Security is a major concern while implementing Mobile Ad Hoc Networks (MANET) for communication in an adverse environment. The dynamism in network topology and the absence of centralized administration, MANET is susce...
详细信息
Security is a major concern while implementing Mobile Ad Hoc Networks (MANET) for communication in an adverse environment. The dynamism in network topology and the absence of centralized administration, MANET is susceptible to security attacks from malicious users. This paper introduces the concept of anonymity for an informant who identifies and discloses anonymously the malicious behavior of other users in the network. This paper proposes the Trust-Based Anonymous Communication Technique (TACT) to provide anonymity for an informant and liability for the malicious users who attempt to misuse the anonymity property. The TACT restrains the misuse of anonymity in such a way that any user not sending cooperation message utmost once, upon receiving warnings two times is identified and also any user sending multiple cooperation messages per warning per malicious behavior type will also be termed as malicious user. The proposed technique is designed based on “broadcast with trapdoor information” a cryptography concept to monitor the users and to report malicious users to the network anonymously. The simulation results prove the necessity of anonymity in MANET and the effectiveness of this protocol in achieving such anonymity.
Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without ...
详细信息
Feature reduction reduces the dimensionality of a database and selects more informative features by removing the irrelevant features. Selecting features in unsupervised learning scenarios is a harder problem than supe...
详细信息
Feature reduction reduces the dimensionality of a database and selects more informative features by removing the irrelevant features. Selecting features in unsupervised learning scenarios is a harder problem than supervised feature selection due to the absence of class labels that would guide the search for relevant features. PSO is an evolutionary computation technique which finds global optimum solution in many applications. Rough set is a powerful tool for data reduction based on dependency between attributes. This work combines the benefits of both PSO and rough sets. This paper describes a novel Unsupervised PSO based Quick Reduct (US-PSO-QR) for feature selection which employs a population of particles existing within a multi-dimensional space. The performance of the proposed algorithm is compared with the existing unsupervised feature selection methods and the efficiency is measured by using K-Means Clustering and Rough K-Means Clustering.
This paper investigates the integration of Nanoelec-tromechanical (NEM) relays on top of TSVs, to reduce area overhead and also enable possible novel architecture design. NEM relay is used in this work to reduce the c...
详细信息
This paper investigates the integration of Nanoelec-tromechanical (NEM) relays on top of TSVs, to reduce area overhead and also enable possible novel architecture design. NEM relay is used in this work to reduce the cost due to the removal of area overhead caused by TSV redundancy logic and the improvement of TSV reliability. Furthermore, novel memory architecture design with NEM relay is proposed to improve the cost efficiency by leveraging the switch made by NEM relay. The general-purpose memory can be reused in different designs, which allows the memory to be massively produced and thus amortizes the NRE cost. The experimental results show that the 3DIC chip can achieve 13.5% cost reduction with NEM relay integration.
The design inaccuracy (fault) in predictors can cause huge power loss in processor posing serious threat to the designers. The objective of the current analysis of fault impact on the processor power consumption is to...
详细信息
The design inaccuracy (fault) in predictors can cause huge power loss in processor posing serious threat to the designers. The objective of the current analysis of fault impact on the processor power consumption is to devise a methodology for diagnosis of the faulty module in a branch predictor. It is effectively the first step for identification of DPL (design to avoid power loss) in a processor. Exhaustive analysis reveals that the undoubted diagnosis of design inaccuracies, that is effective for DPL, can be formalized in a TWO-LEVEL predictor by sensing the power drainage from processor.
We have considered the problem of incorporating security mechanisms in routing protocols for ad hoc networks. There have been various secure routing protocols proposed for the mobile ad hoc network. Secured Ad hoc On ...
详细信息
We have considered the problem of incorporating security mechanisms in routing protocols for ad hoc networks. There have been various secure routing protocols proposed for the mobile ad hoc network. Secured Ad hoc On Demand Vector Routing (SAODV) protocol considered as one of the popular existing secure routing protocol which have used digital signature and hash chain techniques to secure Ad hoc On Demand Vector Routing (AODV) protocol. Most of these protocols were analyzed by two standard techniques: simulation and security analysis. We have used simulative approach for the performance comparisons between AODV and SAODV routing protocols using Glomosim simulator. The packet deliver fraction, average end-to-end delay, throughput and number of dropped packets metrics have been chosen for comparison. The results have shown that packet delivery fraction decreased in the case of SOADV. Routing overhead and throughput increased in case of SAODV. The simulation result have shown that network performance degrade when security counter measure are taken. Secure routing protocols available today (such as SAODV) still need further optimizations to minimize the processing overhead, delays and to maximize the routing throughputs.
Intermittent networks (IntNET) are networks where all the links in a path may not be available concurrently. Finding routes on such a network is hard. No trivial extension of classical routing protocols is known to pr...
详细信息
Intermittent networks (IntNET) are networks where all the links in a path may not be available concurrently. Finding routes on such a network is hard. No trivial extension of classical routing protocols is known to provide a correct solution. In this paper, we present a constraint resource planning (CRP) based advanced route computation and scheduling algorithm for IntNET. The algorithm computes routes achieving near minimum delay and also achieve the bound on minimum intermediate buffer requirements. It was difficult previously to deploy such advanced routing. However, this design is suitable for the new IETF traffic engineering extensions that now enable such advanced externally computed route to be injected into a MPLS infrastructure.
Individuals with Blindness or Severe Visual Impairment (IBSVI) have not had equivalent access to reading materials, especially for slate-type devices. Features such as highlighting and note taking are essential for ac...
Individuals with Blindness or Severe Visual Impairment (IBSVI) have not had equivalent access to reading materials, especially for slate-type devices. Features such as highlighting and note taking are essential for active reading and engagement. The purpose of this project is to iteratively design a software system for slate type devices (e.g., iPad) to provide IBSVIs with equivalent reading experience as to sighted users. A participatory design (PD) approach is being adopted throughout the project by designing ‘with’ IBSVI users. The first PD session aimed to explore and obtain feedback on the different layouts of the overlays (tactile pattern over iPad to guide reading), different text densities, sonification, and navigation through the STAAR (Spatial Touch Audio Annotator and Reader) system. IBSVI consultants gave significant feedback and design inputs. Consultants also brainstormed with researchers for ideas to improve the features of the system.
Similarity measures are widely used in various applications such as information retrieval, image and object recognition, text retrieval, and web data search. In this paper, we propose similarity-based methods for defe...
详细信息
暂无评论