T
E
L
KO
M
N
I
KA
T
e
lec
om
m
u
n
icat
ion
,
Com
p
u
t
i
n
g,
E
lec
t
r
on
ics
an
d
Cont
r
ol
Vol.
18
,
No.
1
,
F
e
br
ua
r
y
2020
,
pp.
47
6
~
48
4
I
S
S
N:
1693
-
6930,
a
c
c
r
e
dit
e
d
F
ir
s
t
G
r
a
de
by
Ke
me
nr
is
tekdikti
,
De
c
r
e
e
No:
21/E
/KP
T
/2018
DO
I
:
10.
12928/
T
E
L
KO
M
NI
KA
.
v18i1.
13914
476
Jou
r
n
al
h
omepage
:
ht
tp:
//
jour
nal.
uad
.
ac
.
id/
index
.
php/T
E
L
K
OM
N
I
K
A
Op
t
imiz
ed
imag
e
p
r
oc
e
ssi
n
g
an
d
c
lu
st
e
r
in
g
t
o
mi
t
ig
at
e
se
c
u
r
ity t
h
r
e
at
s i
n
m
ob
il
e
ad
h
oc
n
e
t
w
or
k
I
b
r
ah
im
A.
Alam
e
r
i
1
,
Jawad
k
ad
h
im
m
u
t
ar
2
,
A
m
e
e
r
N.
On
a
izah
3
,
I
f
t
ik
h
ar
Ah
m
e
d
Koo
n
d
h
ar
4
1
J
ab
er
i
b
n
H
ay
y
an
Med
i
cal
U
n
i
v
er
s
i
t
y
,
Iraq
1
U
n
i
v
er
s
i
t
y
o
f
Par
d
u
b
i
ce,
F
acu
l
t
y
o
f
E
c
o
n
o
mi
c
s
an
d
A
d
mi
n
i
s
t
r
at
i
o
n
,
C
ze
ch
Rep
u
b
l
i
c
2
Co
l
l
eg
e
o
f
E
d
u
cat
i
o
n
fo
r
H
u
man
i
t
y
S
ci
en
ce
s
,
A
l
m
u
t
h
a
n
a
U
n
i
v
er
s
i
t
y
,
Iraq
3,
4
Sch
o
o
l
o
f
C
o
mp
u
t
er
S
ci
en
ce
a
n
d
T
e
c
h
n
o
l
o
g
y
,
Bei
j
i
n
g
In
s
t
i
t
u
t
e
o
f
T
ec
h
n
o
l
o
g
y
,
Ch
i
n
a
3
U
n
i
v
er
s
i
t
y
o
f
K
u
fa,
Iraq
Ar
t
icle
I
n
f
o
AB
S
T
RA
CT
A
r
ti
c
le
h
is
tor
y
:
R
e
c
e
ived
Aug
16
,
2019
R
e
vis
e
d
De
c
5
,
20
19
Ac
c
e
pted
De
c
25
,
20
19
Si
n
ce
t
h
ere
are
p
ro
v
i
s
i
o
n
s
o
f
man
y
at
t
r
i
b
u
t
e
s
t
h
a
t
are
n
o
t
p
o
s
s
i
b
l
e
o
r
d
i
ffi
c
u
l
t
t
o
fo
l
l
o
w
b
y
n
et
w
o
r
k
s
co
n
v
e
n
t
i
o
n
al
l
y
,
mo
b
i
l
e
ad
-
h
o
c
n
e
t
w
o
r
k
s
are
ex
t
e
n
s
i
v
e
l
y
d
ep
l
o
y
ed
.
