by of Journal of Software. All rights reserved. Tel/Fax:
|
|
- Marilyn O’Connor’
- 5 years ago
- Views:
Transcription
1 ISSN , CODEN RUXUEW Journal of Software, Vol17, Supplement, November 2006, pp http//wwwjosorgcn 2006 by of Journal of Software All rights reserved Tel/Fax Ad Hoc +, (, ) Security Analysis for Ad Hoc Routing Protocols Based on Improved Strand Space WANG Ji-Zhi +, WANG Ying-Long (Shandong Computer Science Center, Ji nan , China) + Corresponding author Phn , Fax , wangjzh@keylabnet Wang JZ, Wang YL Security analysis for ad hoc routing protocols based on improved strand space Journal of Software, 2006,17(Suppl) http//wwwjosorgcn/ /17/s256htm Abstract Based on the characteristics of Ad Hoc mobile network, the paper redefines the consistency conditions for the normal operation of the protocol and at the same time adds intermediator credibility condition, thus adapts the strand space method to the security analysis for Ad Hoc routing protocols The SRP protocol is taken as an example for the analysis of its security and the valuable results have been obtained Key words strand space secure protocol consistency condition intermediator credibility condition Ad Hoc,, Ad Hoc SRP,, Ad Hoc,, 1) 2), 3),, 4),,,,,, 1),, Supported by the Natural Science Foundation of Shandong Province of China under Grant NoQ2005G02 ( ) Received Accepted
2 Ad Hoc 257 2), 3),,,,, 4),,,, Ad Hoc,, Ad Hoc, Ad Hoc, Ad Hoc [1] 1 (Σ,tr), Σ,,tr Σ A( ) A, A t 0 t 1 t 0 t 1 1 σ,α, α A,σ +, +t t, ( A) 2 A Σ,, Σ, ( A), Σ,,, 3 1) n s,i s Σ,i,, N 2) n 1,n 2 N, n 1 n 2 n 1 =+a,n 2 = a, a n 1 n 2 3) n 1,n 2 N, n 1 n 2 n 1 n 2, n 2 n 1 4) t n, n t term(n), n n,t term(n ) 5) t n t n, 6) I, n N I term(n)=+a,(t I), n n 1,term(n 1 ) I 7) t n, n t term(n), n n,t term(n ) 4 c, c, c= N c,( c c ) N,( ), c, (1) c (2) n 2 N c term(n 2 ), n 1 n 1 c n 2 (3) n 2 N c n 1 n 2, n 1 c n 2 (4) c ( ),,, 5 n c= N c,( c c ), n c s c, N c c, s c-height i s,i c,c-trace(s)= tr(s)(1),,tr(s)(m), m=c-height(s) 2,
3 258 Journal of Software Vol17, Supplement, November 2006, k p, M +t, F t, T g+g+g,, C g h+gh, g,h, gh S gh+g+h,, g h K +k, k E k h+{h} k, h, k, D k 1 {h} k +h, {h}k,, h 3, 1) B( ) X, B X A( ), A X, B 2) B X A( ),, A X, B, A B, B, 4, Ad Hoc [2,11,12], Ad Hoc [3], Ad Hoc,,, Ad Hoc,,, Ad Hoc,,,,, [4,11],,,, Ad Hoc,, Ad Hoc,, B X A( ),, A X, B( ), A X B( ),, B X, A( )
4 Ad Hoc 259 A B X, X, X A B( ),,, 5 SRP SRP [5 8],, [9,10] (, ) S R Message1 R D Message2 D R Message3 R S Message4,S,D,R,Message N a,k a,k 1 a,k ab,, K h ( ),, Adhoc,,, R, SRP, A R A,N a,{n a,k ab }K h R B A,R,N a,{n a,k ab }K h B R A,R,N b,{a,r,n b,k ab }K h R A A,R,N b,{a,r,n b,k ab }K h,a,b,r 51, N a,n b,k ab,k h,a,r +A,N a,{n a,k ab }K h A,R,N b,{a,r,n b,k ab }K h N a,n b,k ab,k h,a,r A,R,N a,{n a,k ab }K h +A,R,N b,{a,r,n b,k ab }K h N a,n b,k h,a,r A,N a,{n a,k ab }K h +A,R,N a,{n a,k ab }K h A,R,N b,{a,r,n b,k ab }K h +A,R,N b,{a,r,n b,k ab }K h,, 52 Σ,C, Resp[]K ab K p N a N b,n b Σ, C Init[] r,1 M K ab K p, r,1 M F r,1, F
5 260 Journal of Software Vol17, Supplement, November 2006 T r,1 T C g=a,n a,h={n a,k ab }K h, K h, N a r,1 C S r,1 S K r,1 K E K ab K p, r,1 E D K h, r,1 D, r,2 M K ab K p, r,2 M F r,2 F T r,2 T C g=a,r,n b,h={a,r,n b,k ab }K h, N b Σ, r,2 C S r,2 S K r,2 K E K ab K p, r,2 E D K h, r,2 D,,,, 53,,, SRP, r,2 C, r,2 M K ab K p, r,2 M F r,2, F T r,2 T C g=a,n a,{n a,k ab }K h,h=r,gh=a,r,n a,{n a,k ab }K h, C S r,2 S K r,2 K E K ab K p, r,2 E D K h, r,2 D, ( P ) A P B A, N a,{ N a, K ab } K h A, R, N a,{ N a, K ab } K h A, R, N b,{ A, R, N b, K ab } K h A, R, N b,{ A, R, N b, K ab } K h,, SRP, [6] SRP
