Journal of Advances in Computer Networks最新文献

筛选
英文 中文
Application of Cloud Technology in the Management of Electronic Payslips-Brunei Case Study 云技术在电子工资单管理中的应用——文莱案例研究
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2014.V2.129
H. A. S. S. Noorfatimah, H. M. J. Norhuraizah, S. Suresh, B. M. B. Nurafiqah
{"title":"Application of Cloud Technology in the Management of Electronic Payslips-Brunei Case Study","authors":"H. A. S. S. Noorfatimah, H. M. J. Norhuraizah, S. Suresh, B. M. B. Nurafiqah","doi":"10.7763/JACN.2014.V2.129","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.129","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"68 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131924150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel Encryption in Wireless Camera Sensor Network 无线摄像机传感器网络中的信道加密
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2014.V2.95
A. .. Kishk, N. Messiha, N. El-Fishawy, Abdelrahman A. Elkafs, A. Madian
{"title":"Channel Encryption in Wireless Camera Sensor Network","authors":"A. .. Kishk, N. Messiha, N. El-Fishawy, Abdelrahman A. Elkafs, A. Madian","doi":"10.7763/JACN.2014.V2.95","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.95","url":null,"abstract":"Data security is one of the greatest problems in Wireless Camera Sensor Network. Many encryption algorithms are used for encryption purposes. A new encryption algorithm is proposed in this paper. It depends on three secret parameters and four key-updating processes. It is compared with other encryption algorithm depending on key-updating beside Chaos encryption algorithm. Correlation Coefficient (CC), Spatial Frequency )SF(, processing time, and histogram are the metrics used for comparison purpose.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132110227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Implementation of Rate-Adaptive IPTV System on DSP 速率自适应IPTV系统在DSP上的实现
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2013.V1.3
Yen-Jen Chen, Chih-Chung Wang, Jr-Jen Huang
{"title":"An Implementation of Rate-Adaptive IPTV System on DSP","authors":"Yen-Jen Chen, Chih-Chung Wang, Jr-Jen Huang","doi":"10.7763/JACN.2013.V1.3","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.3","url":null,"abstract":"Abstract—This paper proposes an implementation of rate-adaptive IPTV system on DSP. The system has a client-server based architecture. The server-side and client-side are communicated with network socket connection. The server-side hosting on the DSP platform encodes the video signal from the TV cable. The client-side using JavaScript Language decodes and plays the multimedia video of DSP server-side instantly. The video quality mechanism is controlled by network bandwidth detection to improve the video play quality. The client-side detects the used bandwidth of the video stream from the server-side. The bandwidth utilization information is sent to the server-side to adjust the video encoding rate. The DSP platform used for this work is TMS320DM6437 EVM, produced by TI, implementing H.264 and AAC Encoders. The Encoder program uses the codec source code wrapped by TI, which conforms to the xDAIS (eXpress DSP Algorithm Interoperability Standard), and it is integrated with TI DSP network developer's kit and TV tuner to implement a TV over the Internet with the channel selection control.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132115108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Programming for Minimal Cost Topology with Reliability Constraint 带可靠性约束的最小成本拓扑动态编程
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2013.V1.57
Basima Elshqeirat, S. Soh, S. Rai, M. Lazarescu
{"title":"Dynamic Programming for Minimal Cost Topology with Reliability Constraint","authors":"Basima Elshqeirat, S. Soh, S. Rai, M. Lazarescu","doi":"10.7763/JACN.2013.V1.57","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.57","url":null,"abstract":"This paper addresses an NP-hard problem, called NTD-CR, to design a minimal-cost communication network topology that satisfies a pre-defined reliability constraint. Since reliability is always a major issue in the network design, the problem is practical for critical applications requiring minimized cost. The paper formulates a dynamic programming (DP) scheme to solve NTD-CR problem. DP approach, called DPCR-ST, generates the topology using a selected set of spanning trees of the network, STXmin. We propose three greedy heuristics to generate and order only k spanning trees of the network. Each heuristic allows DPCR-ST to enumerate STXmin using only k spanning trees, which improves the time complexity while producing near optimal topology. Simulations based on fully connected networks that contain up to 2.3×109 spanning trees show the merits of ordering methods and the effectiveness of our algorithm vis-a-vis four existing state-of-the-art techniques; DPCR-ST produces 81.5% optimal results, while using only 0.77% of the spanning trees contained in network.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129996031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Trust Management Scheme for Sharing Secure Medical Images over Cloud Computing Environment 云计算环境下安全医学图像共享的信任管理方案
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2013.V1.40
Fatma E.-Z. A. Elgamal, N. A. Hikal, F. Abou-Chadi