T
h
i
s
ap
p
l
i
cat
i
o
n
s
t
ar
t
s
t
h
r
o
u
g
h
t
h
e
d
efen
s
e
s
ec
t
o
rs
,
t
h
e
s
e
n
s
o
ry
n
o
d
e
p
res
e
n
t
s
i
n
t
h
e
h
o
s
t
i
l
e
t
err
i
t
o
ri
e
s
d
o
w
n
t
o
t
h
e
g
ad
g
et
s
fo
r
co
n
g
e
s
t
i
o
n
co
mmu
n
i
ca
t
i
o
n
i
n
t
ra
ffi
c
b
y
g
e
n
era
l
t
ra
n
s
p
o
r
t
at
i
o
n
w
h
e
n
t
ra
v
el
l
i
n
g
fo
r
ad
eq
u
at
e
p
ro
v
i
s
i
o
n
o
f
i
n
fra
s
t
r
u
ct
u
re
d
u
ri
n
g
d
i
s
as
t
er
r
eco
v
er
y
.
A
s
a
l
o
t
o
f
i
mp
o
rt
a
n
ce
rel
at
e
d
t
o
(
m
o
b
i
l
e
ad
h
o
c
n
et
w
o
r
k
)
MA
N
E
T
ap
p
l
i
ca
t
i
o
n
,
o
n
e
i
mp
o
rt
a
n
t
fac
t
o
r
i
n
ad
-
h
o
c
n
et
w
o
r
k
s
i
s
s
ecu
r
i
t
y
.
U
s
i
n
g
i
mag
e
p
ro
ce
s
s
i
n
g
fo
r
s
ecu
r
i
n
g
MA
N
E
T
i
s
t
h
e
area
o
f
fo
c
u
s
o
f
t
h
i
s
re
s
earch
.
T
h
erefo
re,
i
n
t
h
i
s
art
i
cl
e,
t
h
e
s
ec
u
ri
t
y
t
h
rea
t
s
are
a
s
s
e
s
s
e
d
an
d
re
p
res
e
n
t
a
t
i
v
e
p
r
o
p
o
s
a
l
s
are
s
u
mmari
ze
d
in
ad
-
h
o
c
n
et
w
o
r
k
’s
c
o
n
t
ex
t
.
T
h
e
s
t
u
d
y
re
v
i
e
w
ed
t
h
e
cu
rren
t
s
i
t
u
a
t
i
o
n
o
f
t
h
e
art
f
o
r
o
r
i
g
i
n
a
l
t
o
s
ec
u
ri
t
y
p
ro
v
i
s
i
o
n
ca
l
l
e
d
mo
b
i
l
e
ad
h
o
c
n
et
w
o
r
k
fo
r
w
i
re
l
es
s
n
et
w
o
rk
i
n
g
.
T
h
e
t
h
rea
t
s
t
o
s
ecu
r
i
t
y
are
reco
g
n
i
zed
w
h
i
l
e
t
h
e
p
res
e
n
t
s
o
l
u
t
i
o
n
i
s
o
b
s
er
v
ed
.
T
h
e
s
t
u
d
y
a
d
d
i
t
i
o
n
al
l
y
s
u
mmar
i
z
ed
ed
u
c
at
i
o
n
eru
d
i
t
e,
t
al
k
s
o
n
g
en
era
l
i
s
s
u
es
a
n
d
f
u
t
u
re
i
n
s
t
ru
c
t
i
o
n
s
are
reco
g
n
i
zed
.
A
l
s
o
,
i
n
t
h
i
s
s
t
u
d
y
,
the
f
o
recas
t
w
ei
g
h
t
ed
c
l
u
s
t
er
i
n
g
al
g
o
r
i
t
h
m
(FW
CA
)
i
s
emp
l
o
y
ed
a
s
a
cl
u
s
t
er
h
ead
o
v
er
w
ei
g
h
t
ed
cl
u
s
t
eri
n
g
a
l
g
o
ri
t
h
m
(
W
CA
)
i
s
ex
am
i
n
e
d
as
q
u
a
l
i
t
y
i
n
cl
u
s
t
er
-
b
a
s
ed
ro
u
t
i
n
g
,
s
erv
i
ce
i
s
h
i
g
h
l
y
s
i
g
n
i
fi
can
t
w
i
t
h
MA
N
E
T
.
K
e
y
w
o
r
d
s
:
I
mage
a
na
lys
is
I
mage
p
r
oc
e
s
s
ing
M
AN
E
T
S
e
c
ur
it
y
W
e
ight
e
d
c
lus
ter
ing
a
lgor
it
hm
Th
i
s
i
s
a
n
o
p
en
a
c
ces
s
a
r
t
i
c
l
e
u
n
d
e
r
t
h
e
CC
B
Y
-
SA
l
i
ce
n
s
e
.
