message transmission
Recently Published Documents


TOTAL DOCUMENTS

386
(FIVE YEARS 70)

H-INDEX

22
(FIVE YEARS 3)

Author(s):  
R. Y. Sharykin

The article discusses the implementation in Java of the stochastic collaborative virus defense model developed within the framework of the Distributed Object-Based Stochastic Hybrid Systems (DOBSHS) model and its analysis. The goal of the work is to test the model in conditions close to the real world on the way to introducing its use in the practical environment. We propose a method of translating a system specification in the SHYMaude language, intended for the specification and analysis of DOBSHS models in the rewriting logic framework, into the corresponding Java implementation. The resulting Java system is deployed on virtual machines, the virus and the group virus alert system are modeled stochastically. To analyze the system we use several metrics, such as the saturation time of the virus propagation, the proportion of infected nodes upon reaching saturation and the maximal virus propagation speed. We use Monte Carlo method with the computation of confidence intervals to obtain estimates of the selected metrics. We perform analysis on the basis of the sigmoid virus propagation graph over time in the presence of the defense system. We implemented two versions of the system using two protocols for transmitting messages between nodes, TCP/IP and UDP. We measured the influence of the protocol type and the associated costs on the defense system effectiveness. To assess the potential of cost reduction associated with the use of different message transmission protocols, we performed analysis of the original DOBSHS model modified to model message transmission delays. We measured the influence of other model parameters important for the next steps towards the practical use of the model. To address the system scalability, we propose a hierarchical approach to the system design to make possible its use with a large number of nodes.


Sensors ◽  
2022 ◽  
Vol 22 (1) ◽  
pp. 322
Author(s):  
Quan Wang ◽  
Hongbin Li ◽  
Hao Wang ◽  
Jun Zhang ◽  
Jiliang Fu

Power system facility calibration is a compulsory task that requires in-site operations. In this work, we propose a remote calibration device that incorporates edge intelligence so that the required calibration can be accomplished with little human intervention. Our device entails a wireless serial port module, a Bluetooth module, a video acquisition module, a text recognition module, and a message transmission module. First, the wireless serial port is used to communicate with edge node, the Bluetooth is used to search for nearby Bluetooth devices to obtain their state information and the video is used to monitor the calibration process in the calibration lab. Second, to improve the intelligence, we propose a smart meter reading method in our device that is based on artificial intelligence to obtain information about calibration meters. We use a mini camera to capture images of calibration meters, then we adopt the Efficient and Accurate Scene Text Detector (EAST) to complete text detection, finally we built the Convolutional Recurrent Neural Network (CRNN) to complete the recognition of the meter data. Finally, the message transmission module is used to transmit the recognized data to the database through Extensible Messaging and Presence Protocol (XMPP). Our device solves the problem that some calibration meters cannot return information, thereby improving the remote calibration intelligence.


Author(s):  
М.Л. МАСЛАКОВ ◽  
С.А. КУДРЯШОВА

Рассмотрена передача сообщений в каналах с пачками ошибок. Реализована модель дискретного канала с формированием как одиночных, так и пачек ошибок с заданной вероятностью. Модель позволяет получить оценки вероятности потери сообщений для различных условий. Представлены результаты моделирования. The paper deals with the transmission of messages over channels with error packets. A model of a discrete channel has been designed with the formation of both single errors and packets of errors with a given probability. The model provides estimates of the message error rate for various conditions. The results of the numerical simulation are presented.


2021 ◽  
Author(s):  
Wassim Alexan ◽  
Abdelrahman Elkhateeb ◽  
Eyad Mamdouh ◽  
Fahd Al-Seba'Ey ◽  
Ziad Amr ◽  
...  

2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Jabar Mahmood ◽  
Zongtao Duan ◽  
Heng Xue ◽  
Yun Yang ◽  
Michael Abebe Berwo ◽  
...  

The advancements in Vehicular Ad Hoc Networks (VANETs) require more intelligent security protocols that ultimately provide unbreakable security to vehicles and other components of VANETs. VANETs face various types of security pitfalls due to the openness characteristics of the VANET communication infrastructure. Researchers have recently proposed different mutual authentication schemes that address security and privacy issues in vehicle-to-vehicle (V2V) communication. However, some V2V security schemes suffer from inadequate design and are hard to implement practically. In addition, some schemes face vehicle traceability and lack anonymity. Hence, this paper’s primary goal is to enhance privacy preservation through mutual authentication and to achieve better security and performance. Therefore, this article first describes the vulnerabilities of a very recent authentication scheme presented by Vasudev et al. Our analysis proves that the design of Vasudev et al.’s scheme is incorrect, and resultantly, the scheme does not provide mutual authentication between a vehicle and vehicle server when multiple vehicles are registered with the vehicle sever. Furthermore, this paper proposes a secure message transmission scheme for V2V in VANETs. The proposed scheme fulfills the security and performance requirements of VANETs. The security analysis of the proposed scheme using formal BAN and informal discussion on security features confirm that the proposed scheme fulfills the security requirements, and the performance comparisons show that the proposed scheme copes with the lightweightness requirements of VANETs.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Yongqiang Wang ◽  
Na Zhang

In order to improve the teaching effect of programming courses, this article applies network topology to the construction of programming course teaching platform system and constructs a teaching framework combined with intelligent teaching mode. In addition, this article takes the opportunistic social network composed of mobile smart terminal devices as the application background and briefly introduces the concept, characteristics, and application scenarios of the opportunistic social network. In addition, the typical message forwarding algorithm currently studied in this paper is analyzed. Taking into account the social attributes and forwarding willingness of nodes, in order to increase the message transmission rate and reduce message transmission delay and network overhead, two message transmission strategies are proposed to improve the operating effect of the programming course teaching platform. Finally, this paper verifies the effectiveness of the network topology in the teaching of the algorithm and programming of the intelligent teaching mode through experimental research.


2021 ◽  
Author(s):  
S M Nazmuz Sakib

As may be seen, cryptography and game theory are the 2 primary parts of the phrase. game theory thinks about with optimizing a result involving 2 or a lot of well-defined parties, every with well-defined behavior. Nash equilibrium could be a notion in game theory that emphasizes the participants' mutual profit. , the unpredictability of the operational state of affairs, don't seem to be laid out in game theory. The goal of cryptography is to produce safe message transmission between genuine and approved parties. Multiparty computing could be a cryptographical technique that enables 2 or a lot of participants to calculate a perform conjointly. this can be kind of like the concept of reciprocal profit in game theory. throughout the employment of the protocol, all parties have a precise set of behavior determined, kind of like game theory. The parties, as an example, a probabilistic polynomials in nature. Cryptography doesn't specify however AN assailant could use it to breach the system just like the operation condition. In cryptography, multiparty interaction is outlined as parties communication to judge a perform on their inputs.


Sign in / Sign up

Export Citation Format

Share Document