data message
Recently Published Documents


TOTAL DOCUMENTS

43
(FIVE YEARS 12)

H-INDEX

2
(FIVE YEARS 1)

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Meiyu Pang ◽  
Jianing Shen ◽  
Lixiu Wu

Aiming at the diversified requirements of network application QoS (Quality of Service) in the terminal equipment of Internet of Vehicles, this paper proposes a distributed congestion control strategy based on harmony search algorithm and the Throughput Evaluation Priority Adjustment Model (TEPAM) to ensure real-time transmission of high-priority data messages related to security applications. Firstly, the channel usage rate is periodically detected and the congestion is judged; then, in order to minimize delay and delay jitter as the goal, harmony search algorithm is utilized to perform global search to obtain a better solution for the transmission range and transmission rate. Secondly, packet priority and the TEPAM are applied to indicate the sending right of each packet. The data message priority and throughput percentage factor are used to express the transmission weight of each data message. Besides, the real-time evaluation of path state in MPTCP is carried out by the batch estimation theory model, which realizes the on-demand dynamic adjustment of the network congestion time window. Finally, SUMO, MOVE, and NS2 tools are used to create a VANET-like environment to evaluate the performance of the proposed congestion control strategy. Experimental results show that the proposed method is superior to other three methods in the four indicators of average delay time, average transmission rate, number of retransmissions, and packet loss rate compared with other advanced methods.


Author(s):  
G. Golovko ◽  
A. Matiashenko ◽  
N. Solopihin

This article offers an example of using an application whose main task is to encrypt data such as files and private messages. Data encryption is performed using an encryption algorithm - xor. The XOR cipher is a data encryption algorithm using exclusive disjunction. Acquired widespread use in computer networks in the 90's due to the ease of implementation. Used to encrypt Microsoft Word documents in Windows. The XOR encryption algorithm is to "overlay" a sequence of random numbers on the text to be encrypted. A sequence of random numbers is called a gamma sequence, and is used to encrypt and decrypt data. If you use a key with a length at least equal to the length of the message, the XOR cipher becomes much more crypto-resistant than when using a duplicate key. For cryptological protection of information of the travel company Rest & Travel, EDcrypt software has been created, which performs the following functions: account login; inability to use the system without logging in to the account; notification of entering incorrect user data; message encryption; decryption of messages; the ability to select the recipient of the message; encryption of text files; decryption of text files; sending text files to selected recipients; three interface languages: English, Russian, Ukrainian


Author(s):  
I Made Sukarsa ◽  
I Made Rama Pradana ◽  
Putu Wira Buana

Communication via sockets is used to transmit information between applications or between processes over network or locally. ZeroMQ is a library for sending messages using sockets that are quite well known. Talking about sending data, message security is an important part that needs to be taken into account, especially when sending data over a network. ZeroMQ sends messages openly without securing the messages sent. This is evidenced by research which states that ZeroMQ does not have a security layer for sending messages over the network and direct observation of message packets using the wireshark application. Therefore, this study creates a method of securing and authenticating message delivery using AES (Advanced Encryption Standard) CBC (Cipher Block Chaining) mode combined with an authentication method. The AES CBC mode was chosen because it is faster than other methods and has strong encryption. This encryption and authentication are used so that the sender and recipient of the message are both valid senders and recipients so that no message changes during message delivery and messages can only be opened by the message recipient and the sender of the message. Tests are conducted to measure the effect of encryption and authentication on message delivery performance. Based on the tests conducted, there is an increase of 7% from normal delivery speed and the potential for messages is not up to 0.3% - 1.5%.


Electronics ◽  
2020 ◽  
Vol 9 (8) ◽  
pp. 1320
Author(s):  
Joong-Hwa Jung ◽  
Moneeb Gohar ◽  
Seok-Joo Koh

The Constrained Application Protocol (CoAP) is a representative messaging protocol for Internet of Things (IoT) applications. It is noted that a lot of IoT-based streaming applications have been recently deployed. Typically, CoAP uses User Datagram Protocol (UDP) as its underlying protocol for lightweight messaging. However, it cannot provide reliability, since it is based on UDP. Thus, the CoAP over Transmission Control Protocol (TCP) was recently proposed so as to provide reliability. However, the existing schemes do not provide the error handling and flow controls suitably for IoT-based streaming applications. This tends to induce throughput degradation in wireless lossy networks. In this paper, we propose a CoAP-based streaming control (CoAP-SC) scheme, which is an extension of CoAP over UDP with error handling and flow control for throughput enhancement. The proposed CoAP-SC scheme is designed by considering the sequence number of data message, the use of ACK messages, and the buffer size of sending buffer. To do this, a new CoAP option is defined. For performance analysis, the proposed scheme is implemented and compared with the existing schemes. From the testbed experimentations in various network environments, we see that the proposed CoAP-SC scheme can provide better throughput than the existing CoAP-based schemes by performing the error handling and flow control operations effectively.