C
or
r
e
s
pon
din
g
A
u
th
or
:
I
br
a
him
A
.
Ala
mer
i
,
J
a
be
r
ibn
Ha
yya
n
M
e
dica
l
Unive
r
s
it
y
,
Na
jaf
,
I
r
a
q.
Unive
r
s
it
y
of
P
a
r
dubice
,
P
a
r
dubice
,
C
z
e
c
k
R
e
publi
c
.
Em
a
il
:
ib
.
a
lame
r
i@j
mu
.
e
du.
iq
,
ibr
a
him
.
a
lame
r
i@s
tudent.
upc
e
.
c
z
1.
I
NT
RODU
C
T
I
ON
T
he
T
he
a
ppli
c
a
ti
on
of
c
omput
e
r
a
lgo
r
it
hm
to
c
a
r
r
y
out
pr
oc
e
s
s
ing
of
im
a
ge
on
digi
tal
im
a
ge
s
is
c
a
ll
e
d
digi
tal
im
a
ge
pr
oc
e
s
s
ing
(
DI
P
)
[
1]
.
T
he
r
e
a
r
e
many
a
dva
ntage
s
r
e
late
d
to
DI
P
a
s
a
f
ield
o
f
d
igi
tal
dis
pe
ns
a
ti
on
or
s
ub
-
c
a
tegor
y
or
a
na
log
im
a
ge
pr
oc
e
s
s
ing
in
e
xc
e
s
s
.
An
e
f
f
e
c
ti
ve
de
a
l
is
pr
ovided
in
br
oa
de
r
a
lgor
it
h
m
r
a
nge
to
be
pr
a
c
ti
c
e
d
to
e
nter
da
ta
with
e
a
s
y
pr
e
ve
nti
on
o
f
“
e
vil
s
”
li
ke
:
s
ignal
dis
tor
ti
on
a
nd
buil
d
-
up
nois
e
.
DI
P
may
be
de
ve
loped
in
the
f
o
r
m
of
mul
ti
-
dim
e
ns
ional
s
ys
tem
s
ince
de
f
ini
ti
ons
of
i
mage
s
a
r
e
ove
r
two
-
dim
e
ns
ions
or
mor
e
.
I
mage
s
a
r
e
c
las
s
if
ied
ba
s
e
d
on
thei
r
s
our
c
e
s
uc
h
a
s
x
-
r
a
y
a
nd
vis
ua
l.
T
he
e
lec
tr
omagne
ti
c
e
n
e
r
gy
r
a
nge
is
the
p
r
incipa
l
s
our
c
e
of
e
ne
r
gy
f
o
r
im
a
ge
s
;
whi
le
other
s
our
c
e
s
of
e
ne
r
gy
a
r
e
:
e
lec
tr
onic;
ult
r
a
s
o
nic
a
nd
a
c
ous
ti
c
.
T
he
digi
tal
im
a
ge
is
mappe
d
a
nd
s
a
mpl
e
d
a
s
a
pictur
e
e
leme
nts
or
pixels
or
a
g
r
id
of
dot
s
.
T
hos
e
digi
tal
im
a
ge
s
a
r
e
e
lec
tr
onica
ll
y
take
n
s
na
ps
hot
s
f
r
om
s
c
e
ne
or
s
c
a
nne
d
doc
uments
li
ke
manu
s
c
r
ipt
s
,
pr
int
e
d
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
Optimiz
ati
on
image
pr
oc
e
s
s
ing
and
c
lus
ter
ing
to
miti
gate
the
s
e
c
ur
it
y
thr
e
ats
in
...
(
I
br
ahim
A
.
A
lam
e
r
i)
477
wor
ks
,
photog
r
a
phs
a
nd
a
r
twor
ks
.
