To see the other types of publications on this topic, follow the link: Wormhole Attack Confirmation system.

Journal articles on the topic 'Wormhole Attack Confirmation system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Wormhole Attack Confirmation system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Tiruvakadu, Divya Sai Keerthi, and Venkataram Pallapa. "Confirmation of wormhole attack in MANETs using honeypot." Computers & Security 76 (July 2018): 32–49. http://dx.doi.org/10.1016/j.cose.2018.02.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Rupinder, Jatinder Singh, and Ravinder Singh. "Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3548607.

Full text
Abstract:
In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS) that automatically detects the WSNs attacks is proposed. AHIDS makes use of cluster-based architecture with enhanced LEACH protocol that intends to reduce the level of energy consumption by the sensor nodes. AHIDS uses anomaly detection and misuse detection based on fuzzy rule sets along with the Multilayer Perceptron Neural Network. The Feed Forward Neural Network along with the Backpropagation Neural Network are utilized to integrate the detection results and indicate the different types of attackers (i.e., Sybil attack, wo
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.

Full text
Abstract:
Wormhole attack is a challenging security threat to wireless sensor networks which results in disrupting most of the routing protocols as this attack can be triggered in different modes. In this paper, WRHT, a wormhole resistant hybrid technique, is proposed, which can detect the presence of wormhole attack in a more optimistic manner than earlier techniques. WRHT is based on the concept of watchdog and Delphi schemes and ensures that the wormhole will not be left untreated in the sensor network. WRHT makes use of the dual wormhole detection mechanism of calculating probability factor time del
APA, Harvard, Vancouver, ISO, and other styles
4

Nikam, Shahuraje, and Anshul Sarawagi. "Security over Wormhole Attack in VANET Network System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 196. http://dx.doi.org/10.23956/ijarcsse.v7i8.50.

Full text
Abstract:
VANET plays important role while dealing with different vehicle communication. Security threats are always rising while working with heavy and public network. In past technique different dissemination techniques were introduced which deals with the security and proper communication in between the nodes and traffic. In this paper, previous approach over the data transmission is performed which deals with the lacking of security terms. Here a presentation of secure ECC with dynamic heuristic approach is presented which exhibit proper performance parameter while communicating in VANET network
APA, Harvard, Vancouver, ISO, and other styles
5

Ghugar, Umashankar, and Jayaram Pradhan. "Survey of wormhole attack in wireless sensor networks." Computer Science and Information Technologies 2, no. 1 (2021): 33–42. http://dx.doi.org/10.11591/csit.v2i1.p33-42.

Full text
Abstract:
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN.In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
APA, Harvard, Vancouver, ISO, and other styles
6

Dhanalakshmi.G, Irin Sherly S,. "Providing Immunity against Wormhole Attack in Wireless Network Coding System." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 02 (2015): 989–94. http://dx.doi.org/10.15680/ijircce.2015.0302040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jamali, Shahram, and Reza Fotohi. "Defending against Wormhole Attack in MANET Using an Artificial Immune System." New Review of Information Networking 21, no. 2 (2016): 79–100. http://dx.doi.org/10.1080/13614576.2016.1247741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sundararajan, T. V. P., S. M. Ramesh, R. Maheswar, and K. R. Deepak. "Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET." Wireless Networks 20, no. 4 (2013): 563–78. http://dx.doi.org/10.1007/s11276-013-0623-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bhosale, Snehal, and Harshal Patil. "Zigbee-Based Intrusion Detection System for Wormhole Attack in Internet of Things." Mathematical Modelling of Engineering Problems 10, no. 2 (2023): 663–70. http://dx.doi.org/10.18280/mmep.100237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, Brij B., and Shaifali Narayan. "A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server." Journal of Organizational and End User Computing 33, no. 2 (2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.

Full text
Abstract:
This paper presents a framework for mutual authentication between a user device and a point of sale (POS) machine using magnetic secure transmission (MST) to prevent the wormhole attack in Samsung pay. The primary attribute of this method is authenticating the POS terminals by an authentication server to bind the generated token to a single POS machine. To secure the system from eavesdropping attack, the data transmitted between the user device and the machine is encrypted by using the Elgamal encryption method. The keys used in the method are dynamic in nature. Furthermore, comparison and sec
APA, Harvard, Vancouver, ISO, and other styles
11

Kumar Joshi, Brijendra, and Megha Soni. "A Security Assessment Framework for Routing and Authentication Protocols of Mobile Ad-hoc Networks." International Journal of Advanced Networking and Applications 14, no. 01 (2022): 5287–93. http://dx.doi.org/10.35444/ijana.2022.14108.

