297 research outputs found

    Performances analysis of image encryption for medical applications

    Get PDF
    This work is interested in securing transmission of digital images on the Internet, in public or local networks such as medical images, military or biometrics (authentication retina or fingerprint). We will implement three famous algorithms which are the RSA, DES and AES. The first one uses an asymmetric method for generating the keys (public and private) hence the second and the third algorithms are symmetric cipher block and use only private key for ciphering and deciphering. The simulation results will be presented and discussed in function of two main security parameters which are the length of the information blocks and the key length. Finally, a comparative study between the three techniques is conducted in order to classify everyone by the best performances of robustness especially with the presence of different kinds of attacks

    Fast Approximation To Gaussian Obstacle Sampling For Randomized Motion Planning

    Get PDF
    International audienc

    Sampling-Based Multi-Robot Exploration

    Get PDF
    International audienceThis paper presents a new approach for collaborative multi-robot planning issues. The main problem that arises from multi-robot exploration is waiting situations. We consider that such problem involves two or more autonomous robots in an unknown environment. The mission objective is to explore the entire map, while trying to minimize its executing time. Moreover if each robot uses the same topological graph, then it uses the same exploration path that makes waiting situations arising. To solve this problem, we propose a new approach in this paper based on sampling iteratively maps to allow interactive multi-robot exploration. Our approach has been implemented in simulation and the experiments demonstrate that the overall completion time of an exploration task can be significantly reduced by our sampling-based method

    A concerted and multi-criterion approach for helping to choose a Structure- Foundation system of building

    Get PDF
    The research of the best building design requires a concerted design approach of both structure and foundation. Our work is an application of this approach. Our objective is also to create an interactive tool, which will be able to define, at the early design stages, the orientations of structure and foundation systems that satisfy as well as possible the client and the architect. If the concerns of these two actors are primarily technical and economical, they also wish to apprehend the environmental and social dimensions of their projects. Thus, this approach bases on alternative studies and on a multi-criterion analysis. In this paper, we present the context of our work, the problem formulation, which allows a concerted design of Structure and Foundation systems and the feasible solutions identifying process

    Detection and Prevention of Blackhole Attack in the AOMDV Routing Protocol

    Get PDF
    Mobile ad-hoc network is a collection of dynamically organized nodes where each node acts as a host and router. Mobile ad-hoc networks are characterized by the lack of preexisting infrastructures or centralized administration. So, they are vulnerable to several types of attacks, especially the Blackhole attack. This attack is one of the most serious attacks in this kind of mobile networks. In this type of attack, the malicious node sends a false answer indicating that it has the shortest path to the destination node by increasing the sequence number and decreasing the number of hops. This will have a significant negative impact on source nodes which send their data packets through the malicious node to the destination. This malicious node drop received data packets and absorbs all network traffic. In order overcome this problem, securing routing protocols become a very important requirement in mobile ad-hoc networks. Multipath routing protocols are among the protocols affected by the Blackhole attack. In this paper, we propose an effective and efficient technique that avoids misbehavior of Blackhole nodes and facilitates the discovery for the most reliable paths for the secure transmission of data packets between communicating nodes in the well-known Ad hoc On-demand multi-path routing protocol (AOMDV). We implement and simulate our proposed technique using the ns 2.35 simulator. We also compared on how the three routing protocols AOMDV, AOMDV under Blackhole attack (BHAOMDV), and the proposed solution to counter the Blackhole attack (IDSAOMDV) performs. The results show the degradation on how AOMDV under attack performs, it also presents similarities between normal AOMDV and the proposed solution by isolating misbehaving node which has resulted in increase the performance metrics to the standard values of the AOMDV protocol

    Link Quality and MAC-Overhead aware Predictive Preemptive Multipath Routing Protocol for Mobile Ad hoc Networks

    Get PDF
    In Ad Hoc networks, route failure may occur due to less received power, mobility, congestion and node failures. Many approaches have been proposed in literature to solve this problem, where a node predicts pre-emptively the route failure that occurs with the less received power. However, these approaches encounter some difficulties, especially in scenario without mobility where route failures may arise. In this paper, we propose an improvement of AOMDV protocol called LO-PPAOMDV (Link Quality and MAC-Overhead aware Predictive Preemptive AOMDV).  This protocol is based on new metric combine two routing metrics (Link Quality, MAC Overhead) between each node and one hop neighbor. Also we propose a cross-layer networking mechanism to distinguish between both situations, failures due to congestion or mobility, and consequently avoiding unnecessary route repair process. The LO-PPAOMDV was implemented using NS-2. The simulation results demonstrate the merits of our proposed LO-PPAOMDV with approximately 10-15% increase in the packet delivery ratio while average end-to-end delay is reduced by 20%, and normalized routing load is reduced about 45%, also with 7% increase in the throughput, when compared with PPAOMDV
    corecore