W
hil
e
the
c
om
puter
ge
ne
r
a
tes
the
vis
ua
li
z
a
ti
on,
the
s
ynthetic
im
a
ge
s
a
r
e
us
e
d
f
or
modelli
ng
[
2]
.
A
tot
a
l
va
lue
s
uc
h
a
s
white
,
blac
k
,
s
ha
de
s
of
c
olour
or
gr
e
y
that
a
r
e
a
s
s
igned
to
e
a
c
h
pixel
is
r
e
pr
e
s
e
nted
in
binar
y
c
ode
s
a
s
one
s
a
nd
z
e
r
os
.
A
c
o
mput
e
r
is
us
e
d
to
s
tor
e
the
bit
s
or
binar
y
digi
t
f
or
e
a
c
h
pixel
in
a
s
e
que
nc
e
a
nd
it
is
us
ua
ll
y
c
a
ll
e
d
“
c
ompr
e
s
s
e
d”
a
s
it
is
be
ing
r
e
pr
e
s
e
nted
mathe
matica
ll
y.
T
he
c
omput
e
r
r
e
a
d
a
nd
then
int
e
r
p
r
e
ted
the
bi
ts
to
ge
ne
r
a
te
a
n
a
c
c
ount
of
a
na
log
to
dis
play
[
3
]
.
T
he
ba
s
ic
s
tep
s
dur
ing
the
pr
oc
e
s
s
ing
of
digi
tal
im
a
ge
a
r
e
:
im
a
ge
a
c
quis
i
ti
on,
im
a
ge
e
nha
nc
e
ment,
im
a
ge
r
e
s
tor
a
ti
on,
c
olo
ur
im
a
ge
pr
oc
e
s
s
ing,
pr
oc
e
s
s
ing
of
mul
ti
-
r
e
s
olut
ion
a
nd
wa
ve
lets
,
s
e
gmenta
ti
on,
de
s
c
r
ipt
ion,
r
e
c
ognit
i
on
a
nd
r
e
pr
e
s
e
ntation
of
objec
t
a
nd
mor
pho
logi
c
a
l
pr
oc
e
s
s
ing.
Ana
lys
is
a
nd
pr
oc
e
s
s
ing
of
digi
tal
im
a
ge
a
r
e
a
ppli
e
d
in
indus
tr
ial
a
nd
e
duc
a
ti
ona
l
a
ppli
c
a
ti
on
a
nd
in
a
wid
e
r
a
nge
of
a
r
ti
s
ti
c
[
4
]
.
P
r
oc
e
s
s
ing
a
nd
a
na
lys
is
of
s
of
t
im
a
ge
is
ge
ne
r
a
ll
y
p
r
e
s
e
nted
in
a
ll
main
p
latf
or
ms
o
f
c
omput
e
r
s
.
E
nvir
onmenta
l
s
c
ienc
e
,
a
r
t,
medic
ine
a
nd
biot
e
c
hnology
a
ll
us
e
im
a
ge
pr
oc
e
s
s
ing.
T
he
r
e
f
or
e
,
thi
s
s
tudy
p
r
opos
e
d
a
nove
l
method
thr
ough
whic
h
s
e
c
ur
it
y
c
a
n
be
pr
ovided
in
a
ll
pha
s
e
s
.
A
tr
us
t
ba
s
e
d
mu
lt
ipath
r
outi
ng
pr
otocol
is
us
e
d
in
or
de
r
to
e
nha
nc
e
s
e
c
ur
it
y
in
the
r
outi
ng
pha
s
e
.
As
i
ntr
ude
r
s
c
a
n
moni
tor
a
nd
int
e
r
c
e
pt
the
pa
s
s
wor
d,
thus
,
the
a
uthentica
ti
on
ke
y
tr
a
ns
f
e
r
in
M
AN
E
T
ne
twor
ks
via
n
a
mele
s
s
mi
dwa
y
node
s
is
not
s
uit
a
ble
to
be
us
e
d.
I
t
is
im
pe
r
a
ti
ve
to
us
e
a
s
tr
ong
s
e
c
ur
e
method
o
f
ke
y
tr
a
ns
f
e
r
that
hides
da
ta
of
ve
r
if
ica
ti
on
ke
ys
.
