Classification on the Monogenic Scale Space: Application to Target Recognition in SAR Image

Classification on the Monogenic Scale Space: Application to Target Recognition in SAR Image A novel classification strategy is proposed based on the monogenic scale space for target recognition in Synthetic Aperture Radar (SAR) image. The proposed method exploits monogenic signal theory, a multidimensional generalization of the analytic signal, to capture the characteristics of SAR image, e.g., broad spectral information and simultaneous spatial localization. The components derived from the monogenic signal at different scales are then applied into a recently developed framework, sparse representation-based classification (SRC). Moreover, to deal with the…

Read More

Time-Delayed Broadcasting for Defeating Inside Jammers

Time-Delayed Broadcasting for Defeating Inside Jammers Jamming-resistant broadcast communications under an internal threat model is proposed. A timedelayed broadcast scheme (TDBS) is proposed, which implements the broadcast operation as a series of unicast transmissions distributed in frequency and time. TDBS does not rely on commonly shared secrets, or the existence of jamming-immune control channels for coordinating broadcasts. Instead, each node follows a unique pseudo-noise (PN) frequency hopping sequence. Contrary to conventional PN sequences designed for multi-access systems, the PN sequences in TDBS exhibit correlation to enable broadcast. Moreover, they are…

Read More

An Efficient Distributed Trust Model for Wireless Sensor Networks

An Efficient Distributed Trust Model for Wireless Sensor Networks Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. However, most current research works only take communication behavior into account to calculate sensor nodes’ trust value, which is not enough for trust evaluation due to the widespread malicious attacks. An Efficient Distributed Trust Model (EDTM) is proposed for WSNs. First, according to the number of packets received by sensor nodes, direct trust and recommendation trust are…

Read More

Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System

Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System Real-time path planning can efficiently relieve traffic congestion in urban scenarios. However, how to design an efficient path planning algorithm to achieve a globally optimal vehicle traffic control still remains a challenging problem, especially when we take drivers’ individual preferences into consideration. A hybrid intelligent transportation system (ITS) is established, i.e., a hybrid VANET enhanced ITS, which utilizes both vehicular adhoc networks (VANETs) and cellular systems of the public transportation system to enable real-time…

Read More

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such as averaging. However such aggregation is known to be highly vulnerable to node compromising attacks. Since WSN are usually unattended and without tamper resistant hardware, they are highly susceptible to such attacks. Thus, ascertaining trustworthiness of data and reputation of sensor nodes is crucial for WSN. As the performance…

Read More

A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks

A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks Security and energy efficiency are critical concerns in wireless sensor network (WSN) design. An energy-efficient secure scheme against power exhausting attacks is developed, especially the denial-of-sleep attacks, which can shorten the lifetime of WSNs rapidly. Although various media access control (MAC) protocols have been proposed to save the power and extend the lifetime of WSNs, the existing designs of MAC protocol are insufficient to protect the WSNs from denial of- sleep attacks in MAC layer. This is attributed…

Read More

RRW – A Robust and Reversible Watermarking Technique for Relational Data

RRW – A Robust and Reversible Watermarking Technique for Relational Data Advancement in information technology is playing an increasing role in the use of information systems comprising relational databases. These databases are used effectively in collaborative environments for information extraction; consequently, they are vulnerable to security threats concerning ownership rights and data tampering. Watermarking is advocated to enforce ownership rights over shared relational data and for providing a means for tackling data tampering. When ownership rights are enforced using watermarking, the underlying data undergoes certain modifications; as a result of…

Read More

A Large Probabilistic Semantic Network based Approach to Compute Term Similarity

A Large Probabilistic Semantic Network based Approach to Compute Term Similarity Measuring semantic similarity between two terms is essential for a variety of text analytics and understanding applications. Currently, there are two main approaches for this task, namely the knowledge based and the corpus based approaches. However, existing approaches are more suitable for semantic similarity between words rather than the more general multi-word expressions (MWEs), and they do not scale very well. Contrary to these existing techniques, an efficient and effective approach is proposed for semantic similarity using a large…

Read More