首页 > 最新文献

... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security最新文献

英文 中文
Mobile Ad-Hoc Networks Applications and Its Challenges 移动Ad-Hoc网络应用及其挑战
N. Raza, Muhammad Umar Aftab, Muhammad Akbar, O. Ashraf, Muhammad Irfan
Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of autonomous collection of mobile nodes (Smart phones, Laptops, iPads, PDAs etc.). Network is self-configured to reconstruct its topology and routing table information for the exchange of data packets on the joining and leaving of each node on ad-hoc basis. This paper is based on the MANET applications and challenges. The researchers can get the overall concept of MANET as well as its applications and challenges.
移动自组织网络(MANET)是一种无基础设施的无线网络,由移动节点(智能手机、笔记本电脑、ipad、pda等)自主集合。网络是自配置的,可以在每个节点的加入和离开时重构其拓扑和路由表信息,以便交换数据包。本文是基于MANET的应用和挑战。研究人员可以得到MANET的总体概念,以及它的应用和挑战。
{"title":"Mobile Ad-Hoc Networks Applications and Its Challenges","authors":"N. Raza, Muhammad Umar Aftab, Muhammad Akbar, O. Ashraf, Muhammad Irfan","doi":"10.4236/CN.2016.83013","DOIUrl":"https://doi.org/10.4236/CN.2016.83013","url":null,"abstract":"Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of autonomous collection \u0000of mobile nodes (Smart phones, Laptops, iPads, PDAs etc.). Network is self-configured to reconstruct \u0000its topology and routing table information for the exchange of data packets on the joining \u0000and leaving of each node on ad-hoc basis. This paper is based on the MANET applications and \u0000challenges. The researchers can get the overall concept of MANET as well as its applications and \u0000challenges.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"12 1","pages":"131-136"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81976927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Cloud Computing Perceived Importance in the Middle Eastern Firms: The Cases of Jordan, Saudi Arabia and United Arab Emirates from the Operational Level 云计算在中东企业中的重要性:从运营层面看约旦、沙特阿拉伯和阿拉伯联合酋长国
R. Masa’deh
Firms need cloud computing adoption for strategic and competitive goals, generating business value, and at last gaining competitive advantage. This study reviews the literature regarding cloud computing and IT governance, and presents a research model along with its hypotheses formulation to examine the factors impacting cloud computing perceived importance in several Arab firms, specifically Jordan, Saudi Arabia and United Arab Emirates by using the integration of Technology Acceptance Model (TAM) model and Technology-Organizational-Environmental (TOE) framework as adapted from [1]. 329 returned surveys from top, middle-level IT managers, and IT employees from the operational level of the studied firms were analyzed using the structural equation modeling technique. The study found relative advantage, compatibility, complexity, organizational readiness, top management commitment, and training and education as important variables for impacting cloud computing adoption using perceived ease of use and perceived usefulness as mediating variables. The model explained 61%, 63%, and 74% of cloud computing adoption for perceived usefulness, perceived ease of use and perceived importance respectively.