6 Ad Hoc 261 6,,,,,,,,,,,,, References [1] Fan H, Feng DG Theory and Method of Secure Protocols Beijing Science Press, 2003 (in Chinese) [2] Ying C, Shi ML The architecture of the self-organized network Journal of Communications, 1999,20(9)47 54 (in Chinese with English abstract) [3] Qing SH Twenty years development of security protocols research Journal of Software, 2003,14(10) (in Chinese with English abstract) http//wwwjosorgcn/ /14/1740htm [4] Perkins CE, Royer EM Ad Hoc on-demand distance vector routing In Proc of the 2nd IEEE Workshop on Mobile Computing Systems and Applications New Orleans, [5] Gong L, Needham R, Yahalom R Reasoning about belief in cryptography protocols In Proc of the 1990 IEEE Symp on Research in Security and Privacy Oakland, [6] Buttyan L, Vajda I Towards provable security for Ad Hoc routing protocols 2004 http//eprintiacrorg/2004/159pdf [7] Papadimitratos P, Haas ZJ Secure routing for mobile Ad Hoc networks In SCS Communication Networks and Distributed Systems (CNDS) San Antonio, 2002 [8] Argyroudis PG, O Mahony D Secure routing for mobile Ad Hoc networks http//wwwctvrie/docs/en_pubs/secure-adhoc- routingpdf [9] Song Z, Zhang Y, Li ZJ, Chen HW Formalized description and analysis of secure protocols Computer Sciences, 2003,30(8)24 27 (in Chinese with English abstract) [10] Chen P, Liu DX, Bai YC A study of analyzing security protocols formally Computer Applications and Software, 2003, (in Chinese with English abstract) [11] Johnson D Maltz DA, Hu YC The dynamic source routing protocol for mobile Ad Hoc networks (DSR) IETF MANET Working Group 2004 http//wwwietforg/internet-drafts/draft-ietf-manet-dsr-10txt [12] Saeed R, Khatun S Ultra wide band (UWB) Ad Hoc networks Review and trends Journal of Computer Science, 2005,1(1)35 39 [1],,2003 [2],,1999,20(9)47 54 [3] 20,2003,14(10) http//wwwjosorgcn/ /14/1740htm [9],,,,2003,30(8)24 27 [10],,,2003, (1976 ),,,, (1965 ),,,,
PERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.487
More information3D Interaction Techniques Based on Semantics in Virtual Environments
ISSN 1000-9825, CODEN RUXUEW E-mail jos@iscasaccn Journal of Software, Vol17, No7, July 2006, pp1535 1543 http//wwwjosorgcn DOI 101360/jos171535 Tel/Fax +86-10-62562563 2006 by of Journal of Software All
More informationOLSR-L. Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig
OLSR-L 1 2 3 4 2 ROULA OLSR OLSR ROULA ROULA OLSR OLSR-L Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig Kazuyoshi Soga, 1 Tomoya Takenaka, 2 Yoshiaki Terashima,
More informationPerformance Evaluation of MANET Using Quality of Service Metrics
Performance Evaluation of MANET Using Quality of Service Metrics C.Jinshong Hwang 1, Ashwani Kush 2, Ruchika,S.Tyagi 3 1 Department of Computer Science Texas State University, San Marcos Texas, USA 2,
More informationThe application trends to the real systems of an Ad hoc network. Susumu MATSUI
The application trends to the real systems of an Ad hoc network Susumu MATSUI 1980 1990 1990 2000 1 1980 1) 1990 2) 1997 IETF MANET(Mobile Adhoc Network) WG 3) 2003 12 4) 2000 5) 1 2 2.1 1 Topology Base
More information2005 Journal of Software. . Ad hoc ), ) A Delay Oriented Adaptive Routing Protocol for Mobile Ad hoc Networks
-985/5/6(9)66 5 Journal of Software Vol6, No9 A hoc,,,+,,,, (, 37) ( ), 37) A Delay Orente Aaptve Routng Protocol for Moble A hoc Networks XIE Fe,, ZHANG Xn-Mng,+, GUO Ja-Feng,, CHEN Guo-Lang, (Department
More informationMore Efficient Routing Algorithm for Ad Hoc Network
More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks
More informationA Measurement-Based Path Loss Model for Mobile-to- Mobile Link Reliability Estimation
, pp.21-26 http://dx.doi.org/10.14257/astl.2016.123.05 A Measurement-Based Path Loss Model for Mobile-to- Mobile Link Reliability Estimation Fuquan Zhang 1*, Inwhee Joe 2,Demin Gao 1 and Yunfei Liu 1 1
More informationAnalysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data
Send Orders for Reprints to reprints@benthamscience.ae The Open Electrical & Electronic Engineering Journal, 2014, 8, 777-781 777 Open Access Analysis on Privacy and Reliability of Ad Hoc Network-Based
More informationMethod for discovering intra-session network coding opportunity in wireless ad hoc networks
32 10 Vol.32 No.10 2011 10 Journal on Communications October 2011 1, 2 2 1 2 1. 210093 2. 210007 AODV AODV TN393 B 1000-436X(2011)10-0092-07 Method for discovering intra-session network coding opportunity
More informationPerformance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic
International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 67-71 Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic Dhiraj
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 3,
More informationInternational Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:
Modified Route Maintenance in AODV Routing Protocol ChiragBhalodia (M.Tech, Research Scholar) 1, Prof. Amit M. Lathigara 2 Pg Scholar, Computer Engineering Department & R K University, chiragsbhalodia@gmail.com
More informationSecure Reac)ve Ad Hoc Rou)ng. Hongyang Li
Secure Reac)ve Ad Hoc Rou)ng Hongyang Li Proac)ve vs. Reac)ve Rou)ng Proac&ve Reac&ve Build routing tables Know path to destination? Route Find path Route 2 Why Reac)ve Ad Hoc Rou)ng Unstable network condi)ons:
More informationPerformance Comparison of AODV, DSDV and ZRP Routing Protocols
Performance Comparison of AODV, DSDV and ZRP Routing Protocols Ajay Singh 1, Anil yadav 2, Dr. mukesh Sharma 2 1 Research Scholar (M.Tech), Department of Computer Science, T.I.T&S, bhiwani 1 Faculty, Department
More informationCROSS-LAYER DESIGNS FOR MITIGATING RANGE ATTACKS IN AD HOC NETWORKS
CROSS-LAYER DESIGNS FOR MITIGATING RANGE ATTACKS IN AD HOC NETWORKS Jarmo V. E. Mölsä Communications Laboratory Helsinki University of Technology P.O. Box 3, FI-25 HUT, Finland email: jarmo.molsa@tkk.fi
More informationGeoMAC: Geo-backoff based Co-operative MAC for V2V networks.
GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. Sanjit Kaul and Marco Gruteser WINLAB, Rutgers University. Ryokichi Onishi and Rama Vuyyuru Toyota InfoTechnology Center. ICVES 08 Sep 24 th
More informationAd Hoc Networks - Routing and Security Issues
Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)
More informationModeling Hop Length Distributions for Reactive Routing Protocols in One Dimensional MANETs
This full tet paper was peer reviewed at the direction of IEEE Communications Society subject matter eperts for publication in the ICC 27 proceedings. Modeling Hop Length Distributions for Reactive Routing
More informationSurvey of MANET based on Routing Protocols
Survey of MANET based on Routing Protocols M.Tech CSE & RGPV ABSTRACT Routing protocols is a combination of rules and procedures for combining information which also received from other routers. Routing
More informationPerformance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network
Performance comparison of AODV, DSDV and EE-DSDV routing algorithm for wireless sensor network Mohd.Taufiq Norhizat a, Zulkifli Ishak, Mohd Suhaimi Sauti, Md Zaini Jamaludin a Wireless Sensor Network Group,
More informationClipping Noise Cancellation Based on Compressed Sensing for Visible Light Communication
Clipping Noise Cancellation Based on Compressed Sensing for Visible Light Communication Presented by Jian Song jsong@tsinghua.edu.cn Tsinghua University, China 1 Contents 1 Technical Background 2 System
More informationEfficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases.
