• Title/Summary/Keyword: Approach of Network

Search Result 4,556, Processing Time 0.037 seconds

Learning Automata Based Multipath Multicasting in Cognitive Radio Networks

  • Ali, Asad;Qadir, Junaid;Baig, Adeel
    • Journal of Communications and Networks
    • /
    • v.17 no.4
    • /
    • pp.406-418
    • /
    • 2015
  • Cognitive radio networks (CRNs) have emerged as a promising solution to the problem of spectrum under utilization and artificial radio spectrum scarcity. The paradigm of dynamic spectrum access allows a secondary network comprising of secondary users (SUs) to coexist with a primary network comprising of licensed primary users (PUs) subject to the condition that SUs do not cause any interference to the primary network. Since it is necessary for SUs to avoid any interference to the primary network, PU activity precludes attempts of SUs to access the licensed spectrum and forces frequent channel switching for SUs. This dynamic nature of CRNs, coupled with the possibility that an SU may not share a common channel with all its neighbors, makes the task of multicast routing especially challenging. In this work, we have proposed a novel multipath on-demand multicast routing protocol for CRNs. The approach of multipath routing, although commonly used in unicast routing, has not been explored for multicasting earlier. Motivated by the fact that CRNs have highly dynamic conditions, whose parameters are often unknown, the multicast routing problem is modeled in the reinforcement learning based framework of learning automata. Simulation results demonstrate that the approach of multipath multicasting is feasible, with our proposed protocol showing a superior performance to a baseline state-of-the-art CRN multicasting protocol.

Multi-Obfuscation Approach for Preserving Privacy in Smart Transportation

  • Sami S. Albouq;Adnan Ani Sen;Nabile Almoshfi;Mohammad Bin Sedeq;Nour Bahbouth
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.139-145
    • /
    • 2023
  • These days, protecting location privacy has become essential and really challenging, especially protecting it from smart applications and services that rely on Location-Based Services (LBS). As the technology and the services that are based on it are developed, the capability and the experience of the attackers are increased. Therefore, the traditional protection ways cannot be enough and are unable to fully ensure and preserve privacy. Previously, a hybrid approach to privacy has been introduced. It used an obfuscation technique, called Double-Obfuscation Approach (DOA), to improve the privacy level. However, this approach has some weaknesses. The most important ones are the fog nodes that have been overloaded due to the number of communications. It is also unable to prevent the Tracking and Identification attacks in the Mix-Zone technique. For these reasons, this paper introduces a developed and enhanced approach, called Multi-Obfuscation Approach (MOA that mainly depends on the communication between neighboring fog nodes to overcome the drawbacks of the previous approach. As a result, this will increase the resistance to new kinds of attacks and enhance processing. Meanwhile, this approach will increase the level of the users' privacy and their locations protection. To do so, a big enough memory is needed on the users' sides, which already is available these days on their devices. The simulation and the comparison prove that the new approach (MOA) exceeds the DOA in many Standards for privacy protection approaches.

Android malicious code Classification using Deep Belief Network

  • Shiqi, Luo;Shengwei, Tian;Long, Yu;Jiong, Yu;Hua, Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.454-475
    • /
    • 2018
  • This paper presents a novel Android malware classification model planned to classify and categorize Android malicious code at Drebin dataset. The amount of malicious mobile application targeting Android based smartphones has increased rapidly. In this paper, Restricted Boltzmann Machine and Deep Belief Network are used to classify malware into families of Android application. A texture-fingerprint based approach is proposed to extract or detect the feature of malware content. A malware has a unique "image texture" in feature spatial relations. The method uses information on texture image extracted from malicious or benign code, which are mapped to uncompressed gray-scale according to the texture image-based approach. By studying and extracting the implicit features of the API call from a large number of training samples, we get the original dynamic activity features sets. In order to improve the accuracy of classification algorithm on the features selection, on the basis of which, it combines the implicit features of the texture image and API call in malicious code, to train Restricted Boltzmann Machine and Back Propagation. In an evaluation with different malware and benign samples, the experimental results suggest that the usability of this method---using Deep Belief Network to classify Android malware by their texture images and API calls, it detects more than 94% of the malware with few false alarms. Which is higher than shallow machine learning algorithm clearly.