企业需要采用云计算来实现战略和竞争目标,产生业务价值,并最终获得竞争优势。本研究回顾了有关云计算和IT治理的文献,并提出了一个研究模型及其假设公式,通过使用技术接受模型(TAM)模型和技术组织环境(TOE)框架(改编自[1])的集成,来研究影响云计算在几个阿拉伯公司(特别是约旦、沙特阿拉伯和阿拉伯联合酋长国)感知重要性的因素。利用结构方程建模技术对329份来自被研究企业的高层、中层IT经理和运营层IT员工的问卷进行了分析。研究发现,相对优势、兼容性、复杂性、组织准备、高层管理承诺、培训和教育是影响云计算采用的重要变量,使用感知易用性和感知有用性作为中介变量。该模型分别从感知有用性、感知易用性和感知重要性三个方面解释了61%、63%和74%的云计算采用率。
{"title":"Cloud Computing Perceived Importance in the Middle Eastern Firms: The Cases of Jordan, Saudi Arabia and United Arab Emirates from the Operational Level","authors":"R. Masa’deh","doi":"10.4236/CN.2016.83011","DOIUrl":"https://doi.org/10.4236/CN.2016.83011","url":null,"abstract":"Firms need cloud computing adoption for strategic and competitive goals, generating business value, and at last gaining competitive advantage. This study reviews the literature regarding cloud computing and IT governance, and presents a research model along with its hypotheses formulation to examine the factors impacting cloud computing perceived importance in several Arab firms, specifically Jordan, Saudi Arabia and United Arab Emirates by using the integration of Technology Acceptance Model (TAM) model and Technology-Organizational-Environmental (TOE) framework as adapted from [1]. 329 returned surveys from top, middle-level IT managers, and IT employees from the operational level of the studied firms were analyzed using the structural equation modeling technique. The study found relative advantage, compatibility, complexity, organizational readiness, top management commitment, and training and education as important variables for impacting cloud computing adoption using perceived ease of use and perceived usefulness as mediating variables. The model explained 61%, 63%, and 74% of cloud computing adoption for perceived usefulness, perceived ease of use and perceived importance respectively.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"22 1","pages":"103-117"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88107256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hybrid Algorithm to Evaluate E-Business Website Comments 电子商务网站评论评价的混合算法
Osama Rababah, A. K. Hwaitat, D. A. Qudah, R. Halaseh
Online reviews are considered of an important indicator for users to decide on the activity they wish to do, whether it is watching a movie, going to a restaurant, or buying a product. It also serves businesses as it keeps tracking user feedback. The sheer volume of online reviews makes it difficult for a human to process and extract all significant information to make purchasing choices. As a result, there has been a trend toward systems that can automatically summarize opinions from a set of reviews. In this paper, we present a hybrid algorithm that combines an auto-summarization algorithm with a sentiment analysis (SA) algorithm, to offer a personalized user experiences and to solve the semantic-pragmatic gap. The algorithm consists of six steps that start with the original text document and generate a summary of that text by choosing the N most relevant sentences in the text. The tagged texts are then processed and then passed to a Naive Bayesian classifier along with their tags as training data. The raw data used in this paper belong to the tagged corpus positive and negative processed movie reviews introduced in [1]. The measures that are used to gauge the performance of the SA and classification algorithm for all test cases consist of accuracy, recall, and precision. We describe in details both the aspect of extraction and sentiment detection modules of our system.
在线评论被认为是用户决定他们想要做的活动的重要指标,无论是看电影,去餐馆还是购买产品。它还为企业提供服务,因为它可以跟踪用户反馈。大量的在线评论使得人类很难处理和提取所有重要信息来做出购买选择。因此,出现了一种趋势,即系统可以自动从一组评论中总结意见。在本文中,我们提出了一种将自动摘要算法与情感分析(SA)算法相结合的混合算法,以提供个性化的用户体验并解决语义-语用差距。该算法由六个步骤组成,从原始文本文档开始,通过选择文本中最相关的N个句子来生成该文本的摘要。然后对标记的文本进行处理,然后将其与标记一起作为训练数据传递给朴素贝叶斯分类器。本文使用的原始数据属于文献[1]中引入的带标签的正负处理影评语料库。用于衡量所有测试用例的SA和分类算法的性能的度量包括准确性、召回率和精度。对系统的情感提取模块和情感检测模块进行了详细的描述。
