The Online Social Networks have become a very popular Web 2.0 application. The powerful combination of methods and techniques makes social networks analysis special. This paper discusses the challenges and opportuniti...
详细信息
ISBN:
(纸本)9781634396226
The Online Social Networks have become a very popular Web 2.0 application. The powerful combination of methods and techniques makes social networks analysis special. This paper discusses the challenges and opportunities that emerge from this evolution of social networks, and provides structure to better understand the rapidly evolving field of social networks. The paper reviews the current state-of-the-art in the selected aspects of social networks and presents a set of open research challenges related to online social networks. The challenges suggest that significant further research is required in social networks.
Operational transresistance amplifier (OTRA) has attracted considerable attention in the recent literature in several applications such as impedance simulation, universal biquad filter realization, realization of sinu...
Operational transresistance amplifier (OTRA) has attracted considerable attention in the recent literature in several applications such as impedance simulation, universal biquad filter realization, realization of sinusoidal oscillators and multivibrators. However, to the best knowledge of the authors, any OTRA-based generalized impedance simulator circuits have not been reported so far. The purpose of this paper is to present such a circuit.
A novel planar ultra wideband (UWB) antenna using a third iteration Sierpinski gasket fractal shape with circular boundary is presented in this paper. Size reduction of the antenna is done by Sierpinski gasket fractal...
详细信息
A novel planar ultra wideband (UWB) antenna using a third iteration Sierpinski gasket fractal shape with circular boundary is presented in this paper. Size reduction of the antenna is done by Sierpinski gasket fractal concept which offers 24% thinning and provides excellent bandwidth better than a equivalent circular monopole which is around 8 GHz (span from 3 to 11 GHz with VSWR
Edge detection is a field which has intrigued programmers since early 1970s. Since then, a good number of edge detection techniques have come up but the technique used by Canny [1] is very widely used. However, it has...
详细信息
In Emergency MANETs (eMANETs), the broadcasting nature of the wireless medium, the lack of pre-established trust relationship among nodes, and the frequent topology changes, cause some serious security challenges, mak...
详细信息
ISBN:
(纸本)9781467349420
In Emergency MANETs (eMANETs), the broadcasting nature of the wireless medium, the lack of pre-established trust relationship among nodes, and the frequent topology changes, cause some serious security challenges, making the network vulnerable to malicious attacks such as wormhole attacks. This paper investigates a recently proposed Advanced Encryption Standard (AES)-based routing algorithm (so-called AODV-Wormhole Attack Detection Reaction - here referred to as AODV-WADR-AES) for securing AODV-based eMANETs against wormhole attacks. The proposal consists of substituting the AES part of the scheme by the Triple Data Encryption Standard (TDES), yielding the AODV-WADR-TDES routing algorithm, with the goal to study the performance of the algorithm where mobile devices that are incompatible with AES are part of eMANET nodes. In doing so, markers in the form of hash codes are included in the data packets to help consolidating the data integrity. Simulation results are presented to validate the proposed AODV-WADR-TDEA scheme. It is also shown that the AODV-WADR-AES scheme outperforms the AODV-WADR-TDES scheme in terms of end-to-end delay, packet delivery ratio, and number of packets traversing through the wormhole link.
Reconfigurable Field Programmable Gate Arrays (rFPGAs) are employed extensively in spacecraft electronic systems to implement low-power adaptable systems that provide high density functionality. A challenge that must ...
详细信息
ISBN:
(纸本)9781424478835
Reconfigurable Field Programmable Gate Arrays (rFPGAs) are employed extensively in spacecraft electronic systems to implement low-power adaptable systems that provide high density functionality. A challenge that must be tackled during system design is their high susceptibility to radiation induced Single Event Upsets (SEUs). A burst of energized particles may cause extensive damage to circuits. Even if their presence is transient, SEU faults may cause a permanent failure when they afflict the configuration memory - SRAM. There are two ways in which timely detection of faults and timely action to circumvent them can be undertaken - (i) Online error detecting/correcting circuits that demand a high premium in terms of FPGA area for extending error-security and Fault Tolerance, thus increasing cost and redundancy, and (ii) Built-in Self-Test (BIST) that allows efficient and very high-coverage fault detection but the fault testing is performed off-line. In general, Reliability and Availability (R&A) is a crucial quality parameter. In this paper, we present a state model that schedules Self-tests judiciously to optimize availability while ensuring a high degree of reliability. The aim of system design is to determine an optimal value of the mean time to self testing λT so that faults are detected on time and are reconfigured to boost system availability.
White box testing is a test technique that takes into account program code, code structure and internal design flow. White box testing is primarily of two kinds-static and structural. Whereas static testing requires o...
详细信息
The cost and reliability of a network are very much affected by its topology. Moreover, the network parameters like path length and link load are also dependent on the topology used for a network. These parameters are...
详细信息
The cost and reliability of a network are very much affected by its topology. Moreover, the network parameters like path length and link load are also dependent on the topology used for a network. These parameters are vital for any network. Hence constructing a set of topology candidates prior to evaluation is crucial. However, constructing candidate set is a time consuming task and this time is greatly increased as the size of the network grows. Hence, computational time of an algorithm also plays a critical role in selection of the algorithm. In this paper an approach is proposed to construct candidate set for a communication network so that it can survive at least one link failure and the computational time is less than existing algorithms.
Information retrieval and extraction essentially rely on estimating the relevance of words present in a large corpus of documents or text. One of the approaches to measuring relevance is analyzing the importance of wo...
详细信息
Securing the routing of message in mobile ad hoc networks (MANETs) is still a challenging issue. This paper proposes an enhanced trust-based multipath Dynamic Source Routing (DSR) protocol (so-called ETB-MDSR) to secu...
详细信息
ISBN:
(纸本)9781457720529
Securing the routing of message in mobile ad hoc networks (MANETs) is still a challenging issue. This paper proposes an enhanced trust-based multipath Dynamic Source Routing (DSR) protocol (so-called ETB-MDSR) to securely transmit messages in MANETs. Our method consists in a combination of soft-encryption, novel trust management strategy, and multipath DSR routing. Simulation results are presented to validate our proposal, showing that our ETB-MDSR scheme outperforms a recently proposed Trust-Based Multipath DSR message scheme (TB-MDSR), in terms of route selection time.
暂无评论