2020 ◽  
Vol 6 (1) ◽  
pp. 109-116
Author(s):  
Abdul Jalil

Tujuan penelitian ini adalah membangun sistem deteksi gerak objek berbasis teknik pengolahan citra menggunakan metode Binary-Image Comparison (BIC). Fungsi metode BIC pada penelitian ini adalah sebagai pengambil keputusan pada saat sistem mengirim data message sebagai hasil dari deteksi gerak objek. Adapun gerak objek yang dideteksi pada penelitian ini adalah objek dengan warna merah, kuning, hijau, dan biru. Pada penelitian ini, proses segmentasi citra biner diproses menggunakan perangkat lunak Library OpenCV yang dieksekusi didalam node Robot Operating System 2 (ROS2). Terdapat beberapa node ROS2 yang digunakan untuk membangun sistem deteksi gerak objek pada penelitian ini, yaitu node untuk membaca input kamera RGB, node untuk mendeteksi gerak objek warna merah, node untuk mendeteksi gerak objek warna kuning, node untuk mendeteksi gerak objek warna hijau, node untuk mendeteksi gerak objek berwarna biru, dan node untuk menerima hasil proses deteksi warna. Setiap node pada sistem tersebut dapat saling terhubung melalui topic untuk dapat saling bertukar data message menggunakan protokol Data Distribution Service (DDS) yang ada pada ROS2. Hasil dari penelitian ini adalah sistem dapat mendeteksi gerak objek warna merah, kuning, hijau, dan biru kemudian mengirimnya sebagai data message berdasarkan hasil keputusan dari metode BIC.


Author(s):  
Rita Mahajan ◽  
Komal Devi ◽  
Deepak Bagai

Cyclic Redundancy Check (CRC), code for error detection finds many applications in the field of digital communication, data storage, control system and data compression. CRC encoding operation is carried out by using a Linear Feedback Shift Register (LFSR). Serial implementation of CRC requires more clock cycles which is equal to data message length plus generator polynomial degree but in parallel implementation of CRC one clock cycle is required if a whole data message is applied at a time. In previous work related to parallel LFSR, hardware complexity of the architecture reduced using a technique named state space transformation. This paper presents detailed explaination of search algorithm implementation and technique to find number of XOR gates required for different CRC algorithms. This paper presents a searching algorithm and new technique to find the number of XOR gates required for different CRC algorithms. The comparison between proposed and previous architectures shows that the number of XOR gates are reduced for CRC algorithms which improve the hardware efficiency. Searching algorithm and all the matrix computations have been performed using MATLAB simulations.


2020 ◽  
Author(s):  
Keyword(s):  

Author(s):  
Jamil Al-Azzeh ◽  
Ziad Alqadi ◽  
Belal Ayyoub ◽  
Ahmad Sharadqh

Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method. The steganography process will based on LSB method, while the cryptography process will based on generating a huge private key and selecting a special function for encryption decryption. The proposed method will be implemented in order to calculate some performance parameters to prove the efficiency of the proposed method.


2019 ◽  
Vol 8 (3) ◽  
pp. 960-969
Author(s):  
Ain Najihah ◽  
Mohamed Hadi Habaebi ◽  
Farah Abdul Rahman

This paper presents the design and implementation steps of a smart visible light communication based toy system equipped with laser sensors that can send and receive the data message based on the conversion of data from ASCII to binary code. The toy system intends to offer two-ways communication that will be a new medium for educational purposes for kids in their developmental stages in which both players can send and receive the data to and from each other toys equipped with sound indicator module to alert the player. Lastly, functionality and system testing were conducted to verify the functionalities of the system. A thorough implementation methodology details are presented in the paper.


Sign in / Sign up

Export Citation Format

Share Document