{"title":"Hybrid Algorithm to Evaluate E-Business Website Comments","authors":"Osama Rababah, A. K. Hwaitat, D. A. Qudah, R. Halaseh","doi":"10.4236/CN.2016.83014","DOIUrl":"https://doi.org/10.4236/CN.2016.83014","url":null,"abstract":"Online reviews are considered of an important indicator for users to decide on the activity they wish to do, whether it is watching a movie, going to a restaurant, or buying a product. It also serves businesses as it keeps tracking user feedback. The sheer volume of online reviews makes it difficult for a human to process and extract all significant information to make purchasing choices. As a result, there has been a trend toward systems that can automatically summarize opinions from a set of reviews. In this paper, we present a hybrid algorithm that combines an auto-summarization algorithm with a sentiment analysis (SA) algorithm, to offer a personalized user experiences and to solve the semantic-pragmatic gap. The algorithm consists of six steps that start with the original text document and generate a summary of that text by choosing the N most relevant sentences in the text. The tagged texts are then processed and then passed to a Naive Bayesian classifier along with their tags as training data. The raw data used in this paper belong to the tagged corpus positive and negative processed movie reviews introduced in [1]. The measures that are used to gauge the performance of the SA and classification algorithm for all test cases consist of accuracy, recall, and precision. We describe in details both the aspect of extraction and sentiment detection modules of our system.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"46 1","pages":"137-143"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83957320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Automated Approach for Software Fault Detection and Recovery 软件故障检测与恢复的自动化方法
A. Hudaib, H. Fakhouri
Autonomic software recovery enables software to automatically detect and recover software faults. This feature makes the software to run more efficiently, actively, and reduces the maintenance time and cost. This paper proposes an automated approach for Software Fault Detection and Recovery (SFDR). The SFDR detects the cases if a fault occurs with software components such as component deletion, replacement or modification, and recovers the component to enable the software to continue its intended operation. The SFDR is analyzed and implemented in parallel as a standalone software at the design phase of the target software. The practical applicability of the proposed approach has been tested by implementing an application demonstrating the performance and effectiveness of the SFDR. The experimental results and the comparisons with other works show the effectiveness of the proposed approach.
软件自动恢复是指软件能够自动检测和恢复软件故障。该特性使软件运行更加高效、主动,减少了维护时间和成本。提出了一种软件故障检测与恢复(SFDR)的自动化方法。当软件部件发生删除、更换、修改等故障时,SFDR能够检测到故障,并对故障部件进行恢复,使软件能够正常运行。在目标软件的设计阶段,将SFDR作为独立软件并行分析和实现。提出的方法的实际适用性已经通过实施一个应用程序来验证SFDR的性能和有效性。实验结果和与其他研究成果的比较表明了该方法的有效性。
{"title":"An Automated Approach for Software Fault Detection and Recovery","authors":"A. Hudaib, H. Fakhouri","doi":"10.4236/CN.2016.83016","DOIUrl":"https://doi.org/10.4236/CN.2016.83016","url":null,"abstract":"Autonomic software recovery enables software to automatically detect and recover software faults. This feature makes the software to run more efficiently, actively, and reduces the maintenance time and cost. This paper proposes an automated approach for Software Fault Detection and Recovery (SFDR). The SFDR detects the cases if a fault occurs with software components such as component deletion, replacement or modification, and recovers the component to enable the software to continue its intended operation. The SFDR is analyzed and implemented in parallel as a standalone software at the design phase of the target software. The practical applicability of the proposed approach has been tested by implementing an application demonstrating the performance and effectiveness of the SFDR. The experimental results and the comparisons with other works show the effectiveness of the proposed approach.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"211 1","pages":"158-169"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76499686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Low-Load QoS Routing Method for OpenFlow Networks OpenFlow网络的低负载QoS路由方法
Shinnosuke Kimura, Kenya Sato
As the volume of Internet traffic continues to grow, there is a need for mechanisms that ensure communication quality that is suitable for different applications. OpenFlow implements per-flow routing control but can have adverse effects on communication quality when the number of flow entries is increased. In this study, we propose a routing method that controls traffic flows by labeling them with numbers representing the source switch, destination switch and required communication quality. The OpenFlow controller then sets up flow entries on a per-label basis rather than on a per-flow basis, allowing it to reduce the number of flow entries. In an evaluation test, we confirmed that the labeling method could prevent this reduction in communication quality.