Biomedical Research 2017; Special Issue: S315-S320 ISSN 0970-938X www.biomedres.info Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Deepa R 1*, Sutha J
More informationAn MNG-TL Loop Antenna for UHF Near-Field RFID Applications
Progress In Electromagnetics Research Letters, Vol. 52, 79 85, 215 An MNG-TL Loop Antenna for UHF Near-Field RFID Applications Hu Liu *, Ying Liu, Ming Wei, and Shuxi Gong Abstract A loop antenna is designed
More informationCompact UWB Band-pass Filter with Single Notched Band and High Stop-band Rejection
Compact UWB Band-pass Filter with Single Notched Band and High Stop-band Rejection Tao Jiang 1, Chang Su 1 1 College of Information and Communication Engineering Harbin Engineering University Harbin, 150001,
More informationA Research on Implementing GPS to Synchronize Sampling in a Disturbed Phase Difference s High-precision Measure System for Insulation Testing
International Conference on Advances in Energy and Environmental Science (ICAEES 05) A Research on Implementing GPS to Synchronize Sampling in a Disturbed Phase Difference s High-precision Measure System
More informationCheng-Yu Lee ( 李振宇 ) Education. Area of Specialty. Academic Experience. Publications Journal Papers:
Cheng-Yu Lee ( 李振宇 ) Department of Industrial Management and Information Southern Taiwan University of Science and Technology No. 1, Nan-Tai Street, Yongkang Dist., Office: T1135 : 886-6-2533131 ext.8335
More informationDV-HOP LOCALIZATION ALGORITHM IMPROVEMENT OF WIRELESS SENSOR NETWORK
DV-HOP LOCALIZATION ALGORITHM IMPROVEMENT OF WIRELESS SENSOR NETWORK CHUAN CAI, LIANG YUAN School of Information Engineering, Chongqing City Management College, Chongqing, China E-mail: 1 caichuan75@163.com,
More informationAn Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction
, pp.319-328 http://dx.doi.org/10.14257/ijmue.2016.11.6.28 An Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction Xiaoying Yang* and Wanli Zhang College of Information Engineering,
More informationA Chinese License Plate Recognition System
A Chinese License Plate Recognition System Bai Yanping, Hu Hongping, Li Fei Key Laboratory of Instrument Science and Dynamic Measurement North University of China, No xueyuan road, TaiYuan, ShanXi 00051,
More informationRendong Bai. Klehm Hall 4425 Phone: (217) Fax: (217)
Rendong Bai Assistant Professor School of Technology Eastern Illinois University 600 Lincoln Avenue, Charleston, IL 61920 Klehm Hall 4425 Phone: (217) 581-3690 Fax: (217) 581-6607 Email: rbai@eiu.edu EDUCATION
More informationENHANCEMENT OF LINK STABILITY USING RDGR IN VANET
ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET D.Mithila 1, R.Revathy 2, Rozamber Marline 3, P.Sathiyanarayanan 4 4 Assistant professor, Department of Computer Science and Engineering, sathiyanarayanan89@gmail.com.
More informationOFFICIAL LAUNCH OF THE CHINESE TRANSLATION OF THE 2012 JORC CODE
OFFICIAL LAUNCH OF THE CHINESE TRANSLATION OF THE 2012 JORC CODE At China Mining 21 October 2014 Tianjin, PR China Peter Stoker HonFAusIMM(CP) Deputy Chairman JORC The 2012 JORC Codes 2 Background to the
More informationChangjiang Yang. Computer Vision, Pattern Recognition, Machine Learning, Robotics, and Scientific Computing.