Gene Co-Expression Network Analysis of Reproductive Traits in Bovine Genome

  • Lim, Dajeong;Cho, Yong-Min;Lee, Seung-Hwan;Chai, Han-Ha;Kim, Tae-Hun
    • Reproductive and Developmental Biology
    • /
    • v.37 no.4
    • /
    • pp.185-192
    • /
    • 2013
  • Many countries have implemented genetic evaluation for fertility traits in recent years. In particular, reproductive trait is a complex trait and need to require a system-level approach for identifying candidate genes related to the trait. To find the candidate gene associated with reproductive trait, we applied a weighted gene co-expression network analysis from expression value of bovine genes. We identified three co-expressed modules associated with reproductive trait from bovine microarray data. Hub genes (ZP4, FHL2 and EGR4) were determined in each module; they were topologically centered with statistically significant value in the gene co-expression network. We were able to find the highly co-expressed gene pairs with a correlation coefficient. Finally, the crucial functions of co-expressed modules were reported from functional enrichment analysis. We suggest that the network-based approach in livestock may an important method for analyzing the complex effects of candidate genes associated with economic traits like reproduction.

A network-biology approach for identification of key genes and pathways involved in malignant peritoneal mesothelioma

  • Mahfuz, A.M.U.B.;Zubair-Bin-Mahfuj, A.M.;Podder, Dibya Joti
    • Genomics & Informatics
    • /
    • v.19 no.2
    • /
    • pp.16.1-16.14
    • /
    • 2021
  • Even in the current age of advanced medicine, the prognosis of malignant peritoneal mesothelioma (MPM) remains abysmal. Molecular mechanisms responsible for the initiation and progression of MPM are still largely not understood. Adopting an integrated bioinformatics approach, this study aims to identify the key genes and pathways responsible for MPM. Genes that are differentially expressed in MPM in comparison with the peritoneum of healthy controls have been identified by analyzing a microarray gene expression dataset. Gene Ontology and Kyoto Encyclopedia of Genes and Genomes pathway analyses of these differentially expressed genes (DEG) were conducted to gain a better insight. A protein-protein interaction (PPI) network of the proteins encoded by the DEGs was constructed using STRING and hub genes were detected analyzing this network. Next, the transcription factors and miRNAs that have possible regulatory roles on the hub genes were detected. Finally, survival analyses based on the hub genes were conducted using the GEPIA2 web server. Six hundred six genes were found to be differentially expressed in MPM; 133 are upregulated and 473 are downregulated. Analyzing the STRING generated PPI network, six dense modules and 12 hub genes were identified. Fifteen transcription factors and 10 miRNAs were identified to have the most extensive regulatory functions on the DEGs. Through bioinformatics analyses, this work provides an insight into the potential genes and pathways involved in MPM.

A Dual-scale Network with Spatial-temporal Attention for 12-lead ECG Classification

  • Shuo Xiao;Yiting Xu;Chaogang Tang;Zhenzhen Huang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2361-2376
    • /
    • 2023
  • The electrocardiogram (ECG) signal is commonly used to screen and diagnose cardiovascular diseases. In recent years, deep neural networks have been regarded as an effective way for automatic ECG disease diagnosis. The convolutional neural network is widely used for ECG signal extraction because it can obtain different levels of information. However, most previous studies adopt single scale convolution filters to extract ECG signal features, ignoring the complementarity between ECG signal features of different scales. In the paper, we propose a dual-scale network with convolution filters of different sizes for 12-lead ECG classification. Our model can extract and fuse ECG signal features of different scales. In addition, different spatial and time periods of the feature map obtained from the 12-lead ECG may have different contributions to ECG classification. Therefore, we add a spatial-temporal attention to each scale sub-network to emphasize the representative local spatial and temporal features. Our approach is evaluated on PTB-XL dataset and achieves 0.9307, 0.8152, and 89.11 on macro-averaged ROC-AUC score, a maximum F1 score, and mean accuracy, respectively. The experiment results have proven that our approach outperforms the baselines.

