Search results for "Protocol"
showing 10 items of 1808 documents
Multipath extensions to the DYMO routing protocol
2007
Multipath routing is a technique that can improve performance, specially in mobile ad hoc networks. Due to traffic dispersion it can perform load balancing; minimize the energy consumed by nodes or prevent traffic analysis. In this work we focus on enhancing the DYMO protocol to support multipath routing. We study the impact of traffic dispersion on both UDP and TCP traffic when varying a set of parameters.
Simulation-based Evaluation of DMAMAC - A Dual-Mode Adaptive MAC Protocol for Process Control
2015
Control systems automation is widely used in many industrial domains and have strong requirements on delay, throughput, robustness, and reliability. In the domain of networked control systems, the medium of communication is increasingly involving wireless communication along-side conventional wired communication. Issues ranging from energy efficiency and reliability to low-bandwidth have to be addressed to enable the transition to increased use of wireless communication. In earlier work, we have proposed the Dual-Mode Adaptive MAC (DMAMAC) protocol relying on a combination of Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA). The DMAMAC protocol is able to dynami…
Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127
2014
International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…
Toward Approximate GML Retrieval Based on Structural and Semantic Characteristics
2010
International audience; GML is emerging as the new standard for representing geographic information in GISs on the Web, allowing the encoding of structurally and semantically rich geographic data in self describing XML-based geographic entities. In this study, we address the problem of approximate querying and ranked results for GML data and provide a method for GML query evaluation. Our method consists of two main contributions. First, we propose a tree model for representing GML queries and data collections. Then, we introduce a GML retrieval method based on the concept of tree edit distance as an efficient means for comparing semi-structured data. Our approach allows the evaluation of bo…
Semantic-based Merging of RSS Items
2009
Merging XML documents can be of key importance in several applications. For instance, merging the RSS news from same or different sources and providers can be beneficial for end-users in various scenarios. In this paper, we address this issue and explore the relatedness measure between RSS elements. We show here how to define and compute exclusive relations between any two elements and provide several predefined merging operators that can be extended and adapted to human needs. We also provide a set of experiments conducted to validate our approach. © Springer Science+Business Media, LLC 2009.
Semantic aware RSS query algebra
2010
International audience; Existing XML query algebras are not fully appropriate to retrieve RSS news items mainly due to three reasons: 1) RSS is text rich and its content is dependent on the wording and verbification of the author, thus semantic aware operators are needed; 2) news items are dynamic and consequently time oriented retrieval is needed; 3) a news item may evolve through time, or overlap with other news items and hence identifying relationships between items is also needed. In this paper, we aim to solve these issues by providing a dedicated RSS algebra based on semantic-aware operators that consider RSS characteristics. The provided operators are application domain specific and …
Query-preserving watermarking of relational databases and XML documents
2011
Watermarking allows robust and unobtrusive insertion of information in a digital document. During the last few years, techniques have been proposed for watermarking relational databases or Xml documents, where information insertion must preserve a specific measure on data (for example the mean and variance of numerical attributes). In this article we investigate the problem of watermarking databases or Xml while preserving a set of parametric queries in a specified language, up to an acceptable distortion. We first show that unrestricted databases can not be watermarked while preserving trivial parametric queries. We then exhibit query languages and classes of structures that allow guarante…
SECURE SOLUTION FOR MODERN SEMANTIC SCADA
2013
International audience; NOUS TRAVAILLONS SUR LA SECURITE DES SYSTEMES SCADA (SUPERVI-SORY CONTROL AND DATA AQUISITION) MODERNE EXPLOITANT DES EQUI-PEMENTS MODRNE AVEC DE L’INTELLIGENCE EMBARQUE COMME LES RTU (REMOTE TERMINAL UNIT), LES CAPTEURSINTELLIGENTS, LES ACTIONNEURS INTELLIGENTS, LES EQUIPEMENTS DE L’INSTRUMENTATION GAZIERE MODERNE COMME LES COMPTEURS NUME-RIQUE, LES CORECTEURS ELECTONIQUE, LES POMPES DOSEUSES AVEC CARTE ELECTRONIQUE, LES CHROMATOGRAPHES...ECT. AVEC LES AVANCES TECHNLOGIQUES DE L’INFORMATIQUE EMBARQUE COMME LES SERVICES WEB ET LES APPLICATION CONCU SELON LES ARCHITECTURES MODERNE (SOA- SERVICE ORIENTED ARCHITECTURE), LES ONTOLOGIES ET LE WEB SEMANTIQUE, LES BASES DE …
IP-Based Mobility Management and Handover Latency Measurement in heterogeneous environments
2017
International audience; One serious concern in the ubiquitous networks is the seamless vertical handover management between different wireless technologies. To meet this challenge, many standardization organizations proposed different protocols at different layers of the protocol stack. The Internet Engineering Task Force (IETF) has different groups working on mobility at IP level in order to enhance mobile IPv4 and mobile IPv6 with different variants: HMIPv6 (Hierarchical Mobile IPv6), FMIPv6 (Fast Mobile IPv6) and PMIPv6 (Proxy Mobile IPv6) for seamless handover. Moreover, the IEEE 802.21 standard provides another framework for seamless handover. The 3GPP standard provides the Access Netw…
XA2C Framework for XML Alteration/Adaptation
2010
XML has crossed the borders of software engineering and has spread to other areas such as e-commerce, identification, information storage, instant messaging and others. It is used to communicate crucial data over these domains. Thus, allowing non-expert programmers to manipulate and control their XML data is essential. In the literature, this issue has been dealt with from 3 perspectives: (i) XML alteration/adaptation techniques requiring a certain level of expertise to be implemented and are not unified yet, (ii) mashups, which are not formally defined yet and are not specific to XML data, and (iii) XML-oriented visual languages based on structural transformations and data extraction mainl…