期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Timer Entrenched Baited Scheme to Locate and Remove Attacks in MANET
1
作者 S.Padmapriya r.Shankar +3 位作者 r.thiagarajan N.Partheeban A.Daniel S.Arun 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期491-505,共15页
The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various t... The Mobile Ad-hoc Network(MANET)is a dynamic topology that provides a variety of executions in various disciplines.The most sticky topic in organizationalfields was MANET protection.MANET is helpless against various threats that affect its usability and accessibility.The dark opening assault is considered one of the most far-reaching dynamic assaults that deteriorate the organi-zation's execution and reliability by dropping all approaching packages via the noxious node.The Dark Opening Node aims to deceive any node in the company that wishes to connect to another node by pretending to get the most delicate ability to support the target node.Ad-hoc On-demand Distance Vector(AODV)is a responsive steering convention with no corporate techniques to locate and destroy the dark opening center.We improved AODV by incorporating a novel compact method for detecting and isolating lonely and collaborative black-hole threats that utilize clocks and baits.The recommended method allows MANET nodes to discover and segregate black-hole network nodes over dynamic changes in the network topology.We implement the suggested method's performance with the help of Network Simulator(NS)-3 simulation models.Furthermore,the proposed approach comes exceptionally near to the original AODV,absent black holes in terms of bandwidth,end-to-end latency,error rate,and delivery ratio. 展开更多
关键词 Mobile ad-hoc network(MANET) wireless ad hoc network ADOV ATTACKS denial of service
下载PDF
Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes
2
作者 S.M.Udhaya Sankar S.Thanga revathi r.thiagarajan 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期625-640,共16页
An ad-hoc sensor network(ASN)is a group of sensing nodes that transmit data over a wireless link to a target node,direct or indirect,through a series of nodes.ASN becomes a high-risk group for several security exploit... An ad-hoc sensor network(ASN)is a group of sensing nodes that transmit data over a wireless link to a target node,direct or indirect,through a series of nodes.ASN becomes a high-risk group for several security exploits due to the sensor node’s limited resources.Internal threats are more challenging to protect against than external attacks.The nodes are grouped,and calculate each node’s trust level.The trust level is the result of combining internal and external trust degrees.Cluster heads(CH)are chosen based on the anticipated trust levels.The communications are then digitally signed by the source,encoded using a key pair given by a trustworthy CH,decoded by the recipient,and supervised by verifications.It authenticates the technique by identifying the presence of both the transmitter and the recipient.Our approach looks for a trustworthy neighboring node that meets the trust threshold condition to authenticate the key produced.The companion node reaffirms the node’s reliability by getting the public-key certification.The seeking sensor node and the certification issuer node must have a close and trusting relationship.The results of the proposed hybrid authentication using a node trustworthy(HANT)system are modeled and tested,and the suggested approach outperforms conventional trust-based approaches in throughput,latency,lifetime,and vulnerability methods. 展开更多
关键词 Ad hoc sensor network wireless security clustering CRYPTOGRAPHY key management
下载PDF
The associations between resilience and socio-demographic factors in parents who care for their children with congenital heart disease
3
作者 Amy E.Delaney Mei rosemary Fu +6 位作者 Melissa L.McTernan Audrey C.Marshall Jessica Lindberg ravi r.thiagarajan Zhuzhu Zhou Jeibei Luo Sharon Glazer 《International Journal of Nursing Sciences》 CSCD 2022年第3期321-327,I0002,共8页
Objective To examine the resilience of parents of children with congenital heart disease and to investigate socio-demographic factors that may influence parents’resilience.Methods This is a web-based survey study usi... Objective To examine the resilience of parents of children with congenital heart disease and to investigate socio-demographic factors that may influence parents’resilience.Methods This is a web-based survey study using a cross-sectional design.A purposive sampling method was utilized to recruit 515 parents who care for children with congenital heart disease.Resilience was assessed using the Dispositional Resilience Scale-Ⅱ.Based on expert-interviews,a questionnaire was designed to collect socio-demographic data.Descriptive statistics,factor analysis,and linear regressions were used to analyze data.Results A total of 413 parents completed the survey study.The mean resilience score was 3.75(SD=0.61;range=1.89–4.89)with higher scores indicating higher resilience.The linear regression models demonstrated that parents who had lower education levels and lower gross household income had lower resilience(P<0.05).Conclusions Parents reported resilience that reflected their ability to cope with stressful events and mitigate stressors associated with having and caring for children with congenital heart disease.Lower education levels and lower gross household income are associated with lower resilience.To increase parents’resilience,nursing practice and nurse-led interventions should target screening and providing support for parents at-risk for lower resilience.As lower education level and financial hardship are factors that are difficult to modify through personal efforts,charitable foundations,federal and state governments should consider programs that would provide financial and health literacy support for parents at-risk for lower resilience. 展开更多
关键词 CHILD Congenital heart defects Financial stress Households PARENTS RESILIENCE
下载PDF
实时任务准入控制器的自动合成(英文)
4
作者 P. S. thiagarajan 杨绍发 王义 《集成技术》 2017年第3期1-14,共14页
在许多实时系统中,同一个计算平台上往往既有硬实时关键计算任务又有软实时非关键计算任务。硬实时任务必须在规定时间内完成,否则将导致系统错乱或崩溃等严重后果。而软实时任务若没有在规定时间内完成,虽会影响系统性能,但不会造成重... 在许多实时系统中,同一个计算平台上往往既有硬实时关键计算任务又有软实时非关键计算任务。硬实时任务必须在规定时间内完成,否则将导致系统错乱或崩溃等严重后果。而软实时任务若没有在规定时间内完成,虽会影响系统性能,但不会造成重大后果。为确保每个硬实时任务均在其规定时间内完成,在某些情况下需要拒绝一些软实时任务进入任务队列。文章提出了一种基于控制器自动合成策略的解决方案,通过所设计的准入控制器,对系统产生的每一个新任务自动决定是否准其进入任务队列。准入控制器必须使得所有被准入的任务均在规定时间内完成,并且决策序列满足以线性时态逻辑描述的服务质量要求。文章的主要贡献是提出了判定是否存在准入控制器的算法,该算法能在判定结果为真时构造出一个以有限状态时间自动机表达的准入控制器。 展开更多
关键词 实时系统 任务调度 控制器合成 自动机理论
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部