随着Internet通信量的持续增长,需要一种机制来确保适合不同应用程序的通信质量。OpenFlow实现了逐流路由控制,但当流项数量增加时,可能会对通信质量产生不利影响。在这项研究中,我们提出了一种路由方法,通过标记代表源交换机、目的交换机和所需通信质量的数字来控制流量。然后,OpenFlow控制器以每个标签为基础而不是以每个流为基础设置流项,从而允许它减少流项的数量。在评估测试中,我们证实了标记方法可以防止这种通信质量的降低。
{"title":"A Low-Load QoS Routing Method for OpenFlow Networks","authors":"Shinnosuke Kimura, Kenya Sato","doi":"10.4236/CN.2016.83015","DOIUrl":"https://doi.org/10.4236/CN.2016.83015","url":null,"abstract":"As the volume of Internet traffic continues to grow, there is a need for mechanisms that ensure \u0000communication quality that is suitable for different applications. OpenFlow implements per-flow \u0000routing control but can have adverse effects on communication quality when the number of flow \u0000entries is increased. In this study, we propose a routing method that controls traffic flows by labeling \u0000them with numbers representing the source switch, destination switch and required communication \u0000quality. The OpenFlow controller then sets up flow entries on a per-label basis rather \u0000than on a per-flow basis, allowing it to reduce the number of flow entries. In an evaluation test, we \u0000confirmed that the labeling method could prevent this reduction in communication quality.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"30 1","pages":"144-157"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90790958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Reusability Classification and Predication Using Self-Organizing Map (SOM) 基于自组织映射的软件可重用性分类与预测
A. Hudaib, Ammar Huneiti, Islam M. Othman
Due to rapid development in software industry, it was necessary to reduce time and efforts in the software development process. Software Reusability is an important measure that can be applied to improve software development and software quality. Reusability reduces time, effort, errors, and hence the overall cost of the development process. Reusability prediction models are established in the early stage of the system development cycle to support an early reusability assessment. In Object-Oriented systems, Reusability of software components (classes) can be obtained by investigating its metrics values. Analyzing software metric values can help to avoid developing components from scratch. In this paper, we use Chidamber and Kemerer (CK) metrics suite in order to identify the reuse level of object-oriented classes. Self-Organizing Map (SOM) was used to cluster datasets of CK metrics values that were extracted from three different java-based systems. The goal was to find the relationship between CK metrics values and the reusability level of the class. The reusability level of the class was classified into three main categorizes (High Reusable, Medium Reusable and Low Reusable). The clustering was based on metrics threshold values that were used to achieve the experiments. The proposed methodology succeeds in classifying classes to their reusability level (High Reusable, Medium Reusable and Low Reusable). The experiments show how SOM can be applied on software CK metrics with different sizes of SOM grids to provide different levels of metrics details. The results show that Depth of Inheritance Tree (DIT) and Number of Children (NOC) metrics dominated the clustering process, so these two metrics were discarded from the experiments to achieve a successful clustering. The most efficient SOM topology [2 × 2] grid size is used to predict the reusability of classes.
