A three-stage heuristic combined Hopfield neural network for channel assignment problem in cellular mobile system
A three-stage algorithm of combining sequential heuristic methods into a Hopfield neural network is presented for the channel assignment problem in cellular mobile communication systems in this paper. The goal of this problem is to find a channel assignment to requested calls with the minimum number of channels subject to interference constraints between channels. The three-stage algorithm consists of: 1) the regular interval assignment stage; 2) the greedy assignment stage; and 3) the neural-network assignment stage. In the first stage, the calls in a cell determining the lower bound on the total number of channels are assigned channels at regular intervals. In the second stage, the calls in a cell with the largest degree and its adjacent cells are assigned channels by a greedy heuristic method. In the third stage, the calls in the remaining cells are assigned channels by a Hopfield neural network. The performance is verified through solving well-known benchmark problems. Especially for Sivarajan’s benchmark problems, my three-stage algorithm first achieves the lower bound solutions in all of the 12 instances.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
SODRRP: A secure on demand route routing protocol in MANET
Ad-hoc networks, due to their improvised nature, are frequently established insecure environments, which makes them susceptible to attacks. These attacks are launched by participating malicious nodes against different network services. Routing protocols, which act as the binding force in these networks, are a common target of these nodes. On Demand Route Routing Protocol (ODRRP) is a Broadcast Reply network routing protocol for Mobile Ad hoc Network (MANET). Black hole attack is one of the severe security threats in ad-hoc networks which can be easily employed by exploiting vulnerability of on-demand routing protocols such as ODRRP. In this paper we proposed a solution for identifying the malicious node in ODRRP protocol suffering from black hole attack.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Energy Aware Load Balancing With False Temporal Pattern Identification for Wireless Sensor Networks
Load balancing using clustering can increase network scalability. This paper attempting to apply efficient techniques of load, energy and security such that network life can be increased with security and also its reliability. Continuous aggregation is required in sensor applications to obtain the temporal variation information of aggregates. It helps the users to understand how the environment changes over time and track real time measurements for trend analysis. Due to the high frequency and the long period of a continuous aggregation in every epoch, the false temporal variation pattern would incur a great communication cost. In this paper, we propose a clustering technique which will balance the load among the cluster by using some backup nodes. In the continuous aggregation, the attacker could manipulate a series of aggregation results through compromised nodes to fabricate false temporal variation patterns of the aggregates .We detect and verify a false temporal variations pattern by checking only a small part of aggregation results to reduces a verification cost. A sampling based approach is used to check the aggregation results and we also proposed a security mechanisms to protect the sampling process.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Analysis of Secure key management scheme for dynamic hierarchical access control based on ECC and diffie-hellman key exchange protocol
An access control mechanism in a user hierarchy is used to provide the management of sensitive information for authorized users. The users and their own information can be organized into a number of disjoint sets of security classes according to their responsibilities. Each security class in a user hierarchy is assigned an encryption key and can derive the encryption keys of all lower security classes according to predefined partially ordered relation. In 2006, Jeng and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, pointed out that Jeng–Wang scheme is vulnerable to the so-called compromising attack that the secret keys of some security classes can be compromised by any adversary if some public information modified. We further proposed a secure key management scheme based on elliptic curve cryptosystems to eliminate the pointed out the security leak and provide better security requirements. As compared with Jeng and Wang’s scheme (Jeng and Wang, 2006), the proposed scheme has the following properties. (i) It is simple to execute the key generation and key derivation phases. (ii) It is easily to address dynamic access control when a security class is added into or deleted from the hierarchy. (iii) It is secure against some potential attacks. (iv) The required storage of the public/secret parameters is constant.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
On Demand Route Routing Protocol (ODRRP) in MANET
Mobile ad hoc networks (MANET) play an important role in connecting devices in pervasive environments. Each node in MANET can act as source and router. In this paper, we propose a On Demand Route Routing Protocol (ODRRP) with Broadcast Reply which combines the merits of both proactive and reactive approach. Like proactive approach, it maintains routing table at every node. However, it differs from proactive approach; that the routing table is not built prior to communication. Routing table is built in incremental steps during route discovery. Route discovery takes place like reactive approach only on demand. ODRRP takes advantage of broadcast nature in MANET for route discovery and store maximum information in the routing tables at each node. Broadcast natures avoid handshaking of RTS and CTS and effectively utilize trans-receiver antennas which reduce power consumption and effectively utilize bandwidth. The simulation of ODRRP carried out in network simulator (NS-2.32) which shows significant improvement in packet delivery ratio.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Soft computing technique based intelligent call admission control decision mechanism