Full text
Abstract:
Security assessment of routing and authentication protocols is based on the comparison of basic and secured versions of protocols such as AODV, SAODV, DSDV, SEAD, ZRP, SRP, LHAP, HEAP etc. In this paper, a framework for security assessment is presented. It is a complete system that attempts to provide the promised services to each user or application. To assess the security of different protocols, a security index is assigned. The value of security index shows how much a protocol is secured. To assign the security index, security parameters have been found out and the performance of different
APA, Harvard, Vancouver, ISO, and other styles
12

Kamaleshwar, T., R. Lakshminarayanan, Yuvaraja Teekaraman, Ramya Kuppusamy, and Arun Radhakrishnan. "Self-Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN." Wireless Communications and Mobile Computing 2021 (December 26, 2021): 1–8. http://dx.doi.org/10.1155/2021/5143124.

Full text
Abstract:
Internet network communication protocol version 6 low-power wireless personal area networks (6LoWPAN) is supposed to assist the gadgets with low-power wireless sensor network (WSN) and it furnishes the top model layer of the data transmission system. The 6LoWPAN is prone to the diversified attacks such as wormhole and black hole attacks, which might be very difficult to become aware of and defend. In a wormhole attack, the attacker listens to the facts over the networks, and in a black hole attack, the intruder reprograms the nodes to dam the data transmission. As an end result, any data datag
APA, Harvard, Vancouver, ISO, and other styles
13

Jamali, Shahram, and Reza Fotohi. "DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system." Journal of Supercomputing 73, no. 12 (2017): 5173–96. http://dx.doi.org/10.1007/s11227-017-2075-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

P.H., Latha, and Vasantha R. "MDS-WLAN: Maximal Data Security in WLAN for Resisting Potential Threats." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 4 (2015): 859. http://dx.doi.org/10.11591/ijece.v5i4.pp859-868.

Full text
Abstract:
The utmost security standards over Wireless Local Area Network (WLAN) are still an unsolved answer in research community as well as among the commercial users. There are various prior attempts in proposing security of WLAN that lacks focus on access point and is found to be quite complex implementation of cryptography. The proposed paper presents a novel, simple, and yet robust technique called as MDS-WLAN i.e. maximal data security in WLAN. The system is evaluated over laboratory prototype and mitigation measures are drawn for resisting wormhole attack, Sybil attack, and rogue access point is
APA, Harvard, Vancouver, ISO, and other styles
15

Chen, Chin-Ling, Tzay-Farn Shih, Yu-Ting Tsai, and De-Kui Li. "A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/534657.

Full text
Abstract:
In recent years, wireless sensor networks have been used in a variety of environments; a wireless network infrastructure, established to communicate and exchange information in a monitoring area, has also been applied in different environments. However, for sensitive applications, security is the paramount issue. In this paper, we propose using bilinear pairing to design dynamic key management and authentication scheme of the hierarchical sensor network. We use the dynamic key management and the pairing-based cryptography (PBC) to establish the session key and the hash message authentication c
APA, Harvard, Vancouver, ISO, and other styles
16

Deshmukh-Bhosale, Snehal, and Santosh S. Sonavane. "A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things." Procedia Manufacturing 32 (2019): 840–47. http://dx.doi.org/10.1016/j.promfg.2019.02.292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ahmad, Masood, Ateeq Ur Rehman, Nighat Ayub, et al. "Security, usability, and biometric authentication scheme for electronic voting using multiple keys." International Journal of Distributed Sensor Networks 16, no. 7 (2020): 155014772094402. http://dx.doi.org/10.1177/1550147720944025.

Full text
Abstract:
We propose electronic voting authentication scheme, which is a key management mechanism for electronic voting system intended to limit the number of attacks on a polling station and strengthen the security control. The motivation is to diversify security requirements of messages exchanged between polling stations. There are different types of messages exchanged between polling stations and each type of message has different security needs. A security mechanism developed on the basis of a single key is not enough to ensure the diverse security needs of voting network. In electronic voting authe
APA, Harvard, Vancouver, ISO, and other styles
18

Tulaib, Lamia F., Akbal O. Salman, and Mazin A. Mohammed. "Innovative Techniques for Attack Detection in Wireless Ad-Hoc Networks." International Journal of Wireless and Ad Hoc Communication 3, no. 1 (2021): 49–58. http://dx.doi.org/10.54216/ijwac.030105.