由于软件行业的快速发展,减少软件开发过程中的时间和精力是必要的。软件可重用性是提高软件开发和软件质量的重要手段。可重用性减少了时间、精力、错误,从而减少了开发过程的总成本。在系统开发周期的早期阶段建立可重用性预测模型,以支持早期的可重用性评估。在面向对象系统中,软件组件(类)的可重用性可以通过调查其度量值来获得。分析软件度量值可以帮助避免从头开始开发组件。在本文中,我们使用Chidamber和Kemerer (CK)度量套件来识别面向对象类的重用级别。使用自组织映射(SOM)对从三个不同的基于java的系统中提取的CK度量值数据集进行聚类。目标是找到CK度量值和类的可重用性级别之间的关系。类的可重用性级别分为三个主要类别(高可重用、中等可重用和低可重用)。聚类基于用于实现实验的度量阈值。该方法成功地将类划分为可重用性级别(高可重用、中等可重用和低可重用)。实验表明,SOM可以应用于具有不同大小SOM网格的软件CK度量,以提供不同级别的度量细节。结果表明,继承树深度(Depth of Inheritance Tree, DIT)和子节点数(Number of Children, NOC)指标在聚类过程中占主导地位,因此为了实现成功的聚类,可以将这两个指标从实验中剔除。最有效的SOM拓扑[2 × 2]网格大小用于预测类的可重用性。
{"title":"Software Reusability Classification and Predication Using Self-Organizing Map (SOM)","authors":"A. Hudaib, Ammar Huneiti, Islam M. Othman","doi":"10.4236/CN.2016.83018","DOIUrl":"https://doi.org/10.4236/CN.2016.83018","url":null,"abstract":"Due to rapid development in software industry, it was necessary to reduce time and efforts in the \u0000software development process. Software Reusability is an important measure that can be applied \u0000to improve software development and software quality. Reusability reduces time, effort, errors, \u0000and hence the overall cost of the development process. Reusability prediction models are established \u0000in the early stage of the system development cycle to support an early reusability assessment. \u0000In Object-Oriented systems, Reusability of software components (classes) can be obtained \u0000by investigating its metrics values. Analyzing software metric values can help to avoid developing \u0000components from scratch. In this paper, we use Chidamber and Kemerer (CK) metrics suite in order \u0000to identify the reuse level of object-oriented classes. Self-Organizing Map (SOM) was used to \u0000cluster datasets of CK metrics values that were extracted from three different java-based systems. \u0000The goal was to find the relationship between CK metrics values and the reusability level of the \u0000class. The reusability level of the class was classified into three main categorizes (High Reusable, \u0000Medium Reusable and Low Reusable). The clustering was based on metrics threshold values that \u0000were used to achieve the experiments. The proposed methodology succeeds in classifying classes \u0000to their reusability level (High Reusable, Medium Reusable and Low Reusable). The experiments \u0000show how SOM can be applied on software CK metrics with different sizes of SOM grids to provide \u0000different levels of metrics details. The results show that Depth of Inheritance Tree (DIT) and \u0000Number of Children (NOC) metrics dominated the clustering process, so these two metrics were \u0000discarded from the experiments to achieve a successful clustering. The most efficient SOM topology \u0000[2 × 2] grid size is used to predict the reusability of classes.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"499 1","pages":"179-192"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85513010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Factors Affecting the Intention of Adopting Cloud Computing in Jordanian Hospitals 影响约旦医院采用云计算意愿的因素
Osama Harfoushi, A. H. Akhorshaideh, N. Aqqad, Marwa Na’el Khalil Al Janini, Ruba Obiedat
The purpose of this study is to examine the different factors that are expected to influence the intention of hospitals to adopt cloud computing in Jordan. This study is conducted using quatititative methodology. 223 questionnaires were distributed to the IT departments of different hospitals to evaluate their ability and willingness to adopt cloud computing. The data were tested using multiple regression in order to determine whether Technology, Organizational, and Environmental factors (TOE) played a role in hospitals’ decision to consider cloud computing as a beneficial investment. The findings of this study showed that all the factors had a significant positive impact on the intention of hospitals to adopt cloud computing, with the Technological factor having the most impact on the decision made.