The decision Mechanism is the concluding phase of any decision making process. This paper discusses on the different methodologies available for implementing the decision mechanisms. The paper preambles with a brief description on set of conventional MCDM techniques like Analytical Hierarchy Process (AHP), Simple Additive weighting Method (SAW) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS), Grey Rational Analysis (GRA), along with benefits and limitations of each technique. The different intelligent/soft computing techniques that are widely used in decision making processes like fuzzy logic, neural networks are discussed and finally confines the discussion is confined to the different neural network (NN) based decision support systems. The paper proposes an architecture for fuzzy neural network based call admission control decision mechanism for heterogeneous wireless networks environment.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Assessment of Thai Broadband Policy and Progress
The paper evaluates the effectiveness of recent initiatives introduced by the Royal Thai Government proliferate Broadband services in Thailand. With globalization, the society is constantly changing resulting by information technology and Internet access to play an important role in communication, social, political, economic or even environmental. Because of the rapid-technological advancement, it causes that many countries moving up their focus on developing infrastructure to enhance the information technology and innovation. The data transmission not only text messages but also pictures such as VDO conference is important to make use of information technology is faster and more efficient. The perception is very convenient and fast and hence requires a good core broadband infrastructure. The role of Information and Communication Technology infrastructure (ICT infrastructure) enables leaders on governments’ decision based on the real time and reliable information. Of course, the government leaders in many countries realized that the quality and performance on ICT infrastructure would directly affect developing countries. In order to monitor the countries in the crisis situation, the stable and qualified network is required which the government called as S-M-A-R-T network. Under ICT2020 Policy Framework and Broadband Policy, Ministry of ICT accelerates connected S-M-A-R-T network to develop ICT infrastructure in Thailand recently. On another hand, Thailand economy is also important mechanism for strengthening competitiveness. The new business opportunities with many other countries have defined a policy and planning in developing Broadband seriously and continuously. In this paper, the study will identify the policies and plans of development and building broadband infrastructure of the leaders in the development of broadband top of the world, including Japan, South Korea, Singapore, The United States, Australia and Sweden, a country that have a clear policy and plan development. The projects initiated and measures taken by the Government of Thailand in the broadband sector have been studied. The information has been gathered by interacting with the executive officers of the National Broadcasting and Telecommunications Commission (NBTC), Ministry of Information Communication and Technology, Thailand, from interviewing the officers of government departments: Ministry of Education (MOE), Ministry of Public Health (MOH) and etc.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Structural Elucidation of Eudesmane Sesquiterpenes using GRNN and Scatter Plots
This study seeks to achieve a complete elucidation of structures of unknown Eudesmane sesquiterpenes from their 13C values. The 13C values for each of the fifteen (15) positions of the skeletons of the Eudesmane compounds were predicted using Generalized Regression Neural Network (GRNN). From the predicted 13C values, GRNN and Scatter Plot methods were used to predict the substituents attached to each position on the skeleton of the Eudesmane compounds. Recognition of the test compounds ranged between 40 and 100%. GRNN and Scatter plots demonstrated great potential for use in the structural elucidation of unknown compounds from 13C values.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Implementation of Advanced Network Intrusion Detection and Prevention System Using Rule Based Mining Techniques
This paper explores the detail implementation & experimental analysis of Advanced Network Intrusion Detection & Pretension System (ANIDPS). This advanced system mines anomalous traffic episodes from internet connection and reduced false positive rate by providing detection of 1. Known Intrusion using misuses or signature based Intrusion Detection System (IDS) by finding known intrusion or attack from existing intrusion signature database. 2. Unknown Intrusion using potentials of anomaly based Intrusion Detection System (IDS) If one of the intrusion detected mention above, system generate alert and apply the prevention policies to avoid further massive damaged to credentials, resources of the organization. Further this system generates new intrusion signature from Unknown Intrusion & store them back into signature database to speedup detection capability of this system in next computation. In this system the data mining approach is used to handle large amount of data captured in the internet, to improve its execution time & to give fast response to network administrator for prevention of data resource with minimum user interaction. In experimental analyses, this system gives improved & effective result in comparison with existing IDS & minimize the false positive rate
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]