Full text
Abstract:
As a result of the inherent weaknesses of the wireless medium, ad hoc networks are susceptible to a broad variety of threats and assaults. As a direct consequence of this, intrusion detection, as well as security, privacy, and authentication in ad-hoc networks, have developed into a primary focus of the current study. This body of research aims to identify the dangers posed by a variety of assaults that are often seen in wireless ad-hoc networks and provide strategies to counteract those dangers. The Black hole assault, Wormhole attack, Selective Forwarding attack, Sybil attack, and Denial-of-
APA, Harvard, Vancouver, ISO, and other styles
19

Gorbenko, I. D., O. G. Kachko, Yu I. Gorbenko, I. V. Stelnik, S. O. Kandy, and M. V. Yesina. "Methods for constructing system-wide parameters and keys for NTRU PRIME UKRAINE 5 – 7 stabvility levels. Product form." Radiotekhnika, no. 195 (December 28, 2018): 5–16. http://dx.doi.org/10.30837/rt.2018.4.195.01.

Full text
Abstract:
The research was carried out and the development of an effective practical algorithm for the construction of system-wide parameters and keys of cryptographic transformations such as asymmetric ciphers for a special form of setting the Product Form polynomial was performed. The experimental confirmation of the built-in system-wide parameters for 5 – 7 stability levels NTRU PRIME UKRAINE, taking into account a combined attack. is given.
APA, Harvard, Vancouver, ISO, and other styles
20

Challenor, R., N. Theobald, S. Pinsent, and H. Mullan. "Genitourinary medicine clinic KC60 coding for first episode genital herpes: a lesson from north of the border?" International Journal of STD & AIDS 18, no. 8 (2007): 570–72. http://dx.doi.org/10.1258/095646207781439793.

Full text
Abstract:
A survey of the accuracy of applying the KC60 diagnostic code for genital herpes: first attack (C10A) was undertaken by non-consultant career-grade doctors working in genitourinary (GU) medicine in England, Wales and Northern Ireland. In total, 148 forms were returned (58% response). Overall, 88/148, 59.5% (95% confidence interval 51.5–67.4%) applied the correct codes for all the clinical scenarios presented. Of doctors who personally assigned codes to clinical episodes, 57/104 (54.8%), were correct compared with 31/44 (70.5%) who did not personally apply codes. There was no difference between
APA, Harvard, Vancouver, ISO, and other styles
21

Woźniak, Mikołaj. "The Issue of Self-defence Based on Crisis Management and Combat System Krav Maga." Przegląd Strategiczny, no. 12 (December 31, 2019): 233–45. http://dx.doi.org/10.14746/ps.2019.1.15.

Full text
Abstract:
The goal of this publication is to confirm that the pattern of operation, developed based on the Krav Maga combat system and crisis management, provides an individual with safety against the threat of a street attack. At the beginning of the article, the issues of self-defence were discussed, the Krav Maga combat system was presented and the most important elements of the crisis management theory were introduced. Later in the paper, an analysis of each of the crisis management phases was carried out in relation to the risk of a street attack. The author answers the research questions in detail
APA, Harvard, Vancouver, ISO, and other styles
22

Hepsiba, C. Linda, and R. Jemima Priyadarsini. "Sinkhole Detection in IOT using Elliptic Curve Digital Signature." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 5 (2023): 322–29. http://dx.doi.org/10.17762/ijritcc.v11i5.6620.

Full text
Abstract:
A variety of smart applications, including homes, transportation, health, and robots in industries, are starting to gain interest due to the fast expansion of Internet of Things (IoT). Smart devices are made up of sensors and actuators that actively involved in monitoring, prediction, security, and information sharing in the IoT ecosystem. These state-of-the-art (SOTA) technologies enable people to monitor and manage their unified milieu in real-time. IoT devices are nevertheless regularly used in hostile situations, where attackers try to grab and penetrate them to take over the entire networ
APA, Harvard, Vancouver, ISO, and other styles
23

Donchev, Anton. "Applying Confirmation Theory to the Case against Neurolaw." Balkan Journal of Philosophy 10, no. 1 (2018): 45–54. http://dx.doi.org/10.5840/bjp20181016.

