scholarly journals BGP Neighbor Trust Establishment Mechanism Based on the Bargaining Game

Information ◽  
2021 ◽  
Vol 12 (3) ◽  
pp. 110
Author(s):  
Peipei Li ◽  
Bin Lu ◽  
Daofeng Li

The Border Gateway Protocol (BGP) is the standard inter-domain route protocol on the Internet. Autonomous System (AS) traffic is forwarded by the BGP neighbors. In the route selection, if there are malicious or inactive neighbors, it will affect the network’s performance or even cause the network to crash. Therefore, choosing trusted and safe neighbors is an essential part of BGP security research. In response to such a problem, in this paper we propose a BGP Neighbor Trust Establishment Mechanism based on the Bargaining Game (BNTE-BG). By combining service quality attributes such as bandwidth, packet loss rate, jitter, delay, and price with bargaining game theory, it allows the AS to select trusted neighbors which satisfy the Quality of Service independently. When the trusted neighbors are forwarding data, we draw on the gray correlation algorithm to calculate neighbors’ behavioral trust and detect malicious or inactive BGP neighbors.

2021 ◽  
pp. 014459872199851
Author(s):  
Yuyang Liu ◽  
Xiaowei Zhang ◽  
Junfeng Shi ◽  
Wei Guo ◽  
Lixia Kang ◽  
...  

As an important type of unconventional hydrocarbon, tight sandstone oil has great present and future resource potential. Reservoir quality evaluation is the basis of tight sandstone oil development. A comprehensive evaluation approach based on the gray correlation algorithm is established to effectively assess tight sandstone reservoir quality. Seven tight sandstone samples from the Chang 6 reservoir in the W area of the AS oilfield in the Ordos Basin are employed. First, the petrological and physical characteristics of the study area reservoir are briefly discussed through thin section observations, electron microscopy analysis, core physical property tests, and whole-rock and clay mineral content experiments. Second, the pore type, throat type and pore and throat combination characteristics are described from casting thin sections and scanning electron microscopy. Third, high-pressure mercury injection and nitrogen adsorption experiments are optimized to evaluate the characteristic parameters of pore throat distribution, micro- and nanopore throat frequency, permeability contribution and volume continuous distribution characteristics to quantitatively characterize the reservoir micro- and nanopores and throats. Then, the effective pore throat frequency specific gravity parameter of movable oil and the irreducible oil pore throat volume specific gravity parameter are introduced and combined with the reservoir physical properties, multipoint Brunauer-Emmett-Teller (BET) specific surface area, displacement pressure, maximum mercury saturation and mercury withdrawal efficiency parameters as the basic parameters for evaluation of tight sandstone reservoir quality. Finally, the weight coefficient of each parameter is calculated by the gray correlation method, and a reservoir comprehensive evaluation indicator (RCEI) is designed. The results show that the study area is dominated by types II and III tight sandstone reservoirs. In addition, the research method in this paper can be further extended to the evaluation of shale gas and other unconventional reservoirs after appropriate modification.


2020 ◽  
pp. 142-151
Author(s):  
О.V. Dymchenko ◽  
О.О. Rudachenko ◽  
P. Gazzola

In the paper, one develops a set of models for diagnosing threats to the economic security of a commercial bank, which allows improving the quality of decisions forming and making on managing the safe functioning and development of the bank. The bank's economic security research system has been developed, it includes 3 main blocks: research information space creation; assessment and analysis of the security of a commercial bank; generalization, and formation of decisions on the economic security of a commercial bank. The research made it possible to draw an inference of a theoretical, methodological, and applied nature that reflects the solution of the tasks set following the purpose of the study. A set of models has been built with modern tools of economic and mathematical modelling to improve the quality of decisions made to manage the bank's security and reduce the risks of threats. A model for calculating the bank's economic security indicator has been developed, which includes the following main stages: the construction of a structural scheme taking into account the rules of the theory of banking functioning security, then the terms and their membership functions are set for each input and output variable of the fuzzy inference system under consideration. Results of the response surface for the model are shown in the figure on the graphs of the dependence of the bank's economic security indicator on various input components. The paper requires that it is convenient to diagnose the state of economic security of a bank using fuzzy logic, this allows getting a clear quantitative representation of economic security state of the bank, as the indicators used for diagnostics may be indistinct and approximate and this a priori cannot give an adequate result when accurately calculated.


