Journal of Advances in Computer Networks最新文献

筛选
英文 中文
Proposal and Evaluation of an Information Dissemination Method Based on Flooding for Energy Efficiency in Wireless Sensor Networks 基于泛洪的无线传感器网络能效信息传播方法的提出与评价
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2014.V2.96
Hiroki Oda, H. Hisamatsu, H. Noborio
{"title":"Proposal and Evaluation of an Information Dissemination Method Based on Flooding for Energy Efficiency in Wireless Sensor Networks","authors":"Hiroki Oda, H. Hisamatsu, H. Noborio","doi":"10.7763/JACN.2014.V2.96","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.96","url":null,"abstract":"energy efficient. In this paper, we propose a new flooding method-based information dissemination method that tackles the issue of energy-efficient information dissemination in WSNs. By interpreting same message broadcasts from an adjacent node to a sending node as an acknowledgment of successful message transmission, we control message broadcasts and decrease the number of messages transmitted and received. We show by means of simulations that, in contrast to the conventional flooding method, our proposed method results in an improvement in the information delivery ratio with only a marginal increase in power consumption when packet loss probability is high. We also show that our proposed method results in less energy consumption in the overall network than the flooding method when the wireless radio range is long.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129530290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reduction the Effect of Mobility in Link Transmitting Using Efficient DSR Route Cache for MANETs 基于高效DSR路由缓存的manet链路传输中移动性的影响
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2014.V2.122
A. Ayoob, Sulaiman Norrozila, Muamer N. Mohammed, M. AbdilsahibGhaida
{"title":"Reduction the Effect of Mobility in Link Transmitting Using Efficient DSR Route Cache for MANETs","authors":"A. Ayoob, Sulaiman Norrozila, Muamer N. Mohammed, M. AbdilsahibGhaida","doi":"10.7763/JACN.2014.V2.122","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.122","url":null,"abstract":"Communication between mobile users is becoming more popular than ever before due to the recent technological advances in wireless communication devices. Ad hoc networks are generally closed in that, it’s a collection of two or more devices equipped with wireless communications and networking capability; they do not connect to the Internet and are typically created between participants. This means that a formed network can be de-formed on-the-fly without the need for any system administration. Many routing protocol methods have been proposed in Mobile Ad-Hoc Network but still the challenges are to improve the routing performance. The DSR (Dynamic Source Routing) routing protocol dependent on the cache memory for every node to store the routing path from source to destination. This paper presented a new algorithm using DSR routing cache technique to improve the routing between mobile nodes to reduction the effect of mobility in link transmitting that can solve link broken problem. The simulation results show a low delay, stable link in routing and better performance in terms of Route Discovery Time. It indicates that DSR cache outperforms DSR standard and had a high quality of packet delivery.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130068480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TaAl-Lip: Application of Artificial Neural Network in Recognition of Select Tagalog Alphabet through Lip Reading 人工神经网络在唇读选择他加禄字母识别中的应用
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2014.V2.128
Oliver M. Membrere, Reynaldo M. Supan, J. Magtoto, Miles Kevin B. Galario, B. Comendador, R. Montaril
{"title":"TaAl-Lip: Application of Artificial Neural Network in Recognition of Select Tagalog Alphabet through Lip Reading","authors":"Oliver M. Membrere, Reynaldo M. Supan, J. Magtoto, Miles Kevin B. Galario, B. Comendador, R. Montaril","doi":"10.7763/JACN.2014.V2.128","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.128","url":null,"abstract":"The paper introduces TaAl–Lip: Application of Artificial Neural Network in Recognition of Select Tagalog Alphabet through Lip Reading. It is an experimental study designed to determine the accuracy of the recognition of select Tagalog alphabet or also known as the ABAKADA Alphabet. It utilized Artificial Neural Network (ANN), Computer Vision (CV), Macropixelling, and Image Processing (IP) to develop a tool that can recognize mouth’s movement by means of lip reading. After the tool was developed the degree of accuracy of the recognition of the application was evaluated by the proponents according to the: (a) light orientation; (b) viewing angle and (c) the user’s distance from the camera. Based on the experiment conducted, the researchers concluded that the mouth’s movement is most recognizable with a front side light orientation with an average of 70.34%.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130804914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimizing Rule on Open Source Firewall Using Content and PCRE Combination 基于内容和PCRE组合的开源防火墙规则优化
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.18178/JACN.2015.3.4.188
G. B. Satrya, S. Shin
{"title":"Optimizing Rule on Open Source Firewall Using Content and PCRE Combination","authors":"G. B. Satrya, S. Shin","doi":"10.18178/JACN.2015.3.4.188","DOIUrl":"https://doi.org/10.18178/JACN.2015.3.4.188","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126393493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis of the Effect of Clustering the Training Data in Naive Bayes Classifier for Anomaly Network Intrusion Detection 朴素贝叶斯分类器训练数据聚类在异常网络入侵检测中的效果分析