Changjiang Yang Mailing Address: Department of Computer Science University of Maryland College Park, MD 20742 Lab Phone: (301)405-8366 Cell Phone: (410)299-9081 Fax: (301)314-9658 Email: yangcj@cs.umd.edu
More informationDesign of Signal Conditioning Circuit for Photoelectric Sensor. , Zhennan Zhang
7th International Conference on Education, Management, Computer and Medicine (EMCM 2016) Design of Signal Conditioning Circuit for Photoelectric Sensor 1, a* Nan Xie 2, b, Zhennan Zhang 2, c and Weimin
More informationOLSR Standards. Emmanuel BACCELLI. INRIA / Hitachi
OLSR Standards Emmanuel BACCELLI INRIA / Hitachi Main Topics Standardization of OSLR Where are we at? What are we dealing with? The IETF. The future of OLSR Standards and Concepts. Example: MANET WG (Mobile
More informationPerformance Evaluation of a Video Broadcasting System over Wireless Mesh Network
Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network K.T. Sze, K.M. Ho, and K.T. Lo Abstract in this paper, we study the performance of a video-on-demand (VoD) system in wireless
More informationIMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP
IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP LIU Ying 1,HAN Yan-bin 2 and ZHANG Yu-lin 3 1 School of Information Science and Engineering, University of Jinan, Jinan 250022, PR China
More informationSimulation Analysis of Control System in an Innovative Magnetically-Saturated Controllable Reactor
Journal of Power and Energy Engineering, 2014, 2, 403-410 Published Online April 2014 in SciRes. http://www.scirp.org/journal/jpee http://dx.doi.org/10.4236/jpee.2014.24054 Simulation Analysis of Control
More informationA high resolution FPGA based time-to-digital converter
A high resolution FPGA based time-to-digital converter Wei Wang, Yongmeng Dong, Jie Li, Hao Zhou, Pingbo Xiong, Zhenglin Yang School of Chongqing University of Posts and Telecommunications, Chongqing 465
More informationPrinted UWB MIMO Antenna with Different Polarizations and Band-Notch Characteristics
Progress In Electromagnetics Research Letters, Vol. 46, 113 118, 214 Printed UWB MIMO Antenna with Different Polarizations and Band-Notch Characteristics Jia-Yue Zhao *, Zhi-Ya Zhang, Qiong-Qiong Liu,
More informationThe Application of FEMA and Error-Proofing Equipment on the Shell Drawing Line of G Company Yu-bin ZHENG, Wu ZHENG*, Yue SHI, and Bin YANG
01 International Conference on Informatics, Management Engineering and Industrial Application (IMEIA 01) ISBN: 978-1-0595-5-8 The Application of FEMA and Error-Proofing Equipment on the Shell Drawing Line
More informationSurvey on mobile under water wireless sensor net works
24 6 Vol. 24 No. 6 Cont rol an d Decision 2009 6 J un. 2009 : 100120920 (2009) 0620801207,, ( a., b., 100190) :,,, ;., : ; ; ; : TP29 : A Survey on mobile under water wireless sensor net works L V Chao,
More informationHigh voltage and large current dynamic test of SiC diodes and hybrid module
International Conference on Manufacturing Science and Engineering (ICMSE 2015) High voltage and large current dynamic test of SiC diodes and hybrid module Ao Liu 1, a *, Gang Chen1, 2, Song Bai1, 2, Run
More informationENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationHigh Performance Visible-Blind Ultraviolet Photodetector Based on
Supplementary Information High Performance Visible-Blind Ultraviolet Photodetector Based on IGZO TFT Coupled with p-n Heterojunction Jingjing Yu a,b, Kashif Javaid b,c, Lingyan Liang b,*, Weihua Wu a,b,
More informationThe Tension and Temperature Automatic Control Device for the Cutting Wire of EPS Cutting Machine
6th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2016) The Tension and Temperature Automatic Control Device for the Cutting Wire of EPS Cutting Machine Bin Liu1, a,
More informationUsing Crowdsourced Data in Location-based Social Networks to Explore Influence Maximization
Using Crowdsourced Data in Location-based Social Networks to Explore Influence Maximization Ji Li 1 Zhipeng Cai 1 Mingyuan Yan 2 Yingshu Li 1 1 Department of Computer Science, Georgia State University
More informationLevel Surveying Method and Accuracy Analysis on Passenger Dedicated Line CP Network
Level Surveying Method and Accuracy Analysis on Passenger Dedicated Line CP-Network Ding Ke-liang, Tie Li-san Zhou-shi-hong, Wang bing-hai Key words: passenger dedicated line, trigonometric leveling,cpiii
More informationInnovation Design of Engineering Experiment Based on Internet