Full text
Abstract:
Neurolaw is the emerging research field and practice of applying neuroscientific knowledge to legal standards and proceedings. This intersection of neuroscience and law has put up some serious claims, the most significant of which is the overall transformation of the legal system as we know it. The claim has met with strong opposition from scholars of law, such as Michael Pardo and Dennis Patterson (2011), who argue that neurolaw (and neuroscience more generally) is conceptually wrong and thus perceive most of it as “nonsense” (Patterson, 2003). I expose a flaw in Pardo and Patterson’s argumen
APA, Harvard, Vancouver, ISO, and other styles
24

Liu, Yang, Yang Zhang, Yongsheng Yang, and Yan Ma. "DOCS: A Data Ownership Confirmation Scheme for Distributed Data Trading." Systems 10, no. 6 (2022): 226. http://dx.doi.org/10.3390/systems10060226.

Full text
Abstract:
Data assets trading can encourage owners to distribute data and achieve large-scale data aggregation to promote the development of the supply chain system. Blockchain is a promising platform for constructing a decentralized data marketplace. The data may face risks in the marketplace, such as illegal theft, malicious tampering, or illegal distribution in the transactions process. The data ownership confirmation in a blockchain-empowered marketplace has attracted much attention in recent years. However, challenges still remain, including maintaining data integrity, traceability of illegal data,
APA, Harvard, Vancouver, ISO, and other styles
25

Huang, Jie, Changsheng Liu, and Joseph Harding. "Research on Blockchain Architecture and Operating Principles Based on H-DAG." Symmetry 15, no. 7 (2023): 1361. http://dx.doi.org/10.3390/sym15071361.

Full text
Abstract:
A hybrid blockchain structure (hybrid directed acyclic graph, or H-DAG) is proposed in this article to solve the existing problem of blockchain architectures using symmetric key encryption technology by combining the characteristics of single-chain blockchains and DAG distributed ledgers. By improving the block and transaction structures and optimizing the consensus mechanism, the H-DAG confirmed transaction orders while maintaining the high-throughput characteristics of a DAG, thus solving the transaction order dependence problem. We introduced a lightweight PoW mechanism to the H-DAG to impr
APA, Harvard, Vancouver, ISO, and other styles
26

Al Sawafi, Yahya, Abderezak Touzene, and Rachid Hedjam. "Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks." Journal of Sensor and Actuator Networks 12, no. 2 (2023): 21. http://dx.doi.org/10.3390/jsan12020021.

Full text
Abstract:
Internet of things (IoT) has become an emerging technology transforming everyday physical objects to be smarter by using underlying technologies such as sensor networks. The routing protocol for low-power and lossy networks (RPL) is considered one of the promising protocols designed for the IoT networks. However, due to the constrained nature of the IoT devices in terms of memory, processing power, and network capabilities, they are exposed to many security attacks. Unfortunately, the existing Intrusion Detection System (IDS) approaches using machine learning that have been proposed to detect
APA, Harvard, Vancouver, ISO, and other styles
27

Younas, Shamim, Faisal Rehman, Tahir Maqsood, Saad Mustafa, Adnan Akhunzada, and Abdullah Gani. "Collaborative Detection of Black Hole and Gray Hole Attacks for Secure Data Communication in VANETs." Applied Sciences 12, no. 23 (2022): 12448. http://dx.doi.org/10.3390/app122312448.

Full text
Abstract:
Vehicle ad hoc networks (VANETs) are vital towards the success and comfort of self-driving as well as semi-automobile vehicles. Such vehicles rely heavily on data management and the exchange of Cooperative Awareness Messages (CAMs) for external communication with the environment. VANETs are vulnerable to a variety of attacks, including Black Hole, Gray Hole, wormhole, and rush attacks. These attacks are aimed at disrupting traffic between cars and on the roadside. The discovery of Black Hole attack has become an increasingly critical problem due to widespread adoption of autonomous and connect
APA, Harvard, Vancouver, ISO, and other styles
28

Talukdar, Md Ibrahim, Rosilah Hassan, Md Sharif Hossen, Khaleel Ahmad, Faizan Qamar, and Amjed Sid Ahmed. "Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature." Wireless Communications and Mobile Computing 2021 (March 2, 2021): 1–13. http://dx.doi.org/10.1155/2021/6693316.

