take advantage of using recently active routes in the route cache, determining appropriate cached route Time-To-Live plays an important role in reducing the routing overhead by avoiding misrouting overhead caused by route errors. In this paper, an analytical model is presented for quantifying the bandwidth necessary to facilitate routing. Then, a numerical model for determining the optimal cached route Time-To-Live is derived to minimize the reactive routing overhead depending on network mobility and data traffic load. We show that cached route Time-To-Live should be set far shorter than that commonly seen in or recommended for simulations to save bandwidth. This paper provides a valuable insight into the fundamental limits of routing performance in MANETs in response to mobility.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"193-200"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84215265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1