International Forum on Management, Education and Information Technology Application (IFMEITA 2016) Innovation Design of Engineering Experiment Based on Internet Zhang Bingsheng1, a, Zhu Qingjie1,b and
More informationJournal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 215, 7(3):1243-1249 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 Servo control system of electric cylinder based
More informationDynamic Visual Performance of LED with Different Color Temperature
Vol.9, No.6 (2016), pp.437-446 http://dx.doi.org/10.14257/ijsip.2016.9.6.38 Dynamic Visual Performance of LED with Different Color Temperature Zhao Jiandong * and Ma Shuo * School of Mechanical and Electronic
More informationDesign of Broadband Transition Structure from Microstrip to Slotline with Band Notched Characteristic
Progress In Electromagnetics Research Letters, Vol. 73, 05 2, 208 Design of Broadband Transition Structure from Microstrip to Slotline with Band Notched Characteristic Fa-Kun Sun, Wu-Sheng Ji *, Xiao-Chun
More informationFlight Control: Challenges and Opportunities
39 6 Vol. 39, No. 6 2013 6 ACTA AUTOMATICA SINICA June, 2013 1 2 1 1,., : ;, ; ; ;. DOI,,,,,,,., 2013, 39(6): 703 710 10.3724/SP.J.1004.2013.00703 Flight Control: Challenges and Opportunities CHEN Zong-Ji
More informationAnalysis on exciting winding electromagnetic force of Turbogenerator under rotor interturn short circuit fault
International Conference on Advanced Electronic Science and Technology (AEST 2016) Analysis on exciting winding electromagnetic force of Turbogenerator under rotor interturn short circuit fault a Hao Zhong,
More informationEvaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models
Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab
More informationRCS Reduction of Patch Array Antenna by Complementary Split-Ring Resonators Structure
Progress In Electromagnetics Research C, Vol. 51, 95 101, 2014 RCS Reduction of Patch Array Antenna by Complementary Split-Ring Resonators Structure Jun Zheng 1, 2, Shaojun Fang 1, Yongtao Jia 3, *, and
More informationCryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing
More informationA Parametric Recreation of Traditional Chinese Architecture
A Parametric Recreation of Traditional Chinese Architecture A case study on the floor plan Di Li 1, Michael Knight 2, Andre Brown 3 University of Liverpool, UK 1 di.li2@liv.ac.uk, 2 mknight@liv.ac.uk,
More informationPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR 802.11P INCLUDING PROPAGATION MODELS Mit Parmar 1, Kinnar Vaghela 2 1 Student M.E. Communication Systems, Electronics & Communication Department, L.D. College
More informationInternational Conference on Education Technology and Social Science (ICETSS 2014)
International Conference on Education Technology and Social Science (ICETSS 2014) Discussion on Features of Form and Arrangement of Lines and Evolution of Calligraphic Style in Inscriptions on Bronze Ware
More informationCoalface WSN Sub-area Model and Network Deployment Strategy
2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Coalface WSN Sub-area Model and Network Deployment Strategy Peng Zhang 1,
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
More informationA Comparative Study of Microstrip Bandstop Filters Loaded With Various Dumbbell-Shaped Defected Ground Structure (DGS)
53 INTERNATIONAL JOURNAL OF MICROWAVE AND OPTICAL TECHNOLOGY, A Comparative Study of Microstrip Bandstop Filters Loaded With Various Dumbbell-Shaped Defected Ground Structure (DGS) Arjun Kumar, Jagannath
More informationPerformance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET.
Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET. Adel Aneiba, Mohammed Melad Department of Computer Networks and Communication Faculty of Information Technology,
More information21st Century English-Chinese Dictionary Publisher: Foreign Languages Press ISBN: Binding: Hard Cover Price: 9.95
Concise English-Chinese & Chinese-English Dictionary, 4 edition Author: Martin H.Manser Publisher: Commercial Press ISBN: 9787100059459 Price: 12.95 21st Century English-Chinese Dictionary ISBN: 9787119024011
More informationPapers. Ad Hoc Routing. Outline. Motivation
CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms
More informationA COMPACT CPW-FED MONOPOLE ANTENNA WITH A U-SHAPED STRIP AND A PAIR OF L-SLITS GROUND FOR WLAN AND WIMAX APPLICATIONS
Progress In Electromagnetics Research Letters, Vol. 16, 11 19, 21 A COMPACT CPW-FED MONOPOLE ANTENNA WITH A U-SHAPED STRIP AND A PAIR OF L-SLITS GROUND FOR WLAN AND WIMAX APPLICATIONS Z.-Y. Liu, Y.-Z.
