In Cellular Networks like 5G, when a user uses a Dual Sim Dual Standby (DSDS) device, there are high changes of Page Occasion (PO) collision across both the protocol stacks (PS) of two Subscriber Identity Modules (SIM...
详细信息
ISBN:
(纸本)9781665448932
In Cellular Networks like 5G, when a user uses a Dual Sim Dual Standby (DSDS) device, there are high changes of Page Occasion (PO) collision across both the protocol stacks (PS) of two Subscriber Identity Modules (SIM). During such scenarios, an arbitrator module normally tries to resolve such collision using methods like round robin, alternate, weighted round robin etc. Using these approaches, the arbitrator cannot avoid the page miss very efficiently, as it is unaware of the repeat pattern of the network page. In this paper we propose an efficient way which can enhance the performance of resolution of the page conflicts by trying to determine a probabilistic network page repeat pattern dynamically. The approach relies on the learning based on the page reception of the User Equipment (UE) over the time and determine the probabilistic page repeat pattern. This newly determined page repeat pattern will be utilized by the arbitrator to resolve conflicts in cases when the paging occasion of both stack fall nearby or overlap. As the page repeat pattern of network is dynamic in nature, in this paper we also try to address a validation mechanism which is continuous and tries to determine any such scenarios where the network page repeat pattern is changing. In case where such pattern changes the validator algorithm tries to determine the updated page repeat pattern and hence in keeping the UE informed about the recent network page repeat pattern.
The concept of patterns and pattern languages, although very common in software nowadays, was first approached by Christopher Alexander, in the area of architecture, in the book A pattern language: towns, buildings, c...
详细信息
ISBN:
(纸本)9798400716836
The concept of patterns and pattern languages, although very common in software nowadays, was first approached by Christopher Alexander, in the area of architecture, in the book A pattern language: towns, buildings, construction. However, it was only in 1980 that the term was adapted for software development, gaining its popularity in 1994. Despite the fact that the concept of patterns has been used in the area of software development for more than 40 years, there is still no consensus on the best method to validate patterns and patterns languages, and the existing methods are scattered in several different papers and research across the scientific community. As such, in this paper, we conduct a systematic literature review about the existing methods in the scientific community to validate patterns and pattern languages.
The tessellation is of repeated graphic patterns that can be applied in many visual applications. To create a graphic design of tessellation is not a simple task, which requires both visual art experience and geometri...
详细信息
The tessellation is of repeated graphic patterns that can be applied in many visual applications. To create a graphic design of tessellation is not a simple task, which requires both visual art experience and geometric modeling. In this paper, we provide a rule-based support system to assist users, who has less experience in art, to efficiently create tessellation tiles to satisfy the user's aesthetic perception. To this end, we propose three algorithms based on rules to solve the pattern validation problems in tessellation design, including: (1) tile boundary formulation by using the C4C4C4C4 Heesch-type isohedral tiling and Bezier curve, (2) fitting the internal design of tile into the tile boundary based on the extremal polygon containment optimization, (3) combination of tiles that satisfies symmetry or semi-symmetry. Consequently, the computer support provides automation and visualization to make users' tessellation design more efficient and innovative.
Providing security to Cloud against the harmful attacks is an important and essential thing in recent days. Because, there are lot of attacks intend to affect the performance of data transmission in Cloud. Specificall...
详细信息
Providing security to Cloud against the harmful attacks is an important and essential thing in recent days. Because, there are lot of attacks intend to affect the performance of data transmission in Cloud. Specifically, the extensible markup language-denial of service (XML-DoS) cause the severe damage to Cloud, which misuses the protocols for injecting the attack packets and disturbing the protocol handlers. So, this type of attack must be detected for enabling a reliable and secure service delivery in Cloud. For this purpose, the traditional works developed various attack detection mechanisms for identifying and blocking the XML-DoS attacks, but it lacks with the limitations of increased computation overhead, reduced detection accuracy, and inefficient classification. To solve these issues, this paper aims to develop a new attack detection framework based on the XML schema. The stages that involved in this work are, pattern validation, traffic extraction, error classification, and IP traceback. At first, the individual users transmit the packets to the routers, then the packet marking is performed based on the router IP. After that, the patterns of the packets are validated, if it is valid, the distinct IP is counted for IP matching. Consequently, the time sequence Tsallis entropy, source IP Tsallis entropy, and Lyapunov exponent are estimated. Based on the estimated exponent value, the error is classified as the chaotic or non-chaotic. Finally, the bee colony algorithm is implemented to perform the IP traceback, which takes the appropriate decision for blocking the attacker packets from the particular server. In experiments, the performance of the proposed method is evaluated by using various performance measures. Also, the superiority of the proposed system is proved by comparing it with the existing techniques.
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e. g., Privacy Enhancin...
详细信息
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e. g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to address security and privacy issues. However, understanding why, and when such solutions have to be adopted is often unanswered because the answer comes only from a broader perspective, accounting for legal and organizational issues. Security engineers and legal experts should analyze the business goals of a company and its organizational structure and derive from there the points where security and privacy problems may arise and which solutions best fit such (legal) problems. The paper investigates the methodological support for capturing security and privacy requirements of a concrete health care provider.
This research captures best practices in the business-to-business (B2B) domain as a means of competitive advantage and innovation for organizations striving to adopt B2B environments. We present a case of developing a...
详细信息
ISBN:
(纸本)9783642018619
This research captures best practices in the business-to-business (B2B) domain as a means of competitive advantage and innovation for organizations striving to adopt B2B environments. We present a case of developing and validating a set of patterns for B2B adoption and then discuss the case in the context of a number of other cases where organizational patterns have been used to capture, document and share competitive organizational knowledge.
暂无评论