• Title/Summary/Keyword: phases of network

Search Result 278, Processing Time 0.02 seconds

Enhancing the Quality of Service by GBSO Splay Tree Routing Framework in Wireless Sensor Network

  • Majidha Fathima K. M.;M. Suganthi;N. Santhiyakumari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2188-2208
    • /
    • 2023
  • Quality of Service (QoS) is a critical feature of Wireless Sensor Networks (WSNs) with routing algorithms. Data packets are moved between cluster heads with QoS using a number of energy-efficient routing techniques. However, sustaining high scalability while increasing the life of a WSN's networks scenario remains a challenging task. Thus, this research aims to develop an energy-balancing component that ensures equal energy consumption for all network sensors while offering flexible routing without congestion, even at peak hours. This research work proposes a Gravitational Blackhole Search Optimised splay tree routing framework. Based on the splay tree topology, the routing procedure is carried out by the suggested method using three distinct steps. Initially, the proposed GBSO decides the optimal route at initiation phases by choosing the root node with optimum energy in the splay tree. In the selection stage, the steps for energy update and trust update are completed by evaluating a novel reliance function utilising the Parent Reliance (PR) and Grand Parent Reliance (GPR). Finally, in the routing phase, using the fitness measure and the minimal distance, the GBSO algorithm determines the best route for data broadcast. The model results demonstrated the efficacy of the suggested technique with 99.52% packet delivery ratio, a minimum delay of 0.19 s, and a network lifetime of 1750 rounds with 200 nodes. Also, the comparative analysis ensured that the suggested algorithm surpasses the effectiveness of the existing algorithm in all aspects and guaranteed end-to-end delivery of packets.

Mobile Ultra-Broadband, Super Internet-of-Things and Artificial Intelligence for 6G Visions

  • Hamza Ali Alshawabkeh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.235-245
    • /
    • 2023
  • Smart applications based on the Network of Everything also known as Internet of Everything (IoE) are increasing popularity as network connectivity requires rise further. As a result, there will be a greater need for developing 6G technologies for wireless communications in order to overcome the primary limitations of visible 5G networks. Furthermore, implementing neural networks into 6G will bring remedies for the most complex optimizing networks challenges. Future 6G mobile phone networks must handle huge applications that require data and an increasing amount of users. With a ten-year time skyline from thought to the real world, it is presently time for pondering what 6th era (6G) remote correspondence will be just before 5G application. In this article, we talk about 6G dreams to clear the street for the headway of 6G and then some. We start with the conversation of imaginative 5G organizations and afterward underline the need of exploring 6G. Treating proceeding and impending remote organization improvement in a serious way, we expect 6G to contain three critical components: cell phones super broadband, very The Web of Things (or IoT and falsely clever (artificial intelligence). The 6G project is currently in its early phases, and people everywhere must envision and come up with its conceptualization, realization, implementation, and use cases. To that aim, this article presents an environment for Presented Distributed Artificial Intelligence as-a-Services (DAIaaS) supplying in IoE and 6G applications. The case histories and the DAIaaS architecture have been evaluated in terms of from end to end latency and bandwidth consumption, use of energy, and cost savings, with suggestion to improve efficiency.

Design and Verification of IEEE 802.15.4 LR-WPAN 2.4GHz Base-band for Ubiquitous Sensor Network (유비쿼터스 센서 네트워크를 위한 IEEE 802.15.4 LR-WPAN 2.4GHz 베이스 밴드 설계 및 검증)

  • Lee Seung-Yerl;Kim Dong-Sun;Kim Hyun-Sick;Chung Duck-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.1 s.343
    • /
    • pp.49-56
    • /
    • 2006
  • This paper describes the design and the verification of IEEE 802.15.4 LR-WPAN 2.4GHz Physical layer for Ubiquitous Sensor Network(USN). We designed the Carrier Frequency Offset(CFO) compensation satisfied the frequency tolerance of IEEE 802.15.4 LR-WPAN and the adaptive matched filter that re-setting of the threshold for the symbol synchronization of the various USN environment. The multiplications is reduced 1/16 by this method each other at i, q phases and has 0.5dB performance improvement in detection probability. Proposed baseband system is designed with verilog HDL and implemented using FPGA prototype board.

