The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to the improvement of data mining technologies, big data now is a hot topic in various areas, such as Internet, finance, healthcare etc. As well as known, big data is collected and accumulated across a wide variety of fields fast and in real time. It is very important to find the structure from big data. In this paper, we focus on the neral network algorithm, Growing Hierarchical Self-Organizing...
Distributed Denial-of-Service (DDoS) attacks are a great threat to the Internet. Enabling accurately detection of Distribute Denial-of-Service attacks is important because it is the foundation of defense against the attacks. In this paper, we focus on the distribution difference of the packet size between normal traffic flows and attack traffic flows and propose an entropy-based detection measurement...
The BGP-based inter-domain routing system plays an important role in the Internet. Not only the performance of data forwarding, but also the topology, robustness, and security of the Internet severely rely on inter-domain routing system. However, the BGP has design flaws, which result in many serious security issues for interdomain routing system. This paper analyzes the vulnerabilities and security...
This research evaluated the cyber security effectiveness of the intrusion prevention system for Voice over Internet Protocol (VoIP) focusing on the defense of Denial of Service (DoS) which propose to disturb server providing VoIP services. This will give a strong impact on entrepreneurs. Intrusion prevention system (IPS) has been employed based on Snort software, this study as a preventive technique...
Vehicular Ad-hoc Network (VANET) is an emerging technology which allows vehicles on the roads to communicate and exchange information with each other. Broadcast in VANET has gained a lot of attention because it is used extensively in many VANET applications. Recently, Cell Broadcast for streets (CB-S) [1], a cell based algorithm has been proposed and compared favorably to different class of broadcast...
Recently wireless sensor networks have received increasing attention from the research community. Many applications based on these networks will be realized in the near future. Monitoring a moving object using sensor nodes is one such important application. The focus in this paper is on-site tracking in the context of wireless sensor networks. After formally characterizing this problem for single...
This correspondence provides a new method for the optimal design of transmit pattern synthesis of MIMO radar using independent mainlobe and sidelobe constraints. Given fixed pattern mainlobe errors, we apply quadratic inequality constraint to sidelobe level. In order to enable the resulting covariance matrix to fulfill the practical uniform elemental power constraint, a basis set is constructed which...
In Rechargeable Wireless Sensor Networks (R-WSNs), it is critical for higher data collection rate because sensors have to operate in a very low duty cycle owing to sporadic availability of energy. Therefore, surplus energy of a node can be utilized for strengthening packet delivery efficiency and improving data collection rate for all sensors. In this work, we propose a distributed algorithm to compute...
The node localization process of the traditional DV-Hop scheme is sensitive to the heterogeneity of network topology, and the robustness of the scheme is poor while the network topology is diversiform due to random node deployment. Aiming at such a problem, an improvement strategy is put forward, and different treatment algorithms are introduced in the distance estimation step and the position calculation...
The aim of mobility management is to track the location of user equipment (UE). Many location management methods have been proposed and they could be classified into several categories: the distance based method, time based method, and movement based method. These methods only consider the mobility of UEs. When the telephonic traffic increases, the performance of these methods may decrease significantly...
With the popularization of portable devices equipped with wireless communication capability, Mobile Delay Tolerant Network (MDTN) gets extensive attention of scholars. Infrastructureless networking with portable devices has become a typical scenario in MDTN. With regard to the infrastructureless MDTN scenario composed by portable devices, we propose a social-aware hierarchical multicast distribution...
Since user equipment (UE) has to obtain the cell identification (cell ID) and timing information to start the communication with base station, cell search is the initial step in cellular systems. The research of 5G has been started to improve the performance of wireless communication. A new scenario named ultra-dense network (UDN) has been introduced and there will be more access nodes per unit area...
A novel circularly polarized dual frequency band quasiannular-ring slot antenna is proposed and investigated. The dual frequency bands are obtained by a series microstrip-line-feed configuration electromagnetically coupling to the asymmetric quasi-annular ring slot and the asymmetry is introduced by adding dented structure at the corner of the ring slot (Φ = 45 ). The proposed dual-band CP antenna...
Nowadays, multi-hop communication systems are often applied in power transmission system to transmit surveillance information to control center. In order to transmit surveillance data more efficiently, it is required to design the communication system with low latency and high reliability. This paper provides a novel data transmission framework along with a QoS provisioning multi-hop routing scheme...
With the development of Mobile Internet and the rapid growth of mobile social communication and mobile video, the network scale has been growing rapidly and the energy consumption is too huge to be ignored. Current estimates indicate that Information and Communication Technology (ICT) is responsible for a fraction of the global energy consumption ranging between 1% and 2%, among which, the consumption...
Software Defined Network (SDN) is an emerging architecture which can simplify network management and enable innovation through network programmability by decoupling the control plan and the data plan of the network. However, traditional SDN architecture is not suitable for all cases; a single controller may become a performance bottleneck in a wide area network. While current multiple controller solutions...
In this paper, an optional architecture of wireless mesh networks based on the IEEE 802.11s draft is proposed and implemented which aims at providing a low-cost, secure and wide-range wireless WLAN-mesh network in the real life. In order to validate the security and practicality of the new architecture, a testbed is deployed which consists of six mesh access points (MAPs) and one mesh portal point...
In order to avoid data loss when user's mobile device is stolen or lost, users are encouraged to use mobile cloud storage to transfer and store the data from mobile terminals to the cloud as a means of data backup. Although various encryption mechanisms have been proposed to protect the security in cloud side by cloud service providers, the traditional cloud systems still cannot persuade the users...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.