Full text
Abstract:
In mobile ad hoc networks (MANETs), mobile devices connect with other devices wirelessly, where there is no central administration. They are prone to different types of attacks such as the black hole, insider, gray hole, wormhole, faulty node, and packet drop, which considerably interrupt to perform secure communication. This paper has implemented the denial-of-service attacks like black hole attacks on general-purpose ad hoc on-demand distance vector (AODV) protocol. It uses three approaches: normal AODV, black hole AODV (BH_AODV), and detected black hole AODV (D_BH_AODV), wherein we observe
APA, Harvard, Vancouver, ISO, and other styles
29

Kerrakchou, Imane, Sara Chadli, Yassine Ayachi, and Mohammed Saber. "Modeling the impact of jamming attacks in the internet of things." Indonesian Journal of Electrical Engineering and Computer Science 26, no. 2 (2022): 1206. http://dx.doi.org/10.11591/ijeecs.v26.i2.pp1206-1215.

Full text
Abstract:
Security is a key requirement in the context of the Internet of Things. The IoT is connecting many objects together via wireless and wired connections with the goal of allowing ubiquitous interaction, where all components may communicate with others without constraints. The wireless sensor network is one of the most essential elements of IoT concepts. Because of their unattended and radio-shared nature for communication, security is becoming an important issue. Wireless sensor nodes are susceptible to different types of attacks. Such attacks can be carried out in several various ways. One of t
APA, Harvard, Vancouver, ISO, and other styles
30

Xie, Qingqing, Fan Dong, and Xia Feng. "HLOChain: A Hierarchical Blockchain Framework with Lightweight Consensus and Optimized Storage for IoT." Security and Communication Networks 2023 (April 11, 2023): 1–14. http://dx.doi.org/10.1155/2023/3412200.

Full text
Abstract:
Blockchain can effectively deal with the security and trust issues in Internet of Things (IoT) due to its salient features including decentralization, immutability, traceability, openness, and transparency. However, most IoT devices have too limited computing, storage, and bandwidth resources to maintain the complete operation of a blockchain system. To this end, we propose a hierarchical blockchain framework called HLOChain for IoT scenarios. First, according to computing and storage capabilities, the IoT devices are classified into three levels, i.e., high, medium, and low. They are deployed
APA, Harvard, Vancouver, ISO, and other styles
31

Perumal, Sundresan. "An Effectual Secured Approach Against Sybil Attacks in Wireless Networks." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 09 (2022): 217–30. http://dx.doi.org/10.3991/ijim.v16i09.30213.

Full text
Abstract:
In both wireless and mobile ad hoc networks, assaults can come from a variety of different sources. The terms "active attack" and "passive attack" describe these two types of attacks. In the network community, the Sybil attack is one of the most often used and deployed techniques for sniffing identities and repurposing them. Multiple identities or Sybil attacks have recently sparked a lot of interest in the research community. The algorithms and networks on which they are tested are vastly different among the many methods that have been offered. Since researchers can't evaluate these systems s
APA, Harvard, Vancouver, ISO, and other styles
32

Pisitpayat, Nichakul, Ram Rangsin, Kanlaya Jongcherdchootrakul, Chawetsan Namwat, Anek Mungaomklang, and Wanna Hanshaoworakul. "First-generation Cluster of Coronavirus Disease 2019 (COVID-19) Related to Boxing Stadiums in Bangkok and the Bangkok Metropolitan Region, March 2020." Outbreak, Surveillance, Investigation & Response (OSIR) Journal 15, no. 4 (2022): 106–13. http://dx.doi.org/10.59096/osir.v15i4.262273.

Full text
Abstract:
In March 2020, clusters of COVID-19 cases were reported among attendees of a boxing stadium in Bangkok. This study aimed to investigate and describe the outbreak and identify its source. We conducted a descriptive analysis of cases and transmission patterns, performed a walk-through survey and interviewed stadium staffs for possible factors related to disease spreading. COVID-19 cases were those who had a history of visiting Bangkok or the Bangkok Metropolitan boxing stadiums, or contacting confirmed cases visiting boxing stadiums within 14 days of developing symptoms with laboratory confirmat
APA, Harvard, Vancouver, ISO, and other styles
33

Amoako, Kingsley K., Michael J. Shields, Noriko Goji, et al. "Rapid Detection and Identification ofYersinia pestisfrom Food Using Immunomagnetic Separation and Pyrosequencing." Journal of Pathogens 2012 (2012): 1–6. http://dx.doi.org/10.1155/2012/781652.