A Prediction of the Indoor Contaminant diffusion using Network Simulation (시뮬레이션을 통한 실내 오염물질 확산의 예측 방법)

  • Kang, Ki-Nam;Song, Doo-Sam
    • Proceedings of the SAREK Conference
    • /
    • 2006.06a
    • /
    • pp.311-318
    • /
    • 2006
  • CFD simulation is a tool very useful to predict the generation and absorption of the contaminant from the construction materials for the single room condition. However, there is a limit in multi-room simulation for analyzing air movement and contaminant concentration at the condition that the door of each room was closed. A lot of network simulation tool were developed which can used to analyze the mass transfer and contaminant concentration as results in the multi-room condition. However, existing network simulation method was not able to analyze the change of the heating and cooling load with the ventilation as though the change of the indoor air-pollution density was predictable. In this study, new approach to predict heating/cooling load and indoor contaminant concentration will be reviewed. New indoor contaminant concentration module reviewed in this study wad coupled with existing ESP-r network simulation method. The validity of new approach will be analysed for comparison the results of simulation and field measurement results.

  • PDF

Real-time prediction of dynamic irregularity and acceleration of HSR bridges using modified LSGAN and in-service train

  • Huile Li;Tianyu Wang;Huan Yan
    • Smart Structures and Systems
    • /
    • v.31 no.5
    • /
    • pp.501-516
    • /
    • 2023
  • Dynamic irregularity and acceleration of bridges subjected to high-speed trains provide crucial information for comprehensive evaluation of the health state of under-track structures. This paper proposes a novel approach for real-time estimation of vertical track dynamic irregularity and bridge acceleration using deep generative adversarial network (GAN) and vibration data from in-service train. The vehicle-body and bogie acceleration responses are correlated with the two target variables by modeling train-bridge interaction (TBI) through least squares generative adversarial network (LSGAN). To realize supervised learning required in the present task, the conventional LSGAN is modified by implementing new loss function and linear activation function. The proposed approach can offer pointwise and accurate estimates of track dynamic irregularity and bridge acceleration, allowing frequent inspection of high-speed railway (HSR) bridges in an economical way. Thanks to its applicability in scenarios of high noise level and critical resonance condition, the proposed approach has a promising prospect in engineering applications.

A Systems Engineering Approach to Real-Time Data Communication Network for the APR1400

  • Ibrahim, Ahmad Salah;Jung, Jae-cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.13 no.2
    • /
    • pp.9-17
    • /
    • 2017
  • Concept development of a real-time Field Programmable Gate Array (FPGA)-based switched Ethernet data communication network for the Man-Machine Interface System (MMIS) is presented in this paper. The proposed design discussed in this research is based on the systems engineering (SE) approach. The design methodology is effectively developed by defining the concept development stage of the life-cycle model consisting of three successive phases, which are developed and discussed: needs analysis; concept exploration; and concept definition. This life-cycle model is used to develop an FPGA-based time-triggered Ethernet (TTE) switched data communication network for the non-safety division of MMIS system to provide real-time data transfer from the safety control systems to the non-safety division of MMIS and between the non-safety systems including control, monitoring, and information display systems. The original IEEE standard 802.3 Ethernet networks were not typically designed or implemented for providing real-time data transmission, however implementing a network that provides both real-time and on-demand data transmission is achievable using the real-time Ethernet technology. To develop the design effectively, context diagrams are implied. Conformance to the stakeholders needs, system requirements, and relevant codes and standards together with utilizing the TTE technology are used to analyze, synthesize, and develop the MMIS non-safety data communication network of the APR1400 nuclear power plant.

Coding-based Storage Design for Continuous Data Collection in Wireless Sensor Networks

  • Zhan, Cheng;Xiao, Fuyuan
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.493-501
    • /
    • 2016
  • In-network storage is an effective technique for avoiding network congestion and reducing power consumption in continuous data collection in wireless sensor networks. In recent years, network coding based storage design has been proposed as a means to achieving ubiquitous access that permits any query to be satisfied by a few random (nearby) storage nodes. To maintain data consistency in continuous data collection applications, the readings of a sensor over time must be sent to the same set of storage nodes. In this paper, we present an efficient approach to updating data at storage nodes to maintain data consistency at the storage nodes without decoding out the old data and re-encoding with new data. We studied a transmission strategy that identifies a set of storage nodes for each source sensor that minimizes the transmission cost and achieves ubiquitous access by transmitting sparsely using the sparse matrix theory. We demonstrate that the problem of minimizing the cost of transmission with coding is NP-hard. We present an approximation algorithm based on regarding every storage node with memory size B as B tiny nodes that can store only one packet. We analyzed the approximation ratio of the proposed approximation solution, and compared the performance of the proposed coding approach with other coding schemes presented in the literature. The simulation results confirm that significant performance improvement can be achieved with the proposed transmission strategy.