2013 ◽  
Vol 448-453 ◽  
pp. 3696-3701
Author(s):  
Yan Bin He ◽  
Xin Zhong Li ◽  
Min Zhou

A phase-shifting algorithm, called a (4,4) algorithm, which takes four phase-shifting interferograms before a specimen is deformed and four interferograms after a specimen is deformed, is presented first. This method is most widely used for phase extraction. Its drawback limited it to be used in dynamic measurements. Also shown is an algorithm called a (4,1) algorithm that takes four phase-shifting interferograms before a specimen is deformed and one interferogram after a specimen is deformed. Because a high-speed camera can be used to record the dynamic interferogram of the specimen, this algorithm has the potential to retain the phase-shifting capability for ESPI in dynamic measurements. The quality of the phase map obtained using (4,1) algorithm is quite lower compared to using (4,4) algorithm. In order to obtain high-quality phase map in dynamic measurements, a direct-correlation algorithm was integrated with the (4,1) algorithm to form DC-(4,1) algorithm which is shown to improve significantly the quality of the phase maps. The theoretical and experimental aspects of this newly developed technique, which can extend ESPI to areas such as high-speed dynamic measurements, are examined in detail.


Author(s):  
Muhammad Ismu Haji ◽  
Sugeng Purwantoro E.S.G.S ◽  
Satria Perdana Arifin

Using of IP addresses is currently still using IPv4. Meanwhile, the availability of the IPv4 address is gradually diminishes. IPv4 has a limited address capacity. IPv6 was developed with a capacity greater than IPv4. Connect between IPv4 and IPv6 without having to interfere with the existing infrastructure. So, methods like tunneling are needed. Tunneling builds a way that IPv4 and IPv6 can communicate. 6to4 tuning makes IPv6 able to communicate with IPv4 over IPv4 infrastructure. Real time communication is needed by internet users to be able to connect to each other. One of the real time communications is VoIP. To find out the quality of tunneling implemented on a VoIP network, it will analyze QoS such as delay, packet loss, and jitter. Delay obtained is 20,01ms for IPv4, 19,99ms for IPv6 and 20,03ms for 6to4. Packet loss obtained 0,01% for IPv4, IPv6 0,01% and 6to4 0,08%. The obtained jitter is 7,96ms for IPv4, IPv6 7.39ms, and 8,48 for 6to4. The test results show that using IPv6 gets a better QoS value than using IPv4 and 6to4 tunneling. The results using 6to4 tunneling obtained the highest QoS value between IPv4 and IPv6. Implementation using 6to4 tunneling results in high results because, IPv6 packets that are sent are wrapped into the IPv4 form to get through the IPv4 infrastructure. 


2021 ◽  
Vol 13 (11) ◽  
pp. 2224
Author(s):  
Yu Li ◽  
Yunhua Zhang ◽  
Xiao Dong

The imaging quality of InISAR under squint geometry can be greatly degraded due to the serious interferometric phase ambiguity (InPhaA) and thus result in image distortion problems. Aiming to solve these problems, a three-dimensional InISAR (3D ISAR) imaging method based on reference InPhas construction and coordinate transformation is presented in this paper. First, the target’s 3D coarse location is obtained by the cross-correlation algorithm, and a relatively stronger scatterer is taken as the reference scatterer to construct the reference interferometric phases (InPhas) so as to remove the InPhaA and restore the real InPhas. The selected scatterer needs not to be exactly in the center of the coarsely located target. Then, the image distortion is corrected by coordinate transformation, and finally the 3D coordinates of the target can be accurately estimated. Both simulation and practical experiment results validate the effectiveness of the method.


Author(s):  
Murhaban Murhaban ◽  
Muhammad Bilai ◽  
Muhammad Nurtanzia Sutoyo

Metode Handover digunakan untuk mempertahankan koneksi tetap terjaga. Hal tersebut berkaitan dengan performansi dikarenakan proses pengalihan kanal trafik secara otomatis pada mobile station untuk berkomunikasi tanpa terjadinya pemutusan hubungan. Faktor utama keberhasilan dalam melakukan handover terletak pada quality of service yang menyediakan tingkat jaminan layanan berbeda-beda dalam mengatur dan memberikan prioritas trafik pada jaringan seperti aplikasi voice over IP (VoIP) atau komunikasi voice memanfaatkan jaringan internet dalam permasalahan berdasarkan jarak base station.. Berdasarkan pengujian yang dilakukan untuk metode hard handover dan metode soft handover berdasarkan jarak base station menggunakan aplikasi voice over internet protocol pada mobile station. Diperoleh hasil dengan  nilai jitter 0.015 ms – 0.21 ms, dan hasil delay 35.5 ms – 45.8 ms hal tersebut membuktikan bahwa pengaruh jitter dan delay terhadap handover dengan aplikasi VoIP masih dalam tahapan toleransi yang diizinka. Dan berdasarkan hasil penelitian ini jarak antara satu base station dengan station lainnya sangat berpengaruh untuk mendapatkan kulaitas layanan yang lebih baik. Kata Kunci : Handover, Jitter, Delay, VoIP, Quality of Service


2017 ◽  
Vol 31 (19-21) ◽  
pp. 1740047 ◽  
Author(s):  
Sheng-Xin Lin ◽  
Xiao-Fang Zhao ◽  
Hua-Zhu Liu

The automatic location of the bar code is a key step in the bar code image recognition system. It is extremely confined that the generalization of the traditional bar code localization algorithms due to the requirements of both direction and quality of bar code, and most of them are only aimed at the single barcode localization. In this paper, we have proposed a novel multi-barcode location algorithm in arbitrary direction based on the accumulation of the linear gray value. First, the line coordinates of the barcode region is determined by the image normalized cross-correlation algorithm. Then the center line of gray value of cumulative distribution is used to analyze the barcode boundary and to determine the number of bar code within the region. Finally, the precise positioning of the barcode region is obtained. The experiments have demonstrated that our proposed method can be used to identify all the bar codes in any area, and automatically locate the bar codes in any direction.