T
he
r
e
f
or
e
,
in
thi
s
a
r
ti
c
le,
the
thr
e
a
ts
to
s
e
c
ur
it
y
a
s
s
e
s
s
a
r
e
a
s
s
e
s
s
e
d
a
nd
r
e
pr
e
s
e
ntative
pr
opos
a
ls
a
r
e
s
umm
a
r
ize
d
in
ad
-
ho
c
ne
twor
k’
s
c
ontext.
T
he
s
tudy
r
e
view
e
d
the
c
ur
r
e
nt
s
it
ua
ti
on
of
the
a
r
t
f
o
r
o
r
igi
na
l
to
s
e
c
ur
it
y
pr
ov
is
ion
c
a
ll
e
d
mobi
le
a
d
hoc
ne
twor
k
f
o
r
wir
e
les
s
ne
twor
king
.
2.
L
I
T
E
RA
T
UR
E
RE
VI
E
W
2.
1.
I
m
age
p
r
oc
e
s
s
in
g
I
n
a
br
oa
de
s
t
ter
m
,
a
n
im
a
ge
p
r
oc
e
s
s
ing
is
a
n
umbr
e
ll
a
ter
m
us
e
d
f
or
a
na
lys
ing
a
nd
r
e
pr
e
s
e
nti
ng
da
ta
in
vis
ua
l
f
or
m
[
5]
.
I
t
is
r
e
ga
r
de
d
a
s
the
manipulatio
n
of
numer
ic
da
ta
p
r
e
s
e
nt
in
a
digi
tal
im
a
ge
in
a
n
a
t
tempt
to
e
nha
nc
e
it
s
vis
ua
l
a
pp
e
a
r
a
nc
e
.
S
a
telli
te
photogr
a
phs
c
a
n
be
c
a
li
br
a
ted,
medic
a
l
im
a
ge
s
c
a
n
b
e
c
lar
if
ied
a
nd
f
a
de
d
pictur
e
s
c
a
n
be
e
nha
nc
e
d
th
r
ough
im
a
ge
pr
oc
e
s
s
ing.
Nume
r
ic
in
f
or
mation
c
a
n
a
ls
o
be
t
r
a
ns
late
d
int
o
vis
ua
l
im
a
ge
s
by
im
a
ge
pr
oc
e
s
s
ing
that
c
a
n
be
e
dit
e
d,
a
nim
a
ted,
f
il
ter
e
d
a
nd
e
nha
nc
e
d
in
or
de
r
to
s
how
the
a
s
s
oc
iation
pr
e
vious
ly
not
a
ppa
r
e
nt
[
6]
.
Ana
lys
is
of
im
a
ge
invol
ve
s
c
oll
e
c
ti
on
of
da
ta
f
r
om
digi
tal
im
a
ge
s
in
f
o
r
m
of
mea
s
ur
e
ments
that
c
a
n
be
tr
a
ns
f
o
r
med
a
nd
a
na
lys
e
d.
An
a
c
c
ur
a
te
digi
tal
s
ubs
ti
tut
e
f
o
r
c
a
ll
iper
s
a
nd
r
uler
s
is
pr
o
vided
by
the
im
a
ge
a
na
lys
is
.
I
mage
s
a
r
e
c
las
s
if
ied
in
a
c
c
or
da
nc
e
with
their
s
our
c
e
e
.
g
.
X
-
r
a
y,
vis
ua
l
a
nd
s
o
on.
T
he
e
lec
tr
omagne
ti
c
e
ne
r
gy
s
pe
c
tr
um
is
the
pr
incipa
l
e
ne
r
gy
s
our
c
e
f
or
i
mage
s
.
T
he
ul
tr
a
s
onic,
e
lec
tr
onic
a
nd
the
a
c
ous
ti
c
a
r
e
other
s
our
c
e
s
o
f
e
ne
r
gy.
W
hil
e
the
vis
ua
li
z
a
ti
on
is
ge
ne
r
a
ted
by
the
c
omput
e
r
,
the
s
ynthetic
im
a
ge
s
a
r
e
us
e
d
f
or
modelli
ng.