More informationEngineering the light propagating features through the two-dimensional coupled-cavity photonic crystal waveguides
Engineering the light propagating features through the two-dimensional coupled-cavity photonic crystal waveguides Feng Shuai( ) and Wang Yi-Quan( ) School of Science, Minzu University of China, Bejiing
More informationLearning and Decision Making with Negative Externality for Opportunistic Spectrum Access
Globecom - Cognitive Radio and Networks Symposium Learning and Decision Making with Negative Externality for Opportunistic Spectrum Access Biling Zhang,, Yan Chen, Chih-Yu Wang, 3, and K. J. Ray Liu Department
More informationThe Study and Applications of Sparse Methods Technology in Yunnan Mountain Substation
Journal of Power and Energy Engineering, 2014, 2, 411-415 Published Online April 2014 in SciRes. http://www.scirp.org/journal/jpee http://dx.doi.org/10.4236/jpee.2014.24055 The Study and Applications of
More informationEWANT: The Emulated Wireless Ad Hoc Network Testbed
EWANT: The Emulated Wireless Ad Hoc Network Testbed Sagar Sanghani, Timothy X Brown, Shweta Bhandare, Sheetalkumar Doshi University of Colorado at Boulder, 80309-0530 {sanghani, timxb, bhandare, doshi}@colorado.edu
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationPROPOSED APPOINTMENT OF NON-EXECUTIVE DIRECTORS AND SUPPLEMENTAL NOTICE OF ANNUAL GENERAL MEETING
Hong Kong Exchanges and Clearing Limited and The Stock Exchange of Hong Kong Limited take no responsibility for the contents of this announcement, make no representation as to its accuracy or completeness
More informationAPPOINTMENT OF CHAIRMAN AND VICE CHAIRMAN OF THE BOARD OF DIRECTORS AND APPOINTMENT OF CHAIRMAN OF THE SUPERVISORY COMMITTEE
The Stock Exchange of Hong Kong Limited takes no responsibility for the contents of this announcement, makes no representation as to its accuracy or completeness and expressly disclaims any liability whatsoever
More informationDetection and Prevention of Physical Jamming Attacks in Vehicular Environment
Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal,
More informationIEEE ComSoc Distinguished Lecture Tour Experience in China
IEEE ComSoc Distinguished Lecture Tour Experience in China I have been serving IEEE, particularly ComSoc, for over 15 years in the forms of an author, a reviewer, an editor, a conference organizer and
More informationKeywords - Ad-hoc Networks, TCP variants, Routing Protocols, AODV, DSR.
Applications (IJERA) ISSN: 224-922 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.12-1 Performance Evaluation Of Congestion Control Tcp Variants In Vanet Using Omnet++ Ravinder Kaur*, Gurpreet
More informationDesign of a Compact and High Selectivity Tri-Band Bandpass Filter Using Asymmetric Stepped-impedance Resonators (SIRs)
Progress In Electromagnetics Research Letters, Vol. 44, 81 86, 2014 Design of a Compact and High Selectivity Tri-Band Bandpass Filter Using Asymmetric Stepped-impedance Resonators (SIRs) Jun Li *, Shan
More informationAdvanced Low-cost Medical Technology(Chinese Edition) By LIU JING. RAO WEI. JIA DE WEI. ZHU
Advanced Low-cost Medical Technology(Chinese Edition) By LIU JING. RAO WEI. JIA DE WEI. ZHU If you are searched for a book by LIU JING. RAO WEI. JIA DE WEI. ZHU Advanced low-cost medical technology(chinese
More informationLow Complexity Belief Propagation Polar Code Decoder
Low Complexity Belief Propagation Polar Code Decoder Syed Mohsin Abbas, YouZhe Fan, Ji Chen and Chi-Ying Tsui VLSI Research Laboratory, Department of Electronic and Computer Engineering Hong Kong University
More informationPerformance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN
IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 02 July 2016 ISSN (online): 2349-6010 Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming
More informationBandpass-Response Power Divider with High Isolation
Progress In Electromagnetics Research Letters, Vol. 46, 43 48, 2014 Bandpass-Response Power Divider with High Isolation Long Xiao *, Hao Peng, and Tao Yang Abstract A novel wideband multilayer power divider
More informationElectronic Supplementary Information. Synapse behavior characterization and physics mechanism of a
Electronic Supplementary Material (ESI) for Journal of Materials Chemistry C. This journal is The Royal Society of Chemistry 2019 Electronic Supplementary Information Synapse behavior characterization
More informationConformal optical system design with a single fixed conic corrector