Full text
Abstract:
Interest has recently been renewed in the possible use ofY. pestis, the causative agent of plague, as a biological weapon by terrorists. The vulnerability of food to intentional contamination coupled with reports of humans having acquired plague through eating infected animals that were not adequately cooked or handling of meat from infected animals makes the possible use ofY. pestisin a foodborne bioterrorism attack a reality. Rapid, efficient food sample preparation and detection systems that will help overcome the problem associated with the complexity of the different matrices and also rem
APA, Harvard, Vancouver, ISO, and other styles
34

Kaur, J., and S. Kaur. "A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network." International Journal of Business Data Communications and Networking 15, no. 2 (2019): 35–54. http://dx.doi.org/10.4018/ijbdcn.2019070103.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) are comprised of an arrangement of self-sorting mobile hosts furnished with wireless interaction devices gathered in groups without the need of any settled framework as well as centralized organization to maintain a system over radio connections. Every mobile node can react as a host and also, the router freely utilizes the wireless medium inside the correspondence range to deal with the interaction between huge quantities of individual mobile nodes by framing a correspondence system and trading the information among them without using any described group of the
APA, Harvard, Vancouver, ISO, and other styles
35

Yu, Chao, Wenke Yang, Feiyu Xie, and Jianmin He. "Technology and Security Analysis of Cryptocurrency Based on Blockchain." Complexity 2022 (July 21, 2022): 1–15. http://dx.doi.org/10.1155/2022/5835457.

Full text
Abstract:
Blockchain technology applied to cryptocurrencies is the dominant factor in maintaining the security of cryptocurrencies. This article reviews the technological implementation of cryptocurrency and the security and stability of cryptocurrency and analyzes the security support from blockchain technology and its platforms based on empirical case studies. Our results show that the security support from blockchain technology platforms is significantly insufficient and immature. In addition, we further Zyskind and Nathan (2015) and Choi (2019) and find that the top ten platforms play critical roles i
APA, Harvard, Vancouver, ISO, and other styles
36

Simpson, Colin R., Nazir Lone, Jim McMenamin, et al. "Early estimation of pandemic influenza Antiviral and Vaccine Effectiveness (EAVE): use of a unique community and laboratory national data-linked cohort study." Health Technology Assessment 19, no. 79 (2015): 1–32. http://dx.doi.org/10.3310/hta19790.

Full text
Abstract:
BackgroundAfter the introduction of any new pandemic influenza, population-level surveillance and rapid assessment of the effectiveness of a new vaccination will be required to ensure that it is targeted to those at increased risk of serious illness or death from influenza.ObjectiveWe aimed to build a pandemic influenza reporting platform that will determine, once a new pandemic is under way: the uptake and effectiveness of any new pandemic vaccine or any protective effect conferred by antiviral drugs once available; the clinical attack rate of pandemic influenza; and the existence of protecti
APA, Harvard, Vancouver, ISO, and other styles
37

Kodera, Yoshihisa, Kazuhito Yamamoto, Shunichi Kato, et al. "Safety and Risk of Allogeneic Peripheral Blood Stem Cell Donation: The Comprehensive Report of Nation-Wide Consecutively Pre-Registered 3,264 Family Donor Survey In 10years Project by Japan Society for Hematopoietic Cell Transplantation." Blood 116, no. 21 (2010): 1180. http://dx.doi.org/10.1182/blood.v116.21.1180.1180.

Full text
Abstract:
Abstract Abstract 1180 Background: Although peripheral blood stem cell (PBSC) donation has been considered safe and less stressful, certain fetal or life-threatening acute (within 30 days of post donation) adverse events as well as late occurrence of hematological malignancies have been reported among donors. Since the Japan Marrow Donor Program requires the confirmation of safety and risk of PBSC donation at family donors prior to applying this technique for volunteer donors, the Japan Society for Hematopoietic Cell Transplantation (JSHCT) performed nation-wide consecutive pre-registration an
APA, Harvard, Vancouver, ISO, and other styles
38

Ettabonia, Santhosh Kumar, Komalatha Nakkala, and Nayana Chathalingath. "An Investigation on Omicron Variant Corona Virus and its Impact." Pharmaceutical Sciences and Resarch 1, no. 1 (2022): 12–19. http://dx.doi.org/10.46632/psr/1/1/3.