{"title":"A Trust Management Scheme for Sharing Secure Medical Images over Cloud Computing Environment","authors":"Fatma E.-Z. A. Elgamal, N. A. Hikal, F. Abou-Chadi","doi":"10.7763/JACN.2013.V1.40","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.40","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130223268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of Data Collection Capability in a Large-Scale Smart Metering System Based on Receiver-Driven Multihop Communication 基于接收机驱动多跳通信的大型智能计量系统数据采集能力评估
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2013.V1.62
M. Sugano, Taichi Shimizu, N. Wakamiya
{"title":"Evaluation of Data Collection Capability in a Large-Scale Smart Metering System Based on Receiver-Driven Multihop Communication","authors":"M. Sugano, Taichi Shimizu, N. Wakamiya","doi":"10.7763/JACN.2013.V1.62","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.62","url":null,"abstract":"We consider a large-scale smart metering system based on intermittent receiver driven transmission and potential-based routing, both of which have been developed for wireless sensor networks. In this paper, we evaluate the performance of such a system by simulations and show that it is possible to collect 99% of data within 10 minutes in a system of 1600 nodes.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132686111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Methods Used in Computer-Assisted Bone Age Assessment of Children 计算机辅助儿童骨龄评估的方法
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2014.V2.73
S. Aydoğdu, F. Basçiftçi
{"title":"Methods Used in Computer-Assisted Bone Age Assessment of Children","authors":"S. Aydoğdu, F. Basçiftçi","doi":"10.7763/JACN.2014.V2.73","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.73","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132580174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detection of Novel-Type Brute Force Attacks Used Ephemeral Springboard IPs as CamouflageDetection of Novel-Type Brute Force Attacks Used Ephemeral Springboard IPs as Camouflage 利用短暂跳板ip作为伪装的新型暴力破解攻击检测利用短暂跳板ip作为伪装的新型暴力破解攻击检测
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2014.V2.126
Satomi Honda, Yuki Unno, Koji Maruhashi, M. Takenaka, S. Torii
{"title":"Detection of Novel-Type Brute Force Attacks Used Ephemeral Springboard IPs as CamouflageDetection of Novel-Type Brute Force Attacks Used Ephemeral Springboard IPs as Camouflage","authors":"Satomi Honda, Yuki Unno, Koji Maruhashi, M. Takenaka, S. Torii","doi":"10.7763/JACN.2014.V2.126","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.126","url":null,"abstract":"In recent years, the way of brute force attacks has become more tactical and tricky to avoid being detected by intrusion detection or prevention systems (IDS/IPS). In this paper, we show that we have detected three organized or systematic brute force attack instances from actual network monitoring logs by visualization focused on source IPs and detection time. One of the instances shows that specific terminals have been attacked used innumerable IPs for a long time. These IPs were like ephemeral because they had appeared almost only one time. We also propose a new system, DEMITASSE, for detecting such terminals in the earlier phase and mitigating the damage caused by brute force attacks used ephemeral IPs. We conduct feasibility studies with our logs and evaluate DEMITASSE can detect and mitigate that kind of attacks effectively.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127830617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Extended RBAC with Context-Based Role- Recommendation 基于上下文的角色推荐的扩展RBAC
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.18178/jacn.2018.6.1.253
Gang Liu, Shaomin Ji
{"title":"Extended RBAC with Context-Based Role- Recommendation","authors":"Gang Liu, Shaomin Ji","doi":"10.18178/jacn.2018.6.1.253","DOIUrl":"https://doi.org/10.18178/jacn.2018.6.1.253","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114678928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of H.264 Video Transmission Network Simulation H.264视频传输网络仿真的设计与实现
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.18178/JACN.2015.3.4.180
W. Lei, Hao Zheng, Wei Zhang
{"title":"Design and Implementation of H.264 Video Transmission Network Simulation","authors":"W. Lei, Hao Zheng, Wei Zhang","doi":"10.18178/JACN.2015.3.4.180","DOIUrl":"https://doi.org/10.18178/JACN.2015.3.4.180","url":null,"abstract":"To design and implement the network simulation scenario of H.264 video service based on OMNeT++ simulation platform can provide testing, validation and evaluation method for the key technologies, such as to evaluate the QoE (Quality of Experience) of network video service, to evaluate multipath transport control mechanism. Based on H.264 codec standard and RTP payload structure, real-time transmission mechanisms for H.264 video transmission frame is studied. Based on standard host structure of INET Framework, three logical entities are designed, including user agent, relay controller and relay server. The topology structure of simulation networks and logical entities are described by network description language (NED). The key is to design and implement RTP node to support H.264 service. RTP node realizes sending and receiving module in INET Framework. By importing video files and relevant configuration files, simulation of H.264 service based on OMNeT++ is conducted. The effect of delay and packet loss on quality of H.264 video session is evaluated by different network configuration parameters.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117239779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信