本研究的目的是研究预计会影响约旦医院采用云计算意愿的不同因素。本研究采用定量方法进行。向不同医院的IT部门发放223份问卷,评估其采用云计算的能力和意愿。使用多元回归对数据进行测试,以确定技术、组织和环境因素(TOE)是否在医院决定将云计算视为有益投资的过程中发挥作用。本研究结果表明,所有因素都对医院采用云计算的意愿有显著的正向影响,其中技术因素对决策的影响最大。
{"title":"Factors Affecting the Intention of Adopting Cloud Computing in Jordanian Hospitals","authors":"Osama Harfoushi, A. H. Akhorshaideh, N. Aqqad, Marwa Na’el Khalil Al Janini, Ruba Obiedat","doi":"10.4236/CN.2016.82010","DOIUrl":"https://doi.org/10.4236/CN.2016.82010","url":null,"abstract":"The purpose of this study is to examine the different factors that are expected to influence the intention of hospitals to adopt cloud computing in Jordan. This study is conducted using quatititative methodology. 223 questionnaires were distributed to the IT departments of different hospitals to evaluate their ability and willingness to adopt cloud computing. The data were tested using multiple regression in order to determine whether Technology, Organizational, and Environmental factors (TOE) played a role in hospitals’ decision to consider cloud computing as a beneficial investment. The findings of this study showed that all the factors had a significant positive impact on the intention of hospitals to adopt cloud computing, with the Technological factor having the most impact on the decision made.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"121 1","pages":"88-101"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75867714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Protection Strategies against Cascading Failure for Power Systems of Ring Network 环网电力系统级联故障保护策略
Arun K. Kumar, H. Y. Shwe, P. Chong
Power grid vulnerability is a key issue with large blackouts, causing power disruption for millions of people. The complexity of power grid, together with excessive number of components, makes it difficult to be modeled. Currently, researchers use complex networks to model and study the performance of power grids. In fact, power grids can be modeled into a complex network by making use of ring network topology, with substations and transmission lines denoted as nodes and edges, respectively. In this paper, three protection schemes are proposed and their effectiveness in protecting the power network under high and low-load attacks is studied. The proposed schemes, namely, Cascaded Load Cut-off (CLC), Cascaded Load Overflow (CLO) and Adaptive-Cascaded Load Overflow (A-CLO), improve the robustness of the power grids, i.e., decrease the value of critical tolerance. Simulation results show that CLC and CLO protection schemes are more effective in improving the robustness of networks than the A-CLO protection scheme. However, the CLC protection scheme is effective only at the expense that certain percentage of the network will have no power supply. Thus, results show that the CLO protection scheme dominates the other protection schemes, CLC and A-CLO, in terms of the robustness of the network, improved with the precise amount of load cut-off determined.
电网的脆弱性是大停电的一个关键问题,大停电会给数百万人造成电力中断。电网的复杂性和组成部分的过多,给电网建模带来了困难。目前,研究人员使用复杂网络来建模和研究电网的性能。实际上,电网可以采用环网拓扑将电网建模为一个复杂的网络,将变电站和输电线路分别表示为节点和边。本文提出了三种保护方案,并研究了它们在高负荷和低负荷攻击下保护电网的有效性。本文提出的级联负载截止(CLC)、级联负载溢出(CLO)和自适应级联负载溢出(A-CLO)方案提高了电网的鲁棒性,即降低了临界容限值。仿真结果表明,CLC和CLO保护方案比A-CLO保护方案更有效地提高了网络的鲁棒性。然而,CLC保护方案只有在一定比例的网络没有供电的情况下才有效。因此,结果表明,CLO保护方案优于其他保护方案,CLC和A-CLO在网络的鲁棒性方面,随着负载截止的精确量的确定而提高。
{"title":"Protection Strategies against Cascading Failure for Power Systems of Ring Network","authors":"Arun K. Kumar, H. Y. Shwe, P. Chong","doi":"10.4236/CN.2016.82008","DOIUrl":"https://doi.org/10.4236/CN.2016.82008","url":null,"abstract":"Power grid vulnerability is a key issue with large blackouts, causing power disruption for millions of people. The complexity of power grid, together with excessive number of components, makes it difficult to be modeled. Currently, researchers use complex networks to model and study the performance of power grids. In fact, power grids can be modeled into a complex network by making use of ring network topology, with substations and transmission lines denoted as nodes