dear editor,Several studies have recently reported on major vulnerabilities in the Signaling System No.7 (SS7)used in mobile networks [1, 2]. The reported vulnerabilities and security issues would lead to the illegal ...
详细信息
dear editor,Several studies have recently reported on major vulnerabilities in the Signaling System No.7 (SS7)used in mobile networks [1, 2]. The reported vulnerabilities and security issues would lead to the illegal acquisition and tampering of mobile communication userdata, known as cellphone userdata. The cellphone userdata contain important information such as identity identification, location identification, security parameter-set. due to
real-time applications of future IT will continue to drive the demand for performance scaling in devices ranging from sensors to servers. Parallel processing in the form of mul-ticore and manycore architectures will a...
详细信息
In this paper, we study how the cooperative relaying can improve both capacity and fairness in cellular network. The capacity and fairness have a trade-off relationship, so increasing cell throughput deteriorates fair...
详细信息
ISBN:
(纸本)9781424410422
In this paper, we study how the cooperative relaying can improve both capacity and fairness in cellular network. The capacity and fairness have a trade-off relationship, so increasing cell throughput deteriorates fairness and vice versa. First, we show that the achievable average throughput region can be enlarged by using the cooperative relaying. This enlargedregion means that capacity and fairness can be improved at the same time with an adequate scheduling algorithm. Thus, secondly we propose a generalized scheduling algorithm for cooperative relaying. The proposed scheduling algorithm can improve both capacity and fairness at the expense of cooperation among users. From simulations, we show that the trade-off relationship can be surpassed and the unfairness problem in the heterogeneous channel condition can be solved by the opportunistic relaying.
Network virtualization has been a particularly important driving force behind the development of NGN. Finding effective ways to control self-adapting virtual networks has become a research hot spot. This paper tries t...
详细信息
Network virtualization has been a particularly important driving force behind the development of NGN. Finding effective ways to control self-adapting virtual networks has become a research hot spot. This paper tries to find an efficient way in combining dynamic resource sensing with traffic character andrequirements in virtual network, based on that an intelligent cognition based virtual network resources management model has been put forward. We design a network topology view by coloring network topology matrix with current resources model. We present an intelligent virtual resource management mechanism based on the proposed network topology view. Experiment results illustrate that the proposed mechanism can improve VN capacity by automatic resource adjustment, which can obtain high utilization of VN resources without increasing computational expenses.
Computing today is becoming pervasive. To provide pervasive computing environments flexible, dynamic and less distinctive security mechanisms, trust managements are introduced. However, current trust frameworks are de...
详细信息
Computing today is becoming pervasive. To provide pervasive computing environments flexible, dynamic and less distinctive security mechanisms, trust managements are introduced. However, current trust frameworks are designed for specific scenarios and can't fulfill requirements in different environments, which leads to that these trust frameworks can't be deployed in different environments and pervasive devices can't enjoy pervasive computing anywhere really. To remedy this problem, this paper proposes a universal trust framework. In our framework, the flexible attribute vector model is used to represent trust evidence that are needed to evaluate trust relationships, thus the framework can work in identity-based trust environments as well as context-based trust environments. Besides, the universal trust framework defines four kinds of trust relationships that are suitable o model trust relationships in various scenarios. In a word, the proposed universal trust framework is an especially designed trust framework that can unify trust management in different pervasive computing cases.
We first propose the normal Pythagorean neutrosophic set(NPNS)in this paper,which synthesizes the distribution of the incompleteness,indeterminacy,and inconsistency of the Pythagorean neutrosophic set(PNS)and normal f...
详细信息
We first propose the normal Pythagorean neutrosophic set(NPNS)in this paper,which synthesizes the distribution of the incompleteness,indeterminacy,and inconsistency of the Pythagorean neutrosophic set(PNS)and normal fuzzy *** also define some properties of *** solving the decision-making problem of the nonstrictly independent and interacting attributes,two kinds of NPNS Choquet integral operators are ***,the NPNS Choquet integral average(NPNSCIA)operator and the NPNS Choquet integral geometric(NPNSCIG)operator are ***,their calculating formulas are derived,their properties are discussed,and an approach for solving the interacting multi-attribute decision making based on the NPNS is ***,the two kinds of operators are applied to validate the stability of the new method.
In digital pathology, the accurate detection, segmentation, and classification of cells are pivotal for precise pathological diagnosis. Traditionally, pathologists manually segment cells from pathological images to fa...
详细信息
In an open network environment, information resource could be modified, divided and integrated while transmitting. This wouldresult in that origins of different sections within an information resource are different. ...
详细信息
The process of data forwarding in Wireless Multimedia Sensor Networks is analogy to electric charge moving in electrostatic field. By this analogy, a model which abstracts a sensor networks to a Gravitational Field is...
详细信息
The process of data forwarding in Wireless Multimedia Sensor Networks is analogy to electric charge moving in electrostatic field. By this analogy, a model which abstracts a sensor networks to a Gravitational Field is proposed in this paper. Based on this model, a QoS routing algorithm which applies well in Multi-Sink Wireless Multimedia Sensor Networks is put forward in this paper. Better multi path and balance on the energy consumption among network nodes can be obtained from this algorithm. Thus, our proposal can help to achieve the optimization on the building and choosing of multi path routing. Simulation results indicate that our algorithm can lead to more rational energy distribution among nodes and higher energy efficiency during data transmission.
Based on the security requirement of mobile agent system, especially for the access control problem, we study the characterister of present mobile agent system, and find out its limitation. Using the advantage of PKI/...
详细信息
暂无评论