Design and Implementation of A Section-Specific QoE Frame for Efficient QoE Measurement (구간별 QoE 프레임을 이용한 QoE 네트워크 설계 및 구현)

  • Cho, Sungchol;Han, Li;Sun, Shimin;Jin, Xianshu;Liu, Jing;Han, Sunyoung
    • Journal of KIISE:Information Networking
    • /
    • v.41 no.4
    • /
    • pp.151-166
    • /
    • 2014
  • The present method of measuring QoE (Quality of Experience) was to measure the whole block from the server that provides service to the terminal that the client gets the service. In this way, it was possible to simply determine whether the quality of QoE was good or not, and when the quality of QoE became bad, there was no way of presenting solutions. Also, as QoE metrics are numerous, there has been no strict regulation on how to use. This study analyzed QoE metrics in the viewpoints of network and clients, subdivided the whole service into three phases including one from the server providing the service to the router, another from the router to the terminal getting the service, and the third from the service router to the client router, and presented QoE metric frames appropriate for each phase. Through this, in the KOREN-CERNET environment, this study designed and embodied QoE network and demonstrated stability of QoE network, reduction in client complaint settlement time, and content adjustment effect according to the network change.

AVOIDITALS: Enhanced Cyber-attack Taxonomy in Securing Information Technology Infrastructure

  • Syafrizal, Melwin;Selamat, Siti Rahayu;Zakaria, Nurul Azma
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.1-12
    • /
    • 2021
  • An operation of an organization is currently using a digital environment which opens to potential cyber-attacks. These phenomena become worst as the cyberattack landscape is changing rapidly. The impact of cyber-attacks varies depending on the scope of the organization and the value of assets that need to be protected. It is difficult to assess the damage to an organization from cyberattacks due to a lack of understanding of tools, metrics, and knowledge on the type of attacks and their impacts. Hence, this paper aims to identify domains and sub-domains of cyber-attack taxonomy to facilitate the understanding of cyber-attacks. Four phases are carried in this research: identify existing cyber-attack taxonomy, determine and classify domains and sub-domains of cyber-attack, and construct the enhanced cyber-attack taxonomy. The existing cyber-attack taxonomies are analyzed, domains and sub-domains are selected based on the focus and objectives of the research, and the proposed taxonomy named AVOIDITALS Cyber-attack Taxonomy is constructed. AVOIDITALS consists of 8 domains, 105 sub-domains, 142 sub-sub-domains, and 90 other sub-sub-domains that act as a guideline to assist administrators in determining cyber-attacks through cyber-attacks pattern identification that commonly occurred on digital infrastructure and provide the best prevention method to minimize impact. This research can be further developed in line with the emergence of new types and categories of current cyberattacks and the future.

Self-Identification of Boundary's Nodes in Wireless Sensor Networks

  • Moustafa, Kouider Elouahed;Hafid, Haffaf
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.128-140
    • /
    • 2017
  • The wireless sensor networks (WSNs) became a very essential tool in borders and military zones surveillance, for this reason specific applications have been developed. Surveillance is usually accomplished through the deployment of nodes in a random way providing heterogeneous topologies. However, the process of the identification of all nodes located on the network's outer edge is very long and energy-consuming. Before any other activities on such sensitive networks, we have to identify the border nodes by means of specific algorithms. In this paper, a solution is proposed to solve the problem of energy and time consumption in detecting border nodes by means of node selection. This mechanism is designed with several starter nodes in order to reduce time, number of exchanged packets and then, energy consumption. This method consists of three phases: the first one is to detect triggers which serve to start the mechanism of boundary nodes (BNs) detection, the second is to detect the whole border, and the third is to exclude each BN from the routing tables of all its neighbors so that it cannot be used for the routing.

