http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
A multiple access channel game with users implementing throughput and latency metrics
Garnaev Andrey,Trappe Wade 한국통신학회 2023 ICT Express Vol.9 No.5
We consider a multiple access channel (MAC) problem where several users communicate with a base station and in which the users may have different applications or communication purposes for using the network, which is reflected via associated communication metrics. Specifically, we use throughput as the metric to reflect regular data transmission purposes, and latency, modeled by the inverse throughput, is used to reflect data transmission speed as another metric. The problem is formulated as a non-zero sum game. The equilibrium is derived in closed form. Stability in communication for such a heterogeneous network is established by proving the uniqueness of the equilibrium, except for particular cases where stability still can be maintained via cooperation of users with throughput metric or their switching to latency metric.
An IBC and Certificate Based Hybrid Approach to WiMAX Security
Rodoper, Mete,Trappe, Wade,Jung, Edward Tae-Chul The Korea Institute of Information and Commucation 2009 Journal of communications and networks Vol.11 No.6
Worldwide inter-operability for microwave access (WiMAX) is a promising technology that provides high data throughput with low delays for various user types and modes of operation. While much research had been conducted on physical and MAC layers, little attention has been paid to a comprehensive and efficient security solution for WiMAX. We propose a hybrid security solution combining identity-based cryptography (IBC) and certificate based approaches. We provide detailed message exchange steps in order to achieve a complete security that addresses the various kind of threats identified in previous research. While attaining this goal, efficient fusion of both techniques resulted in a 53% bandwidth improvement compared to the standard's approach, PKMv2. Also, in this hybrid approach, we have clarified the key revocation procedures and key lifetimes. Consequently, to the best of knowledge our approach is the first work that unites the advantages of both techniques for improved security while maintaining the low overhead forWiMAX.
An eavesdropping and jamming dilemma with sophisticated players
Andrey Garnaev,Wade Trappe 한국통신학회 2023 ICT Express Vol.9 No.4
Wireless networks are susceptible to malicious attacks, especially those involving eavesdropping and jamming. In this paper, we consider a communication scenario involving a transmitter who wishes to communicate secretly and reliably with a receiver, while an adversary wants to obstruct this communication by means of either eavesdropping or jamming. The transmitter as well as the adversary wants to achieve its own goal in a manner that is as unpredictable as possible to its rival. We model this problem by a non-zero sum game. The expected throughput that is delivered secretly and non-jammed to the receiver is considered as the metric that reflects communication secrecy and reliability. The entropy of the player’s strategies is considered as the metric to reflect the player’s unpredictability. The equilibrium is found in closed form, and parameters of the transmitter’s utility supporting both goals are optimized via a proportional fairness approach.
An IBC and Certificate Based Hybrid Approach to WiMAX Security
Mete Rodoper,Wade Trappe,Edward (Tae-Chul) Jung 한국통신학회 2009 Journal of communications and networks Vol.11 No.6
Worldwide inter-operability for microwave access (WiMAX) is a promising technology that provides high data throughput with low delays for various user types and modes of operation. While much research had been conducted on physical and MAC layers, little attention has been paid to a comprehensive and efficient security solution for WiMAX. We propose a hybrid security solution combining identity-based cryptography (IBC) and certificate based approaches. We provide detailed message exchange steps in order to achieve a complete security that addresses the various kind of threats identified in previous research. While attaining this goal, efficient fusion of both techniques resulted in a 53% bandwidth improvement compared to the standard’s approach, PKMv2. Also, in this hybrid approach, we have clarified the key revocation procedures and key lifetimes. Consequently, to the best of knowledge our approach is the first work that unites the advantages of both techniques for improved security while maintaining the low overhead forWiMAX.
Effect of Water Stress on Ectomycorrhizal Development and Growth of Alnus rubra Seedlings
Koo, Chang-Duck,Molina, Randy,Miller, Steven L.,Trappe, James M. 한국토양비료학회 2001 한국토양비료학회지 Vol.34 No.4
수분 스트레스가 루브라오리나무(Alnus rubra) 묘목의 균근(Alpova diplophloeus) 발달과 생장에 미치는 영향을 조사하였다. 5일 주기의 수분 스트레스를 10주 동안 처리한 결과 A. diplophloeus 균근의 형성, 묘목의 생리활동 및 생장이 감소하였다. A. diplophloeus 균근균이 접종된 묘목과 접종되지 않은 묘목은 수분 스트레스에 관계없이 생리활동이나 생장에서 차이가 없었다. 질소고정활동은 탄소동화작용보다 수분스트레스에 덜 민감하였다. 이 결과는 수분스트레스 상태에서 A. diplophloeus 균근은 오리나무의 적응도(fitness)에 기여하지 못함을 의미한다. The effects of water stress on the development of Alpova dipiophloeus ectomycorrhizas and on the growth of nodulated Alnus rubra Bong seedlings were investigated. Five-day cyclic water stress significantly decreased the ectomycorrhizal development and the seedling growth. However, A. diplophloeus inoculated seedlings did not significantly differ from the non-inoculated seedlings in the growth and physiological activities under both well watered and water stressed conditions. $N_2$-fixation was less sensitive than $CO_2$ fixation to water stress. We conclude that under water stress conditions A. diplophloeus mycorrhizas do not contribute to the fitness of red alder seedlings.