• Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • non-scientific
  • Obituary
  • original-paper
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • short-communication
  • short-report
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • In Jour Smart Sensing And Intelligent Systems
  • International Journal Advanced Network Monitoring Controls


Article | 30-November-2018

Research on Trust-Role Access Control Model in Cloud Computing

cloud computing, cloud computing service security failures occur frequently, and the cloud security issues involved are increasingly prominent. For example, data stored in the cloud makes users have no absolute control over it, and cannot guarantee data integrity and confidentiality. Sex, and cloud service providers have some degree of untrustworthiness, etc., and this potential data security problem constrains cloud computing. Development in archival data management, and access control is one of

Yuchen Wu, Pingping Liu

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 75–80

Article | 24-April-2018

Fine-grained Access Control Scheme Based on Cloud Storage

access control based on CP-ABE. Through the analysis and comparison, the experimental results showed that the proposed scheme optimized the user revocation, reduced the time of data owner to manage data, and realized the safe sharing and efficient storage of sensitive data in the public cloud storage. Finally, the technology in this paper was an optimization both on security and the whole expense, and it must have a good prospect in the future.

Xiaojie Niu

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 207–210

Article | 30-November-2018

A CEP Privacy Security Access Control Framework Based on Event Attribute Detecting Tree

processes and content of the complex event processing and output are open. That is to say, not only legal advanced application can utilize the CEP engine to obtain valuable information, but also illegal users are also able to acquire any necessary information for their criminal behaviors. This presents the CEP technology with huge responsibility with respect to the privacy security protection in detecting information. Up to now, there are few studies on CEP privacy security access control, thus the

Bo Hong, Xin Jing

International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 3, 77–84

Article | 30-November-2018

A Secure Voice Signature Based Lightweight Authentication Approach for Remote Access Control

shifted to the adoption of biometric solution to mitigate some of the security loopholes of cryptography solution. Biometric based technique may limit key generation and operability only to the users. However, some biometric based techniques have shortcomings which hinder their adoptability in access control. For example, replication is one of the major vulnerabilities of finger print based authentication systems. A few methods for fingerprint replication such as the use of grease stains on the

Oladayo Olufemi Olakanmi, Aminat Shodipo

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 69–74

Article | 01-December-2012


The properties of underwater acoustic channel are quite different from those of terrestrial wireless sensor networks. There are many challenges to design an efficient media access control (MAC) protocol for underwater acoustic sensor networks (UWASNs). In order to overcome the long propagation delay and low available bandwidth of UWASNs, an enhanced dynamic token protocol (EDTP), is proposed in the paper. It uses token passing queue (TPQ) and TPQ backup method to transfer the token packets

Guangyu Fan, Jian Li, Wenhong Liu, Yang Zhao

International Journal on Smart Sensing and Intelligent Systems, Volume 5 , ISSUE 4, 879–895

research-article | 30-November-2019

Guaranteed time slot trade-off in QOS improvement with IEEE standard 802.15.4 for wireless sensor networks at the MAC layer

S. S. Bamber

International Journal on Smart Sensing and Intelligent Systems, Volume 13 , ISSUE 1, 1–12

Research Article | 01-December-2011

A Hybrid MAC Mechanism for Multiple Load Intelligent Vehicle Transportation Network

The Media Access Control (MAC) mechanism of intelligent vehicle communication network meets a new challenge due to the multiple load data traffic and high speed mobility. This paper proposes a hybrid MAC mechanism which takes the advantages of both TDMA and CSMA mechanism. This hybrid mechanism is based on TDMA, while CSMA mechanism is added in time slots to improve the slot utilization in both high and low load networks. Through the simulation in NS2 we compare the results of the hybrid MAC

Yuan LIU, Yuhao WANG, Siyue CHEN, Xiao LI, Zhengfa RAO

International Journal on Smart Sensing and Intelligent Systems, Volume 4 , ISSUE 4, 662–674

Article | 03-December-2015


circumstance to minimize the energy consumption. Furthermore, a new synchronous sleeping/wake schedule mechanism in the medium access control layer is proposed. Sensor nodes can use the forwarding and listening status to schedule their better energy status on demanded. The experiment has been evaluated and analyzed in a test-bed. The result confirms the structure and the proposed mechanism are energy efficiency and gain better trade-off between the accuracy and efficiency.

ChengFang Zhen, Wenyi LIU, Hanming WEI

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 4, 1997–2017

Article | 09-April-2018

Optimal Pricing for Service Provision in IaaS Cloud Markets

Pricing plays an important role for service provision in cloud computing. In this paper, we investigate price based resource access control in two Monopoly IaaS cloud market, respectively. The two IaaS cloud market is formed by one public cloud service providers (CSPs) and cloud broker (CB), provisioning cloud services to delay-sensitive cloud users (CUs). In the first monopoly cloud market, we treat the public CSP as an M/M/1 queueing system and study this CSP’s pricing effect on the

Gang Fang, Zhengce Cai, Xianwei Li

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 153–157

Article | 30-November-2019

Design and Research of Security System in University Laboratory

Ding Li, Shi Xuerong, Zhang Dujuan, Su Yulei

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 2, 39–46

Research Article | 01-September-2017


application has to quickly and successfully process license plates under different environmental conditions, such as indoors, outdoors, day or night time. It plays an important role in numerous real-life applications, such as automatic toll collection, traffic law enforcement, parking lot access control, and road traffic monitoring. The system uses different templates for identifying the characters from input image. After character recognition, an identified group of characters will be compared with

M.Anto Bennet, B. Thamilvalluvan, Priyanka Paree Alphonse, D.R. Thendralarasi, K. Sujithra

International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 330–343

No Record Found..
Page Actions