and edges, respectively. In this paper, three protection schemes are proposed and their effectiveness in protecting the power network under high and low-load attacks is studied. The proposed schemes, namely, Cascaded Load Cut-off (CLC), Cascaded Load Overflow (CLO) and Adaptive-Cascaded Load Overflow (A-CLO), improve the robustness of the power grids, i.e., decrease the value of critical tolerance. Simulation results show that CLC and CLO protection schemes are more effective in improving the robustness of networks than the A-CLO protection scheme. However, the CLC protection scheme is effective only at the expense that certain percentage of the network will have no power supply. Thus, results show that the CLO protection scheme dominates the other protection schemes, CLC and A-CLO, in terms of the robustness of the network, improved with the precise amount of load cut-off determined.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"97 1","pages":"67-78"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85064224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Colluding Jamming Attack on a Grand Coalition by Aggrieved Nodes 愤懑节点对大联盟的串通干扰攻击
A. Sharah, T. Oyedare, S. Shetty
Mobile Ad-Hoc Networks (MANETs) are highly vulnerable to insider jamming attacks. Several approaches to detect insider jammers in MANET have been proposed. However, once the insider jammer is detected and removed from the network, it is possible for the insider jammer to leverage the knowledge of insider information to launch a future attack. In this paper, we focus on collaborative smart jamming attacks, where the attackers who have been detected as insider jammers in a MANET, return to attack the MANET based on the knowledge learned. The MANET uses a reputation-based coalition game to detect insider jammers. In the collaborative smart jamming attack, two or more smart jammers will form a coalition to attack the coalitions in the MANET. The smart jammers were detected and then excluded from their initial coalition, they then regrouped to start their own coalition and share previously gained knowledge about legitimate nodes in their erstwhile coalition with the aim of achieving a highly coordinated successful jamming attack on the legitimate coalition. The success of the attack largely depends on the insider jammer’s collective knowledge about the MANET. We present a technique to appropriately represent knowledge gathered by insider jammers which would lead to a successful attack. Simulation results in NS2 depict that coalition of jammers can leverage past knowledge to successfully attack MANET.
移动自组网(manet)极易受到内部干扰攻击。提出了几种检测自组网内部干扰的方法。然而,一旦内部干扰器被检测到并从网络中移除,内部干扰器就有可能利用内部信息的知识发动未来的攻击。在本文中,我们重点研究协同智能干扰攻击,其中攻击者在被检测到是MANET中的内部干扰者后,根据所学的知识返回攻击MANET。MANET使用基于声誉的联盟游戏来检测内部干扰者。在协同智能干扰攻击中,两个或多个智能干扰机将形成一个联盟来攻击在MANET中的联盟。智能干扰者被检测到,然后被排除在他们最初的联盟之外,然后他们重新组合,开始他们自己的联盟,并分享他们以前联盟中合法节点的知识,目的是实现对合法联盟的高度协调成功的干扰攻击。攻击的成功很大程度上取决于内部干扰者对无线局域网的集体知识。我们提出了一种技术,以适当地表示内部干扰者收集的知识,这将导致成功的攻击。NS2的仿真结果表明,干扰者联盟可以利用过去的知识成功攻击MANET。
{"title":"Colluding Jamming Attack on a Grand Coalition by Aggrieved Nodes","authors":"A. Sharah, T. Oyedare, S. Shetty","doi":"10.4236/CN.2016.82007","DOIUrl":"https://doi.org/10.4236/CN.2016.82007","url":null,"abstract":"Mobile Ad-Hoc Networks (MANETs) are highly vulnerable to insider jamming \u0000attacks. Several approaches to detect insider jammers in MANET have been \u0000proposed. However, once the insider jammer is detected and removed from the \u0000network, it is possible for the insider jammer to leverage the knowledge of \u0000insider information to launch a future attack. In this paper, we focus on collaborative \u0000smart jamming attacks, where the attackers who have been detected as insider jammers \u0000in a MANET, return to attack the MANET based on the knowledge learned. The \u0000MANET uses a reputation-based coalition game to detect insider jammers. In the \u0000collaborative smart jamming attack, two or more smart jammers will form a \u0000coalition to attack the coalitions in the MANET. The smart jammers were \u0000detected and then excluded from their initial coalition, they then regrouped to \u0000start their own coalition and share previously gained knowledge about \u0000legitimate nodes in their erstwhile coalition with the aim of achieving a \u0000highly coordinated successful jamming attack on the legitimate coalition. The \u0000success of the attack largely depends on the insider jammer’s collective \u0000knowledge about the MANET. We present a technique to appropriately represent \u0000knowledge gathered by insider jammers which would lead to a successful attack. \u0000Simulation results in NS2 depict that coalition of jammers can leverage past \u0000knowledge to successfully attack MANET.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"20 1","pages":"57-66"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82422625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Load Sensitive Power Saving Technique for 4G Mobile Network under Limited User Traffic 有限用户流量下4G移动网络的负载敏感省电技术
M. Hossain, Mohammad Imdadul Islam, M. Amin
Power saving is one of the key factors of emerging 4G mobile network as well as in IEEE 802.16e wireless metropolitan area networks (Wireless MAN). An efficient power saving mechanism is the heart for the guarantee of a long operating lifetime for a mobile subscriber station (MS), because MSs are normally driven by rechargeable batteries. It is a vital factor for Base Station (BS) of the same network. One of the most important features of 5G mobile is the extension of battery energy 10 times greater than the present days. In this context, the evaluation of duration of sleep mode of BS or MS based on traffic load of a network is now a new era of research work. In this paper, such analysis has been done based on two statistical models: Poisson’s pdf and Engset pdf. The concept of complete sharing and partitioning of user group of teletraffic engineering is applied to measure the possibility of getting leisure time of BS or MS. Both the traffic models used in the paper are applicable in both limited and unlimited user network, i.e. in micro and fem to cellular network of 4G and 5G.
节能是新兴的4G移动网络以及IEEE 802.16e无线城域网(wireless MAN)的关键因素之一。由于移动用户站通常由可充电电池驱动,因此高效的节能机制是保证移动用户站长使用寿命的核心。对于同一网络的基站(BS)来说,它是一个至关重要的因素。5G手机最重要的特点之一是电池能量的延长时间是现在的10倍。在此背景下,基于网络流量负荷评估BS或MS的睡眠模式持续时间是一个新的研究工作。本文采用Poisson’s pdf和Engset pdf两种统计模型进行分析。采用电信业务工程中用户群完全共享和划分的概念来度量BS或ms获得闲暇时间的可能性。本文所采用的流量模型既适用于有限用户网络,也适用于无限用户网络,即4G和5G的微蜂窝网络和fem蜂窝网络。
{"title":"Load Sensitive Power Saving Technique for 4G Mobile Network under Limited User Traffic","authors":"M. Hossain, Mohammad Imdadul Islam, M. Amin","doi":"10.4236/CN.2016.82009","DOIUrl":"https://doi.org/10.4236/CN.2016.82009","url":null,"abstract":"Power saving is one of the key factors of emerging 4G mobile network as well as in IEEE 802.16e \u0000wireless metropolitan area networks (Wireless MAN). An efficient power saving mechanism is the \u0000heart for the guarantee of a long operating lifetime for a mobile subscriber station (MS), because \u0000MSs are normally driven by rechargeable batteries. It is a vital factor for Base Station (BS) of the \u0000same network. One of the most important features of 5G mobile is the extension of battery energy \u000010 times greater than the present days. In this context, the evaluation of duration of sleep mode of \u0000BS or MS based on traffic load of a network is now a new era of research work. In this paper, such \u0000analysis has been done based on two statistical models: Poisson’s pdf and Engset pdf. The concept \u0000of complete sharing and partitioning of user group of teletraffic engineering is applied to measure \u0000the possibility of getting leisure time of BS or MS. Both the traffic models used in the paper are applicable \u0000in both limited and unlimited user network, i.e. in micro and fem to cellular network of 4G \u0000and 5G.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"47 1","pages":"79-87"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86309997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1