International Journal of Future Generation Communication and Networking最新文献

筛选
英文 中文
MIMO Interference and Path Loss Reduction using Adaptive Antenna System along with Optimization of Frequency for Zero Path Loss 利用自适应天线系统减少MIMO干扰和路径损耗及零路径损耗的频率优化
International Journal of Future Generation Communication and Networking Pub Date : 2019-03-31 DOI: 10.33832/ijfgcn.2019.12.1.01
Aritra De, Tirthankar Datta
{"title":"MIMO Interference and Path Loss Reduction using Adaptive Antenna System along with Optimization of Frequency for Zero Path Loss","authors":"Aritra De, Tirthankar Datta","doi":"10.33832/ijfgcn.2019.12.1.01","DOIUrl":"https://doi.org/10.33832/ijfgcn.2019.12.1.01","url":null,"abstract":"","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41432145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A MapReduce Framework for Detection of Tandem Repeats in DNA Sequences DNA序列串联重复序列检测的MapReduce框架
International Journal of Future Generation Communication and Networking Pub Date : 2019-03-31 DOI: 10.33832/ijfgcn.2019.12.1.02
T Vandanababu, Raju Bhukya, D. Veeraiah, P. V. Paul
{"title":"A MapReduce Framework for Detection of Tandem Repeats in DNA Sequences","authors":"T Vandanababu, Raju Bhukya, D. Veeraiah, P. V. Paul","doi":"10.33832/ijfgcn.2019.12.1.02","DOIUrl":"https://doi.org/10.33832/ijfgcn.2019.12.1.02","url":null,"abstract":"","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42854048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early Assortment of Routes for Transfer of Packets in Communication Networks 通信网络中数据包传输的早期路由组合
International Journal of Future Generation Communication and Networking Pub Date : 2019-03-31 DOI: 10.33832/ijfgcn.2019.12.1.03
C. Sudhakar, N. Thirupathi Rao, D. Bhattacharyya
{"title":"Early Assortment of Routes for Transfer of Packets in Communication Networks","authors":"C. Sudhakar, N. Thirupathi Rao, D. Bhattacharyya","doi":"10.33832/ijfgcn.2019.12.1.03","DOIUrl":"https://doi.org/10.33832/ijfgcn.2019.12.1.03","url":null,"abstract":"","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46825745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GA GSA-based Energy Efficient Pegasis Protocol for WSN 基于GA-GSA的无线传感器网络节能Pegasis协议
International Journal of Future Generation Communication and Networking Pub Date : 2018-09-30 DOI: 10.14257/ijfgcn.2018.11.5.04
Suraj Srivastava, Dinesh Grover
{"title":"GA GSA-based Energy Efficient Pegasis Protocol for WSN","authors":"Suraj Srivastava, Dinesh Grover","doi":"10.14257/ijfgcn.2018.11.5.04","DOIUrl":"https://doi.org/10.14257/ijfgcn.2018.11.5.04","url":null,"abstract":"WSN is termed as wireless sensor network that consists of very large number of nodes that are connected with each other. These nodes are used to sense large amount of distinct data, interact with each other, and are computationally capable. The sensor nodes deployed in wireless network are light in weight and have constrained battery power. Hence, energy is a main problem of wireless sensor networks. This paper proposes a method for energy minimization with efficient clustering using GSA algorithm in Wireless Sensor Network. To compute cluster head election probability this work uses Genetic Algorithm method. Various parameters are used to evaluate the performance of the proposed technique. Experimental results demonstrate that the proposed technique outperforms existing techniques by various parameters.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42708140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study of Security Mechanisms and Simulation Analysis of Packet Drop in RPL in Low Power Lossy Networks 低功耗网络中RPL安全机制研究及丢包仿真分析
International Journal of Future Generation Communication and Networking Pub Date : 2018-09-30 DOI: 10.14257/IJFGCN.2018.11.5.05
Nikita Malik, Prakash Rao Ragiri, Aarti Jain
{"title":"Study of Security Mechanisms and Simulation Analysis of Packet Drop in RPL in Low Power Lossy Networks","authors":"Nikita Malik, Prakash Rao Ragiri, Aarti Jain","doi":"10.14257/IJFGCN.2018.11.5.05","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.5.05","url":null,"abstract":"A large number of small sensor nodes or motes can be randomly distributed in any environment. These nodes communicate with each other over a low power wireless communication medium since they are severely restricted in their resources. Owing to these constraints, nodes in low power and lossy networks (LLNs) need to collaborate in order to establish a multi-hop network in which data is transmitted over several nodes to reach the sink node(s). Such communications over the radio environment are prone to various attacks, such as the RPL (Routing Protocol for Low Power and Lossy Networks) Packet Drop attack, which participates in the routing process to accept packets from the neighboring motes, only to drop them instead of forwarding in the route to the destination. Such an attack is generally hard to detect and to provide defenses against. In this paper, through simulations on Contiki’s network simulator COOJA, the impact of RPL Packet Drop attack on Contiki RPL is observed for performance based on average power consumption, received packet count, expected transmission count and hop count. Based on the results, several security schemes to tackle RPL in LLN have been studied.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41338279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of RN-LEACH Protocol over LEACH Protocol RN-LEACH协议与LEACH协议的性能分析
International Journal of Future Generation Communication and Networking Pub Date : 2018-09-30 DOI: 10.14257/IJFGCN.2018.11.5.01
Piyush Rawat, S. Chauhan