Conformal optical system design with a single fixed conic corrector Song Da-Lin( ), Chang Jun( ), Wang Qing-Feng( ), He Wu-Bin( ), and Cao Jiao( ) School of Optoelectronics, Beijing Institute of Technology,
More informationIntelligent Balanced Device and its Sensing System for Beam Pumping Units
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Intelligent Balanced Device and its Sensing System for Beam Pumping Units Hangxin WEI, Wenfang WANG School of mechanical
More informationInductance of Bitter Coil with Rectangular Cross-section
DOI 1.17/s1948-1-1816-6 ORIGINAL PAPER Inductance of Bitter Coil with Rectangular Cross-section Yong Ren Guangli Kuang Wenge Chen Received: 1 October 1 / Accepted: 5 November 1 Springer Science+Business
More informationX. Li, L. Yang, S.-X. Gong, and Y.-J. Yang National Key Laboratory of Antennas and Microwave Technology Xidian University Xi an, Shaanxi, China
Progress In Electromagnetics Research Letters, Vol. 6, 99 16, 29 BIDIRECTIONAL HIGH GAIN ANTENNA FOR WLAN APPLICATIONS X. Li, L. Yang, S.-X. Gong, and Y.-J. Yang National Key Laboratory of Antennas and
More informationSIMULATION AND ANALYSIS OF 60 GHz MILLIMETER- WAVE INDOOR PROPAGATION CHARACTERISTICS BASE ON THE METHOD OF SBR/IMAGE
Progress In Electromagnetics Research C, Vol. 43, 15 28, 2013 SIMULATION AND ANALYSIS OF 60 GHz MILLIMETER- WAVE INDOOR PROPAGATION CHARACTERISTICS BASE ON THE METHOD OF SBR/IMAGE Yuan-Jian Liu, Qin-Jian
More informationPerformance Analysis of DV-Hop Localization Using Voronoi Approach
Vol.3, Issue.4, Jul - Aug. 2013 pp-1958-1964 ISSN: 2249-6645 Performance Analysis of DV-Hop Localization Using Voronoi Approach Mrs. P. D.Patil 1, Dr. (Smt). R. S. Patil 2 *(Department of Electronics and
More informationA Novel Triple-Mode Bandpass Filter Using Half-Wavelength-Resonator-Coupled Square-Loop Resonator
Progress In Electromagnetics Research Letters, Vol. 78, 31 37, 018 A Novel Triple-Mode Bandpass Filter Using Half-Wavelength-Resonator-Coupled Square-Loop Resonator Zhi-Chong Zhang and Wen-Lang Luo * Abstract
More informationWe are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors
We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists 4,000 116,000 120M Open access books available International authors and editors Downloads Our
More informationTRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS
TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS Juan Carlos García, Mari-Carmen Bañuls, Pablo Galdámez and Rubén Quintero Instituto Tecnológico de Informática, Universidad
More informationChaitanya Kishor Reddi 1, Dr. S. Vijay Bhanu 2. Ph.D Scholar, Department of CSE Annamalai University, Annamalai Nagar, Tamil Nadu, India
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 Comparisons Analysis of Routing Protocols (AODV,
More informationA Compact Wideband Slot Antenna for Universal UHF RFID Reader
Progress In Electromagnetics Research Letters, Vol. 7, 7, 8 A Compact Wideband Slot Antenna for Universal UHF RFID Reader Waleed Abdelrahim and Quanyuan Feng * Abstract A compact wideband circularly polarized
More information4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016)
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) Change laws of PHC contents in bottom waters in the bay mouth of Jiaozhou Bay Dongfang Yang1,2,3,a, Sixi Zhu1,2,
More informationCompact CPW UWB Pattern Diversity Antenna with Dual Band-notched Characteristics
Compact CPW UWB Pattern Diversity Antenna with Dual Band-notched Characteristics Rong Su 1,2, Peng Gao 1,2, Shuang He 3 and Peng Wang 1,2 1.Information Geoscience Research Center 2.Research Institute of
More informationNode Localization using 3D coordinates in Wireless Sensor Networks
Node Localization using 3D coordinates in Wireless Sensor Networks Shayon Samanta Prof. Punesh U. Tembhare Prof. Charan R. Pote Computer technology Computer technology Computer technology Nagpur University
More informationBroadcast-based Directional Routing in Vehicular Ad-Hoc Networks
Broadcast-based Directional Routing in Vehicular Ad-Hoc Networks Ahmed Soua, Walid Ben-Ameur, Hossam Afifi To cite this version: Ahmed Soua, Walid Ben-Ameur, Hossam Afifi. Broadcast-based Directional Routing
More informationS. Zhou, J. Ma, J. Deng, and Q. Liu National Key Laboratory of Antenna and Microwave Technology Xidian University Xi an, Shaanxi, P. R.
Progress In Electromagnetics Research Letters, Vol. 7, 97 103, 2009 A LOW-PROFILE AND BROADBAND CONICAL ANTENNA S. Zhou, J. Ma, J. Deng, and Q. Liu National Key Laboratory of Antenna and Microwave Technology
More information