34 research outputs found

    A fuzzy-based reliability system for JXTA-overlay P2P platform considering as new parameter sustained communication time

    Get PDF
    (c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.In this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) Communications in JXTA-Overlay platform considering as a new parameter the sustained communication time. In our system, we considered four input parameters: Data Download Speed (DDS), Local Score (LS), Number of Interactions (NI) and Sustained Communication Time (SCT) to decide the Peer Reliability (PR). We evaluate the proposed system by computer simulations. The simulation results have shown that the proposed system has a good performance and can choose reliable peers to connect in JXTA-Overlay platform.Peer ReviewedPostprint (author's final draft

    Implementation of a new replacement method in WMN-PSO simulation system and its performance evaluation

    Get PDF
    (c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.With the fast development of wireless technologies, Wireless Mesh Networks (WMNs) are becoming an important networking infrastructure due to their low cost and increased high speed wireless Internet connectivity. In our previous work, we implemented the Linearly Decreasing Vmax Method (LDVM) for our WMN-PSO simulation system. In this paper, we implement a new replacement method for mesh routers called Rational Decrement of Vmax Method (RDVM). We use Size of Giant Component (SGC) and Number of Covered Mesh Clients (NCMC) as metrics for optimization. From the simulation results, we found that RDVM converges faster to best solution than LDVM.Peer ReviewedPostprint (author's final draft

    Routing Protocols for Underwater Acoustic Sensor Networks: A Survey from an Application Perspective

    Get PDF
    Underwater acoustic communications are different from terrestrial radio communications; acoustic channel is asymmetric and has large and variable end‐to‐end propagation delays, distance‐dependent limited bandwidth, high bit error rates, and multi‐path fading. Besides, nodes’ mobility and limited battery power also cause problems for networking protocol design. Among them, routing in underwater acoustic networks is a challenging task, and many protocols have been proposed. In this chapter, we first classify the routing protocols according to application scenarios, which are classified according to the number of sinks that an underwater acoustic sensor network (UASN) may use, namely single‐sink, multi‐sink, and no‐sink. We review some typical routing strategies proposed for these application scenarios, such as cross‐layer and reinforcement learning as well as opportunistic routing. Finally, some remaining key issues are highlighted

    A service-oriented middleware for integrated management of crowdsourced and sensor data streams in disaster management

    Get PDF
    The increasing number of sensors used in diverse applications has provided a massive number of continuous, unbounded, rapid data and requires the management of distinct protocols, interfaces and intermittent connections. As traditional sensor networks are error-prone and difficult to maintain, the study highlights the emerging role of “citizens as sensors” as a complementary data source to increase public awareness. To this end, an interoperable, reusable middleware for managing spatial, temporal, and thematic data using Sensor Web Enablement initiative services and a processing engine was designed, implemented, and deployed. The study found that its approach provided effective sensor data-stream access, publication, and filtering in dynamic scenarios such as disaster management, as well as it enables batch and stream management integration. Also, an interoperability analytics testing of a flood citizen observatory highlighted even variable data such as those provided by the crowd can be integrated with sensor data stream. Our approach, thus, offers a mean to improve near-real-time applications

    サーバクラスタでの低消費電力化のための移行モデルの研究

    Get PDF
    博士(工学)法政大学 (Hosei University

    A Review of Quality of Service Issues in Internet of Vehicles (IoV)

    Get PDF
    Recent years compared to the current scenario, the explosive growth of devices connected and controlled by internet is the major significance of internet of things (iot). One such big example is automotive industry. This industry has the potential to become an iot champion among other industries and fuel the iot cloud services adoption among car owners and walkers alike. Vehicles are progressively being associated with the internet of things which empower them to give universal access to data to drivers and travellers while moving. As the connectivity of vehicles keeps increasing in numbers, traditional concepts of vehicles has to be introduced with new layers which includes versatile data transfer among vehicles, consistency, security, toughness, humans and roadside frameworks of vehicular systems shall be taken into consideration. In this unique situation, the first idea of vehicular ad-hoc networks(vanets) is being changed into another idea called internet of vehicles(iov).the advent of iot has changed the traditional vehicular networks in to intelligent vehicular networks called internet of vehicles. Each entity in iov is connected to the internet. In iov, each vehicle is responsible for transmitting and receiving the information. In an environment where vehicles are mobile and at the same time exchanging information to ensure safe driving on the roads and to minimize road accidents. It is very necessary to provide better services within the limited accessibilities. Hence qos plays a vital role in iov. This paper addresses the qos challenges and its significance in iov. Also, this paper also discusses the measurement parameters that could deliberately effect the performance of iov

    it could rain weather forecasting as a reasoning process

    Get PDF
    Abstract Meteorological forecasting is the process of providing reliable prediction about the future weathear within a given interval of time. Forecasters adopt a model of reasoning that can be mapped onto an integrated conceptual framework. A forecaster essentially precesses data in advance by using some models of machine learning to extract macroscopic tendencies such as air movements, pressure, temperature, and humidity differentials measured in ways that depend upon the model, but fundamentally, as gradients. Limit values are employed to transform these tendencies in fuzzy values, and then compared to each other in order to extract indicators, and then evaluate these indicators by means of priorities based upon distance in fuzzy values. We formalise the method proposed above in a workflow of evaluation steps, and propose an architecture that implements the reasoning techniques

    Large-Sample comparison of TCP congestion control mechanisms over wireless networks

    Get PDF
    As new congestion control mechanisms are developed, their performance relative to existing mechanisms needs to be understood; in particular over wireless networks. This study aimed to evaluate existing TCP congestion control mechanisms using a comprehensive and reproducible methodology designed to be representative of real world usage of wireless networks. The study sought to investigate whether any existing mechanism could provide significant performance benefits over CUBIC and be recommended for adoption. The findings of this study showed that YeAH demonstrated an increase in throughput of 3%–5% over CUBIC, with no penalty to latency. While this small improvement may assist applications requiring the highest available performance, it is unlikely that it will provide a significant improvement over existing congestion control mechanisms. As such, it is the conclusion of this study that use of alternate congestion control mechanisms would not provide noticeable improvements in performance in most applications

    Key Requirements for the Detection and Sharing of Behavioral Indicators of Compromise

    Full text link
    [EN] Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise. These indicators are the main source of tactical cyber intelligence most organizations benefit from. They are expressed in machine-readable formats, and they are easily loaded into security devices in order to protect infrastructures. However, their usefulness is very limited, specially in terms of time of life. These indicators can be useful when dealing with non-advanced actors, but they are easily avoided by advanced ones. To detect advanced actor¿s activities, an analyst must deal with behavioral indicators of compromise, which represent tactics, techniques and procedures that are not as common as the atomic and computed ones. In this paper, we analyze why these indicators are not widely used, and we identify key requirements for successful behavioral IOC detection, specification and sharing. We follow the intelligence cycle as the arranged sequence of steps for a defensive team to work, thereby providing a common reference for these teams to identify gaps in their capabilities.Villalón-Huerta, A.; Ripoll-Ripoll, I.; Marco-Gisbert, H. (2022). Key Requirements for the Detection and Sharing of Behavioral Indicators of Compromise. Electronics. 11(3):1-20. https://doi.org/10.3390/electronics1103041612011
    corecore