Full text
Abstract:
Acid substitutes to examine whether the risk over time, Origin of beta, delta and omicron variants In spike protein, there are 15 receptor-binding domains, and syndrome corona virus 2 OMCR variant in travellers who are fully vaccinated in an isolated hotel in Hong Kong after the third vaccine dose is neutralized. SARS-CoV-2 pseudo viruses were first diagnosed with severe acute respiratory syndrome characterized by the presence of an omicron variant of the corona virus 2 that dominates SARS, with the presence of a synthetic protein in Background of omicron or abstract. ORS- variant precedes var
APA, Harvard, Vancouver, ISO, and other styles
39

Korytin, Denys, and Anhelina Zavadska. "To the legal issues of startups in the conditions of armed aggression of the Russian Federation against Ukraine (Russian-Ukrainian War)." Law and innovations, no. 1 (37) (April 1, 2022): 56–62. http://dx.doi.org/10.37772/2518-1718-2022-1(37)-8.

Full text
Abstract:
Problem setting. The armed attack of the Russian Federation on Ukraine without a declaration of war, which took place at 5 am on February 24, 2022, at the same time radically changed the entire system of legal relations of our state. The unification of the whole nation (in the political sense of the term) against the unprecedented criminal actions of the “fraternal people” caused a temporary cessation (or modification) of the usual daily work of every citizen, foreigner or stateless person. Undoubtedly, business representatives, including startups, have been providing significant support for t
APA, Harvard, Vancouver, ISO, and other styles
40

Kwan, Vickie, Eric Kaplovitch, Rita Selby, and Jameel Abdulrehman. "Effectiveness and Safety of the Direct Oral Anticoagulants in Low-Risk Antiphospholipid Syndrome: A Case Series." Blood 136, Supplement 1 (2020): 16–17. http://dx.doi.org/10.1182/blood-2020-142842.

Full text
Abstract:
Introduction: Thrombotic Antiphospholipid syndrome (TAPS) is an autoimmune condition where venous thromboembolism (VTE) and/or arterial thromboembolism (ATE) occurs in the presence of antiphospholipid antibodies (aPLs). TAPS is traditionally managed with long-term anticoagulation with vitamin K antagonists (VKA). Over the past decade, direct oral anticoagulants (DOACs) have been increasingly replacing VKAs as the oral anticoagulant of choice given their lower risk of bleeding, fixed dosing, and no requirement for routine monitoring. However, recent evidence has demonstrated inferiority of DOAC
APA, Harvard, Vancouver, ISO, and other styles
41

Vidadala, Ramasubbarao, and Madhusudana Rao J. "Isolation, characterization and semi-synthesis of natural products dimeric amide alkaloids." Journal of Natural Products and Natural Products Synthesis 1, no. 1 (2021): 1–14. http://dx.doi.org/10.55124/jnns.v1i1.17.

Full text
Abstract:
Isolation, characterization of natural products dimeric amide alkaloids from roots of the Piper chaba Hunter. The synthesis of these products using intermolecular [4+2] cycloaddition reaction has been described. Obtained products were characterized using IR, 1HNMR, 13CNMR and Mass Spectroscopy. Introduction The awesome structural diversity and complexity of natural products inspire many chemists to consider how nature creates these molecules. Nature’s biosynthetic enzymes offer a powerful and practical route to many organic compounds, and synthetic chemists sometimes seek to imitate the effici
APA, Harvard, Vancouver, ISO, and other styles
42

Abdelhedi, Fatma, and Nabil Derbel. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (2016): 513–19. http://dx.doi.org/10.25046/aj020366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Biran, Yahav, George Collins, Borky John M, and Joel Dubow. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 513-519 (2017); View Description Modelization of cognition, activity and motivation as indicators for Interactive Learning Environment Asmaa Darouich, Faddoul Khoukhi, Khadija Douzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 520-531 (2017); View Description Homemade array of surface coils implementation for small animal magnetic resonance imaging Fernando Yepes-Calderon, Olivier Beuf Adv. Sci. Technol. Eng. Syst. J. 2(3), 532-539 (2017); View Description An Encryption Key for Secure Authentication: The Dynamic Solution Zubayr Khalid, Pritam Paul, Khabbab Zakaria, Himadri Nath Saha Adv. Sci. Technol. Eng. Syst. J. 2(3), 540-544 (2017); View Description Multi-Domain Virtual Network Embedding with Coordinated Link Mapping Shuopeng Li, Mohand Yazid Saidi, Ken Chen Adv. Sci. Technol. Eng. Syst. J. 2(3), 545-552 (2017); View Description Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (2017): 553–61. http://dx.doi.org/10.25046/aj020371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

"Artificial Immune System based Improved Secure-Aware Wormhole Attack Detection in MANET." International Journal of Recent Technology and Engineering 8, no. 2 (2019): 2834–41. http://dx.doi.org/10.35940/ijrte.b1977.078219.