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2014.V2.87
U. Subramanian, H. Ong
{"title":"Analysis of the Effect of Clustering the Training Data in Naive Bayes Classifier for Anomaly Network Intrusion Detection","authors":"U. Subramanian, H. Ong","doi":"10.7763/JACN.2014.V2.87","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.87","url":null,"abstract":"This paper presents the analysis of the effect of clustering the training data and test data in classification efficiency of Naive Bayes classifier. KDD cup 99 benchmark dataset is used in this research. The training set is clustered using k means clustering algorithm into 5 clusters. Then 8800 samples are taken from the clusters to form the training and test set. The results are compared with that of two Naive Bayes classifiers trained on random sampled data containing 8800 and 17600 instances respectively. The main contribution of this paper is that it is empirically proved that the training set derived from clusters generated by k-means clustering algorithm improves the classification efficiency of the Naive Bayes classifier. The results show the accuracy of the Naive Bayes classifier trained with clustered instances is 94.4% while that of normal instances are 85.41% and 89.26%.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126317063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
IMANetMS - An Intelligent Mobile Agent-Based Network Management Approach for a Real Scenario IMANetMS——一种基于智能移动代理的真实场景网络管理方法
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2013.V1.21
J. Teixeira, M. J. Viamonte
{"title":"IMANetMS - An Intelligent Mobile Agent-Based Network Management Approach for a Real Scenario","authors":"J. Teixeira, M. J. Viamonte","doi":"10.7763/JACN.2013.V1.21","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.21","url":null,"abstract":" Abstract—Current Network Management paradigms are rigid and lack flexibility. Therefore, a new kind of management system and strategy must be provided to enhance the reliability and performance of Network Management. This paper presents the results of our work on Mobile Agent technology as a new paradigm for developing Network Management applications. Problems existing in traditional Network Management are discussed and a distributed solution is proposed. In this new approach, Mobile agents are the lead characters, in a world where networks grow in a larger and complicated way. Finally, we present the results from an implemented architecture for a real network scenario. Our efforts resulted in IMANetMS, an Intelligent Mobile Agent Network Management System.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"14 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114014209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Improvement in HB-Family Lightweight Authentication Protocols for Practical Use of RFID System 面向RFID系统实际应用的hb -族轻量级认证协议的改进
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2013.V1.13
Ziyi Lin, Joo-Seok Song
{"title":"An Improvement in HB-Family Lightweight Authentication Protocols for Practical Use of RFID System","authors":"Ziyi Lin, Joo-Seok Song","doi":"10.7763/JACN.2013.V1.13","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.13","url":null,"abstract":"—Radio frequency identification (RFID) is a booming technology which identifies objects automatically. As the low-cost passive tag in RFID system lacks computational, storage, power, and communication resources, lightweight authentication protocols are necessary for security and privacy issues. The HB-family has been developed since Hopper and Blum proposed the HB protocol in 2001, which is a lightweight authentication protocol for RFID system. Afterwards, many improvements have been developed based on the HB protocol, such as HB+ in 2005, HB-MP in 2007 and HB-MP+ in 2008. In this paper, we propose an improved protocol which is a secure and lightweight. We give the security and performance analysis to prove its advantages over past HB-family protocols and its practicality in reality.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122740392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Performance of Spectral Amplitude Coding OCDMA Using Multi-identity High Power Code 基于多身份大功率码的频谱幅度编码OCDMA性能研究
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.18178/JACN.2016.4.4.228
A. Kandouci
{"title":"Performance of Spectral Amplitude Coding OCDMA Using Multi-identity High Power Code","authors":"A. Kandouci","doi":"10.18178/JACN.2016.4.4.228","DOIUrl":"https://doi.org/10.18178/JACN.2016.4.4.228","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131110392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intelligent MAC and Routing Protocols for Wireless Sensor Networks 无线传感器网络的智能MAC和路由协议
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.18178/jacn.2016.4.2.218
Murat Dener
{"title":"Intelligent MAC and Routing Protocols for Wireless Sensor Networks","authors":"Murat Dener","doi":"10.18178/jacn.2016.4.2.218","DOIUrl":"https://doi.org/10.18178/jacn.2016.4.2.218","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131465932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Genetic Algorithm with Descendants Idea for Scheduling Tasks Graph in the Multi-Processor Architecture 多处理器架构下任务图调度的后代遗传算法
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2014.V2.72
Mostafa Mahi, H. Kodaz
{"title":"Genetic Algorithm with Descendants Idea for Scheduling Tasks Graph in the Multi-Processor Architecture","authors":"Mostafa Mahi, H. Kodaz","doi":"10.7763/JACN.2014.V2.72","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.72","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132533875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信