In this paper, an handwritten character recognition system based on acceleration is presented. The character recognition system using a 3-dimensional (3D) accelerometer, includes three procedures: original signal dete...
详细信息
As the Importance of Applications, Such as Ocean Sampling, Environmental Monitoring, Disaster Prevention, and Distributed Tactical Surveillance, Has Recently Grown, the Need for Underwater Communication Has Become Mor...
详细信息
ISBN:
(纸本)9789898565204
As the Importance of Applications, Such as Ocean Sampling, Environmental Monitoring, Disaster Prevention, and Distributed Tactical Surveillance, Has Recently Grown, the Need for Underwater Communication Has Become More Pronounced. unlike Terrestrial Sensor Networks, Underwater Sensor Networks (Uwsns) Have Different Characteristics Such as a Long Propagation Delay, a Narrow Bandwidth and High Packet *** the Various Challenges Posed by the Underwater Environment, a Routing Algorithm Has Been Proposed in This Paper. the Algorithm Consists of Special Features, including Three Different Types of Nodes in the Architecture Proposed, a Mathematical Formula in Order to Select the next Node to Be Used for Transmission. the Major Aim of the Algorithm Is to Select the next Node to Be Used for Successful Data Delivery, and Ensure Minimum Energy Consumption. the next Node Is Chosen With Utmost Care in Order to Increase the Probability of Successful Data Delivery. the Packet Is Transferred from the Source to the Sub-Destination by Exploiting Minimum Energy of the Nodes. the Simulation Studies for the Protocol Were Conducted using AQUA-GLOMO Network Simulator. the Protocol Was Benchmarked With DSR Routing Protocol. the Matrices That Were Considered for the Simulation Study Were Throughput, PDR, Energy Consumption and Delay and It Was Observed That Our Proposed Model Performed Better in the Underwater Environment.
Distributed systems commonly replicate data to enhance system dependability. In such systems, a logical update on a data item results in a physical update on a number of copies. The synchronization and communication r...
详细信息
Enterprise Architecture (EA) models help enterprise architects to make business decisions and to support organisations to understand and analyse its structure. Creating and maintaining such an EA model is expensive an...
详细信息
Dynamic taint analysis(DTA) is to analyze execution paths that an attacker may use to exploit a system. Dynamic taint analysis is a method to analyze executable files by tracing information flow without source code....
详细信息
Dynamic taint analysis(DTA) is to analyze execution paths that an attacker may use to exploit a system. Dynamic taint analysis is a method to analyze executable files by tracing information flow without source code. DTA marks certain inputs to program as tainted, and then propagates values operated with tainted inputs. Due to the increased popularity of dynamic taint analysis, there have been a few recent research approaches to provide a generalized tainting infrastructure. In this paper, we introduce some approaches of dynamic taint analysis, and analyze their approaches. Lam and Chiueh’s approach proposed a method that instruments code to perform taint marking and propagation. DYTAN considers three dimensions: taint source, propagation policies, taint sink. These dimensions make DYTAN to be more general framework for dynamic taint analysis. DTA++ proposes an idea to vanilla dynamic taint analysis that propagates additional taints along with targeted control dependencies. Control dependency causes results of taint analysis to have decreased accuracies. To improve accuracies, DTA++ showed that data transformation containing implicit flows should propagate properly to avoid under-tainting.
Foraging Behavior in Ant Swarms can be very helpful when applied to the protocols in Mobile Ad hoc NETworks (MANETs). When the Ant Colony Optimization Scheme (ACO) is applied to a protocol, larger number of paths are ...
详细信息
ISBN:
(纸本)9789898425737
Foraging Behavior in Ant Swarms can be very helpful when applied to the protocols in Mobile Ad hoc NETworks (MANETs). When the Ant Colony Optimization Scheme (ACO) is applied to a protocol, larger number of paths are generated from the source to destination which helps in improving the packet delivery ratio because an alternate back up path is always available in case a path gets broken due to the mobile nodes. In this paper, we apply the ACO scheme on an already existing Energy efficient protocol Conditional Max-Min Battery Capacity Routing (CMMBCR) (C.-K. Toh, 2001). The CMMBCR not only takes care of the total transmission energy in the network but also the residual battery capacity of the nodes. Hence applying ACO scheme on CMMBCR makes it more efficient in terms of energy, packet delivery ratio etc. The efficiency of our proposed protocol A-CMMBCR is then established by comparing it with some of the other existing Energy aware protocols such as Energy-Aware Routing protocol (EAAR) (Dhurandher et al., 2009), Minimum Transmission Power Routing (MTPR) (Scott and Bambos, 1996) and CMMBCR. The results are captured in the form of a graphical format.
Wearable computer can be worn anytime with the support of unrestricted communications and variety of services which provides maximum capability of information use. Key challenges in developing such wearable computers ...
详细信息
In the digital era,electronic medical record(EMR)has been a major way for hospitals to store patients’medical *** traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic...
详细信息
In the digital era,electronic medical record(EMR)has been a major way for hospitals to store patients’medical *** traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic balance between privacy protection and data *** storage capacity of blockchain is limited and single blockchain schemes have poor scalability and low *** address these issues,we propose a secure and efficient medical data storage and sharing scheme based on double *** our scheme,we encrypt the original EMR and store it in the *** storage blockchain stores the index of the complete EMR,and the shared blockchain stores the index of the shared part of the *** with different attributes can make requests to different blockchains to share different parts according to their own *** experiments,it was found that cloud storage combined with blockchain not only solved the problem of limited storage capacity of blockchain,but also greatly reduced the risk of leakage of the original *** Extraction Signature(CES)combined with the double blockchain technology realized the separation of the privacy part and the shared part of the original *** symmetric encryption technology combined with Ciphertext-Policy Attribute-Based Encryption(CP–ABE)not only ensures the safe storage of data in the cloud,but also achieves the consistency and convenience of data update,avoiding redundant backup of *** analysis and performance analysis verified the feasibility and effectiveness of our scheme.
Modern software-defined radios are large, expensive, and power-hungry devices and this, we argue, hampers their more widespread deployment and use, particularly in low-power, size-constrained application settings like...
详细信息
暂无评论