{"title":"Performance Analysis of RN-LEACH Protocol over LEACH Protocol","authors":"Piyush Rawat, S. Chauhan","doi":"10.14257/IJFGCN.2018.11.5.01","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.5.01","url":null,"abstract":"The network lifetime is considered as the major concern in the area of WSN because of the huge quantity of sensor nodes and their distribution in the network. When the size of the network gets expanded the selection of the routing protocol become a crucial issue. A good routing protocol can help in enhancing the network lifetime. In this article, we are exhibiting a routing protocol which is based on existing LEACH protocol named as Random Number based LEACH (RN-LEACH) protocol. The results generated through simulation illustrate that the RN-LEACH algorithm has enhanced the working of the network in terms of energy consumption, network lifetime and packet received compared to existing LEACH protocol. The RN-LEACH protocol has increased the network lifetime by approximately more than 90% as compared to LEACH which shows the good agreement of RN-LEACH algorithm as contrasted to the previous technique.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42215238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
FPGA Implementation of Secure Internet of Things (SIT) Algorithm for High Throughput Area Ratio 高吞吐量区域比的安全物联网(SIT)算法的FPGA实现
International Journal of Future Generation Communication and Networking Pub Date : 2018-09-30 DOI: 10.14257/IJFGCN.2018.11.5.06
U. Rabab, Irfan Uddin Ahmed, M. Aslam, Muhammad Usman
{"title":"FPGA Implementation of Secure Internet of Things (SIT) Algorithm for High Throughput Area Ratio","authors":"U. Rabab, Irfan Uddin Ahmed, M. Aslam, Muhammad Usman","doi":"10.14257/IJFGCN.2018.11.5.06","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.5.06","url":null,"abstract":"In this paper, we present the results of hardware implementation of our previously proposed lightweight encryption algorithm named as Secure Internet of Things (SIT). By virtue of its low cost and computational simplicity, SIT can be a good candidate to meet the needs of resource constraint applications related to the futuristic demands of Internet of Things. In this work, we have implemented our proposed SIT algorithm on Field Programmable Gate Array (FPGA) and compared the results with the similar implementations reported in the literature. During the hardware implementation, we focused on obtaining high throughput area ratio which is essential parameter for the applications focusing on internet of things. Our implementation of the SIT algorithm on FPGA achieved a throughput of 4899 Mbps with encryption while using only 711 logic elements resulting in throughput area ratio of 6.89.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46623150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Scheme of Mobility Management in UDN Based on PPP 一种基于PPP的UDN移动管理方案
International Journal of Future Generation Communication and Networking Pub Date : 2018-09-30 DOI: 10.14257/ijfgcn.2018.11.5.07
Junxuan Wang, Ruixin Li, Tianxiang Ji
{"title":"A Scheme of Mobility Management in UDN Based on PPP","authors":"Junxuan Wang, Ruixin Li, Tianxiang Ji","doi":"10.14257/ijfgcn.2018.11.5.07","DOIUrl":"https://doi.org/10.14257/ijfgcn.2018.11.5.07","url":null,"abstract":"","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41328270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Isolating Malicious Controller(s) In Distributed Software-Defined Networks with Centralized Reputation Management 用集中式信誉管理隔离分布式软件定义网络中的恶意控制器
International Journal of Future Generation Communication and Networking Pub Date : 2018-09-30 DOI: 10.14257/IJFGCN.2018.11.5.02
Bilal Karim Mughal, S. Hameed, B. Hameed
{"title":"Isolating Malicious Controller(s) In Distributed Software-Defined Networks with Centralized Reputation Management","authors":"Bilal Karim Mughal, S. Hameed, B. Hameed","doi":"10.14257/IJFGCN.2018.11.5.02","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.5.02","url":null,"abstract":"Although software-defined networks have seen a sharp increase in their deployment around the world, with big tech companies including Microsoft and Google, to name a few, tapping into the enormous potential that these networks offer, there are still various security loopholes that need to be plugged. One such security-related issues is that of a rogue controller bringing down an entire network. As we shall see in this paper, this problem is still short of any definitive solutions, especially when it comes to distributed software-defined networks. We attempt to resolve this issue by developing a centrally managed trust and reputation scheme. By proactively comparing the policies/flow rules that need to be installed in the switches with those that are actually installed, our scheme singles out a malicious controller. We have evaluated the scheme for scalability, message overhead, and for bad-mouthing attacks. Our results suggest that using trust and reputation system can greatly enhance the network security in this scenario as demonstrated by rigorous evaluations in Emulab network emulation testbed.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46515942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Adaptive Parallel Interference Mitigation Technique using Artificial Neural Network in Complementary Coded MC-CDMA 互补编码MC-CDMA中一种基于人工神经网络的自适应并行干扰抑制技术
International Journal of Future Generation Communication and Networking Pub Date : 2018-07-31 DOI: 10.14257/IJFGCN.2018.11.4.06
Supreeti Bal, M. Rai, Hye-jin Kim, R. Saha
{"title":"An Adaptive Parallel Interference Mitigation Technique using Artificial Neural Network in Complementary Coded MC-CDMA","authors":"Supreeti Bal, M. Rai, Hye-jin Kim, R. Saha","doi":"10.14257/IJFGCN.2018.11.4.06","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.4.06","url":null,"abstract":"","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJFGCN.2018.11.4.06","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47895431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信