Author(s):  
Ishtiaque Mahmood ◽  
Ahmad Khalil Khan

In this paper, a novel throughput measurement forecast model is recommended for VANETs. The model is based on a statistical technique adopted and deployed over a high speed IP network traffic. Network traffic would always experience more QoS (Quality of Service) issues such as jitter, delay, packet loss and degradation due to very low bit rate codification too. Despite of all such dictated issues the traffic throughput is to be predicted with at most accuracy using a proposed multivariate analysis scheme represented as a RRSCM (Refined Regression Statistical Classifier Model) that optimizes parting parameters. Henceforth, the focus is towards the measurement methodology that estimates the traffic parameters that triggers to predict the accurate traffic and extemporize the QoS for the end-users. Finally, the proposed RRSCM classification model’s end-results are compared with the ANN (Artificial Neural Network) classification model to showcase its better act on the projected model


Author(s):  
DWI ARYANTA ◽  
ARSYAD RAMADHAN DARLIS ◽  
ARDHIANSYAH PRATAMA

ABSTRAKVoIP (Voice over Internet Protocol) adalah komunikasi suara jarak jauh yang digunakan melalui jaringan IP. Pada penelitian ini dirancang sistem IP PBX dengan menggunakan teknologi berbasis VoIP. IP PBX adalah perangkat switching komunikasi telepon dan data berbasis teknologi Internet Protocol (IP) yang mengendalikan ekstension telepon analog maupun ekstension IP Phone. Software VirtualBox digunakan dengan tujuan agar lebih memudahkan dalam sistem pengoperasian Linux yang dimana program untuk membuat IP PBX adalah menggunakan Briker yang bekerja pada Operating System Linux 2.6. Setelah proses penginstalan Briker pada Virtualbox dilakukan implementasi jaringan IP PBX. Setelah mengimplementasikan jaringan IP PBX sesuai dengan topologi, kemudian melakukan pengujian success call rate dan analisis Quality of Service (QoS). Pengukuran QoS menggunakan parameter jitter, delay, dan packet loss yang dihasilkan dalam sistem IP PBX ini. Nilai jitter sesama user Briker (baik pada smartphone maupun komputer) mempunyai rata-rata berada pada nilai 16,77 ms. Sedangkan nilai packetloss yang didapat pada saat terdapat pada saat user 1 sebagai pemanggil telepon adalah 0%. Sedangkan persentase packet loss pada saat user 1 sebagai penerima telepon adalah 0,01%. Nilai delay pada saat berkomunikasi antar user berada pada 11,75 ms. Secara keseluruhan nilai yang didapatkan melalui penelitian ini, dimana hasil pengujian parameter-parameter QOS sesuai dengan standar yang telah direkomendasikan oleh ITU dan didapatkan nilai QoS dengan hasil “baik”.Kata Kunci: Briker, VoIP, QoS, IP PBX, Smartphone.ABSTRACTVoIP (Voice over Internet Protocol) is a long-distance voice communications over IP networks are used. In this study, IP PBX systems designed using VoIP -based technologies. IP PBX is a telephone switching device and data communication technology-based Internet Protocol (IP) which controls the analog phone extensions and IP Phone extensions. VirtualBox software is used in order to make it easier for the Linux operating system to create a program which is using briker IP PBX that works on Linux 2.6 Operating System. After the installation process is done briker on Virtualbox IP PBX network implementation. After implementing the IP PBX network according to the topology, and then do a test call success rate and analysis of Quality of Service (QoS). Measurement of QoS parameters using jitter, delay, and packet loss resulting in the IP PBX system. Jitter value briker fellow users (either on a smartphone or computer) has been on the average value of 16.77 ms. While the values obtained packetloss when there is 1 user when a phone caller is 0%. While the percentage of packet loss at user 1 as a telephone receiver is 0.01%. Delay value when communicating between users located at 11.75 ms. Overall value obtained through this study , where the results of testing the QOS parameters in accordance with the standards recommended by the ITU and the QoS values obtained with the results "good".Keywords: Briker, VoIP, QoS, IP PBX, Smartphone.


Sign in / Sign up

Export Citation Format

Share Document