Adversarial Machine Learning: A Survey on the Influence Axis

  • Alzahrani, Shahad;Almalki, Taghreed;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.193-203
    • /
    • 2022
  • After the everyday use of systems and applications of artificial intelligence in our world. Consequently, machine learning technologies have become characterized by exceptional capabilities and unique and distinguished performance in many areas. However, these applications and systems are vulnerable to adversaries who can be a reason to confer the wrong classification by introducing distorted samples. Precisely, it has been perceived that adversarial examples designed throughout the training and test phases can include industrious Ruin the performance of the machine learning. This paper provides a comprehensive review of the recent research on adversarial machine learning. It's also worth noting that the paper only examines recent techniques that were released between 2018 and 2021. The diverse systems models have been investigated and discussed regarding the type of attacks, and some possible security suggestions for these attacks to highlight the risks of adversarial machine learning.

A Study on the Analysis and Limitations of the Same Phase Identification Under 3-Phase Unbalanced Constant Current Loads (3상 불평형 정전류 부하 조건에서의 동 위상 판별에 대한 분석 및 한계에 관한 연구)

  • Byun, Hee-Jung;Shon, Su-Goog
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.26 no.6
    • /
    • pp.38-46
    • /
    • 2012
  • In this paper, the necessity for the identification of the absolute phase value is introduced and analyzed for a particular conductor line of a 3-phase type distribution network and the recent methods are also introduced. For the determination of the exact phase value for a specific point in the line, as compared with the phase reference point, the measured phase value must be within a range of ${\pm}60[^{\circ}]$. However, the phase of a particular point can fluctuate depending on the line constant, transformer wiring method, line length, line amperage, etc. A theoretical formulation such as Simulink modeling and analysis for a distribution network are conducted for the identification of phase at a specific point in the line. In particular, through evaluating the effects of unbalanced current loads at the time of determination of the phase value, the limitations of the present method for the determination of phases is described.

A Framework for Universal Cross Layer Networks

  • Khalid, Murad;Sankar, Ravi;Joo, Young-Hoon;Ra, In-Ho
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.4
    • /
    • pp.239-247
    • /
    • 2008
  • In a resource-limited wireless communication environment, various approaches to meet the ever growing application requirements in an efficient and transparent manner, are being researched and developed. Amongst many approaches, cross layer technique is by far one of the significant contributions that has undoubtedly revolutionized the way conventional layered architecture is perceived. In this paper, we propose a Universal Cross Layer Framework based on vertical layer architecture. The primary contribution of this paper is the functional architecture of the vertical layer which is primarily responsible for cross layer interaction management and optimization. The second contribution is the use of optimization cycle that comprises awareness parameters collection, mapping, classification and the analysis phases. The third contribution of the paper is the decomposition of the parameters into local and global network perspective for opportunistic optimization. Finally, we have shown through simulations how parameters' variations can represent local and global views of the network and how we can set local and global thresholds to perform opportunistic optimization.

Approximate Life Cycle Assessment of Product Concepts Using Multiple Regression Analysis and Artificial Neural Networks

  • Park, Ji-Hyung;Seo, Kwang-Kyu
    • Journal of Mechanical Science and Technology
    • /
    • v.17 no.12
    • /
    • pp.1969-1976
    • /
    • 2003
  • In the early phases of the product life cycle, Life Cycle Assessment (LCA) is recently used to support the decision-making for the product concepts, and the best alternative can be selected based on its estimated LCA and benefits. Both the lack of detailed information and time for a full LCA for a various range of design concepts need a new approach for the environmental analysis. This paper explores a new approximate LCA methodology for the product concepts by grouping products according to their environmental characteristics and by mapping product attributes into environmental impact driver (EID) index. The relationship is statistically verified by exploring the correlation between total impact indicator and energy impact category. Then, a neural network approach is developed to predict an approximate LCA of grouping products in conceptual design. Trained learning algorithms for the known characteristics of existing products will quickly give the result of LCA for newly designed products. The training is generalized by using product attributes for an EID in a group as well as another product attributes for the other EIDs in other groups. The neural network model with back propagation algorithm is used, and the results are compared with those of multiple regression analysis. The proposed approach does not replace the full LCA but it would give some useful guidelines for the design of environmentally conscious products in conceptual design phase.