Full text
Abstract:
Typically, the most significant challenge in Mobile Adhoc Network (MANET) is detecting the wormhole attacks in the network during communication that degrades the overall network performance. Many routing protocols have been developed to detect and prevent the wormhole attacks based on the requirements of hardware, synchronization clocks, etc. To avoid those requirements, Improved Secure-aware Wormhole Attack Detection (ISWAD) technique was proposed by considering the maximum end-to-end delay and path length from source to the destination node. However, it requires more parameters to further in
APA, Harvard, Vancouver, ISO, and other styles
45

Umoren, Imeh, Ekemini Okpongkpong, and Ifreke Udoeka. "A Fuzzy Knowledge-Based Approach for End-2-End Behavioural Analysis of Wormhole Attacks on Mobile Ad-Hoc Networks." International Journal of Information Systems and Informatics 2, no. 4 (2022). http://dx.doi.org/10.47747/ijisi.v2i4.581.

Full text
Abstract:
Mobile Ad hoc Networks (MANETs) involves series of travelling nodes communicating with each other without a fixed Set-up. Certainly, MANETs are networks that utilize communication peripatetic nodes such as; Personal Digital Assistants (PDAs), mobile phones, laptops which enable wireless transmission across an area and forwarding data packets to the other nodes resulting in frequent change in topology. MANETs are exposed to several communication assaults such as active attack and passive attack. The active attack disrupts network operations while the passive attack obtains information without u
APA, Harvard, Vancouver, ISO, and other styles
46

"A Hybridized Immune System for Avoidance of Wormhole Attacks in Manet." International Journal of Engineering and Advanced Technology 9, no. 1 (2019): 2189–95. http://dx.doi.org/10.35940/ijeat.a9707.109119.

Full text
Abstract:
In Mobile Ad-hoc Networks (MANETs), the most challenging task is detecting and mitigating wormhole links during data transmission between the source and destination nodes. Since it requires special hardware, synchronized clocks, mobile nodes equipped with GPS, etc. To overcome these challenges, Artificial Immune System-based Improved Secureaware Wormhole Attack Detection (AIS-ISWAD) technique has been proposed that considers maximum end-to-end delay, path length and system parameters for detecting wormhole attacks. To simplify the detection process, AIS has been used as a learning approach tha
APA, Harvard, Vancouver, ISO, and other styles
47

Bhosale, Snehal A., and S. S. Sonavane. "Wormhole Attack Detection System for IoT Network: A Hybrid Approach." Wireless Personal Communications, November 30, 2021. http://dx.doi.org/10.1007/s11277-021-09395-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

"Wormhole Attack Isolation Access from Mobile Ad hoc Network with Delay Prediction Method." International Journal of Recent Technology and Engineering 8, no. 6 (2020): 3672–80. http://dx.doi.org/10.35940/ijrte.f8230.038620.

Full text
Abstract:
The moveable ad hoc networks are untrustworthy and inclined to any intrusion due to their wireless interaction approach. Therefore the information from these networks can be stolen very easily just by introducing the attacker nodes in the system. The straight route extent is calculated with the help of hop count metric. For this purpose, routing protocols are designed. The wormhole attack is considered to be the hazardous one among several attacks. This intrusion is commenced with the help of couple attacker nodes. These nodes make a channel by placing some sensor nodes between transmitter and
APA, Harvard, Vancouver, ISO, and other styles
49

Jegan, G., and P. Samundiswary. "Wormhole Attack Detection in Zigbee Wireless Sensor Networks using Intrusion Detection System." Indian Journal of Science and Technology 9, no. 45 (2016). http://dx.doi.org/10.17485/ijst/2016/v9i45/102866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

"MAR_Worm: Secure and Efficient Wormhole Detection Scheme through Trusted Neighbour Nodes in VANETs." International Journal of Innovative Technology and Exploring Engineering 9, no. 2S (2019): 180–83. http://dx.doi.org/10.35940/ijitee.b1098.1292s19.

Full text
Abstract:
VANET is an application and subclass of MANET’s, in which nodes are mobiles and considered as moving, communicating vehicles in a wireless adhoc network. Vehicles communicate through dedicated short rage communication (DSRC) via IEEE 802.11p protocol. With the progress of wireless technology, vehicular ad hoc network has become emerging technology to support real-time traffic condition, safety, entertainment, enhance driver experience and emergency navigation in intelligent transport system (ITS). Core of VANETs application is the communication between vehicle to vehicle (V2V), vehicle to road
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!