846,099 research outputs found

    Developed Algorithm for Increasing the Efficiency of Data Exchange in a Computer Network

    Get PDF
    This paper presents specialized means to analyze, model and research of data exchange in large-scale corporate computer network. Due to extreme complexity of corporate intranet networks and the internet has resulted in the apparent difficulties in the development of an analytical model. Thus, under these circumstances, simulation models became viable alternative to comprehend the behavior of these complex networks during data exchange. This research work examined the mode of data exchange since its perfection allows in many cases to obtain a considerable improvement of the network and also the network application performance without substantial additional expenditure. Hence, the need for this developed algorithm for increasing the efficiency of data exchange in a computer network and the appropriate topology that suite this case. Test results from the algorithm showed an average of 10 to 15% increase and occasionally 60% and above increase in data exchange efficiency without additional expenses

    An Authentication Protocol for Future Sensor Networks

    Full text link
    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.Comment: This article is accepted for the publication in "Sensors" journal. 29 pages, 15 figure

    Mapping-equivalence and oid-equivalence of single-function object-creating conjunctive queries

    Full text link
    Conjunctive database queries have been extended with a mechanism for object creation to capture important applications such as data exchange, data integration, and ontology-based data access. Object creation generates new object identifiers in the result, that do not belong to the set of constants in the source database. The new object identifiers can be also seen as Skolem terms. Hence, object-creating conjunctive queries can also be regarded as restricted second-order tuple-generating dependencies (SO tgds), considered in the data exchange literature. In this paper, we focus on the class of single-function object-creating conjunctive queries, or sifo CQs for short. We give a new characterization for oid-equivalence of sifo CQs that is simpler than the one given by Hull and Yoshikawa and places the problem in the complexity class NP. Our characterization is based on Cohen's equivalence notions for conjunctive queries with multiplicities. We also solve the logical entailment problem for sifo CQs, showing that also this problem belongs to NP. Results by Pichler et al. have shown that logical equivalence for more general classes of SO tgds is either undecidable or decidable with as yet unknown complexity upper bounds.Comment: This revised version has been accepted on 11 January 2016 for publication in The VLDB Journa

    Secure exchange of information by synchronization of neural networks

    Full text link
    A connection between the theory of neural networks and cryptography is presented. A new phenomenon, namely synchronization of neural networks is leading to a new method of exchange of secret messages. Numerical simulations show that two artificial networks being trained by Hebbian learning rule on their mutual outputs develop an antiparallel state of their synaptic weights. The synchronized weights are used to construct an ephemeral key exchange protocol for a secure transmission of secret data. It is shown that an opponent who knows the protocol and all details of any transmission of the data has no chance to decrypt the secret message, since tracking the weights is a hard problem compared to synchronization. The complexity of the generation of the secure channel is linear with the size of the network.Comment: 11 pages, 5 figure

    Cooperative Downlink Multicell Preprocessing Relying on Reduced-Rate Back-Haul Data Exchange

    No full text
    Different-complexity multicell preprocessing (MCP) schemes employing distributed signal-to-interference leakageplus-noise ratio (SILNR) precoding techniques are proposed, which require reduced back-haul data exchange in comparison with the conventional MCP structure. Our results demonstrate that the proposed structures are capable of increasing the throughput achievable in the cell-edge area while offering different geographic rate profile distributions, as well as meeting different delay requirements

    Distributed downlink multi-cell processing requiring reduced-rate back-haul data exchange

    No full text
    Different-complexity Multi-Cell Processing (MCP) schemes employing Distributed Signal-to-Interference-Leakage-plus-Noise-Ratio (SILNR) precoding techniques are proposed, which require reduced back-haul data exchange in comparison to the conventional MCP structure. Our results demonstrate that the proposed structures are capable of increasing the achievable cell-edge throughput and offering different geographic rate profile distributions as well as meeting different delay requirements

    A Predator-Prey Model with an Application to Lake Victoria Fisheries

    Get PDF
    Greater complexity in renewable resource models is achieved by acknowledging that species interact through a predator-prey relationship in which both species are harvested. The price of greater complexity is that traditional concepts, such as maximum sustained yield (MSY), have to be revised dramatically. Moreover, having chosen greater complexity, fishery biologists and other researchers must choose an explicit value for each fish, a rate of exchange of one species for every other species. Policy makers and social scientists in Tanzania, Kenya, and Uganda with a keen interest in Lake Victoria fisheries regard the resource as a tool for furthering socioeconomic goals, such as foreign exchange earnings, employment for women, and nutrition. Comparative analysis allows policy makers to understand the consequences of choosing these goals in addition to economically efficient resource use. Foreign exchange earnings, employment for women, and healthy people are other goals promulgated by Tanzania, Kenya, and Uganda in the management of Lake Victoria Fisheries. The conflicts among social goals are evident in the bioeconomic predator-prey model: a goal favoring a particular species reduces the sustainable harvest of another species. Data from Kenya are used to estimate the population dynamics equations.predator-prey, bioeconomic model, Lake Victoria, Resource /Energy Economics and Policy, Q22, Q28,
    corecore