Network Our research aims at providing a scalable, reliable, and robust approach for web service discovery. An overview of web service discovery. Service-oriented Computing (SOC) is emerging as a new paradigm for developing distributed applications. Service discovery, among the most fundamental elements of SOC, is critical to the success of SOC as a whole. Traditional […]
The type system is parameterized by an arbitrary lattice of security levels
A survey on language-based information-flow security contains an overview of the area. Most related to ours is work on tracking information flow in object-oriented languages and on information-flow controls in the presence of exceptions. Language-based concepts and techniques are becoming increasingly popular in the context of security , because they provide an appropriate level of […]
The technique for Fuzzy Grid Prediction
This paper is motivated by our interest in a localization technique for a mobile sensor network, deployed in a harsh environment and a set of interesting/surprising results obtained from simulations of two state-of-the-art localization techniques for mobile sensor networks, namely MCL and MSL. Range-based localization methods require an estimate of the distance or angle between […]
WIRELESS NETWORKS TO ACHIEVE VMISO LINKS
The wireless channel is impaired by random fluctuations in signal level across space, time, and frequency dimensions known as fading. This signal fluctuation (also called diversity) can be exploited by the use of multiple transmissions/ receptions distributed across time or space with appropriate encoding to enhance and stabilize the signal level at the receiver. Such […]
Pixel Prediction Based on Image Inpainting
Reversible steganography, also called reversible data hiding, has been studied extensively in recent years,especially for digital images . The property of reversibility means that the original form of the image, before the secretbits were embedded, can be recovered completely after the embedded bits are extracted. Reversible data hiding can be used for medical, military, and […]
Data-intensive wireless Sensor networks
WSNs have been deployed in a variety of data intensive applications including micro-climate and habitat monitoring, precision agriculture, and audio/video surveillance. A moderate-size WSN can gather up to 1 Gb/year from a biological habitat . Due to the limited storage capacity of sensor nodes, most data must be transmitted to the base station for archiving […]
RDH techniques using directly for encrypted images
Reversible data hiding (RDH) in images is a technique, by which the original cover can be losslessly recovered after the embedded message is extracted. This important technique is widely used in medical imagery, military imagery and law forensics, where no distortion of the original cover is allowed. Since first introduced, RDH has attracted considerable research […]
Policy based management is a very effective method to protect sensitive information
Policy administration is the key to protecting or operating information systems. Only after a legitimate policy set is designed, can the systems run correctly. This paper proposes a policy mechanism CPA under the current trust model, where a professional policy administrator or group is absent. Recently, the security of the Android platform becomes a hotspot […]
PACKET-BY-PACKET ADAPTIVE ROUTING AND SCHEDULING ALGORITHM FOR NETWORKS
They present our adaptive routing and scheduling algorithm. Packet-by-Packet Adaptive Routing for Networks—PARN for ease for repeated reference later. A introduce the queue structure that is used in PARN. The back-pressure algorithm introduced in has been widely studied in the literature. While the ideas behind scheduling using the weights suggested in that paper have been […]
EAACK is an acknowledgment-based IDS
The approach described in this research paper is based on our previous work, where the backbone of EAACK was proposed and evaluated through implementation. Extend it with the introduction of digital signature to prevent the attacker from forging acknowledgment packets. EAACK is consisted of three major parts, namely, ACK, secure ACK (S-ACK), and misbehavior report […]