Digit
a
l
im
a
ge
s
a
r
e
e
lec
tr
onic
s
na
ps
hots
take
n
f
r
om
a
s
c
a
nne
d
or
s
c
e
ne
of
doc
uments
s
uc
h
a
s
a
r
twor
k,
pr
int
e
d
text
,
manus
c
r
ipt
s
a
nd
photog
r
a
phs
[
7]
.
T
he
d
igi
tal
im
a
ge
is
mappe
d
a
nd
s
a
mpl
e
d
a
s
a
gr
id
of
pixels
,
pictur
e
e
leme
nts
a
nd
dots
.
A
tonal
va
lue
is
a
tt
a
c
he
d
to
e
a
c
h
pixel
i.
e
.
white,
blac
k,
s
ha
de
s
of
gr
e
y
or
c
olor
whic
h
is
r
e
pr
e
s
e
nted
in
bina
r
y
c
ode
a
s
z
e
r
os
a
nd
one
s
.
T
he
binar
y
digi
ts
or
bi
ts
f
o
r
e
a
c
h
pixel
a
r
e
s
tor
e
d
in
a
s
e
que
nc
e
by
a
c
omput
e
r
a
nd
of
ten
mi
nim
ize
d
t
o
a
mathe
matica
l
r
e
pr
e
s
e
ntation
c
a
ll
e
d
c
ompr
e
s
s
e
d.
T
he
bit
s
a
r
e
then
r
e
a
d
a
nd
int
e
r
pr
e
ted
by
the
c
omput
e
r
to
p
r
oduc
e
a
n
a
na
log
ve
r
s
ion
f
o
r
dis
play
or
pr
int
ing
.
I
n
digi
tal
im
a
ge
pr
oc
e
s
s
i
ng,
the
f
unda
menta
l
s
teps
include
[
8
]
:
−
Ac
quis
it
ion
of
im
a
ge
−
E
nha
nc
e
ment
of
im
a
ge
−
R
e
s
tor
a
ti
on
of
im
a
ge
−
P
r
oc
e
s
s
ing
of
c
olour
im
a
ge
−
W
a
ve
lets
a
nd
mul
ti
-
r
e
s
olut
ion
pr
oc
e
s
s
ing
−
C
ompr
e
s
s
ion
−
M
or
phologi
c
a
l
pr
oc
e
s
s
ing
−
S
e
gmenta
ti
on
−
De
s
c
r
ipt
ion
a
nd
r
e
pr
e
s
e
ntation
2.
2.
M
ob
il
e
Ad
-
Hoc
n
e
t
wor
k
s
C
loud
s
e
r
vice
s
c
a
n
be
a
c
c
e
s
s
e
d
e
it
he
r
by
wir
e
d
ne
twor
k
or
wir
e
les
s
[
9
,
10]
howe
ve
r
M
AN
E
T
is
a
wir
e
les
s
ne
twor
k
whe
r
e
e
ve
r
y
de
vice
c
omm
unica
te
w
ir
e
les
s
ly
[
11
,
12]
.
A
mobi
le
a
d
-
hoc
ne
twor
k
(
M
AN
E
T
)
is
of
ten
d
is
ti
nguis
he
d
a
s
ne
twor
ks
with
many
f
r
e
e
a
nd
indepe
nde
nt
node
s
,
with
mobi
le
de
vice
c
ompos
i
ti
on
a
nd
other
r
e
late
d
piec
e
s
of
mobi
le,
whic
h
plac
e
thems
e
lves
in
dif
f
e
r
e
nt
c
a
tegor
ies
of
s
e
tups
a
nd
the
c
a
pa
c
it
y
of
type
of
ne
twor
k,
is
s
ti
ll
unde
r
r
e
s
e
a
r
c
h.
M
AN
E
T
is
be
c
o
mi
ng
popular
mor
e
due
to
it
s
e
a
s
e
of
de
ploym
e
nt,
f
l
e
xibi
li
ty
a
nd
low
c
os
t.
M
e
a
nwhile
to
the
ne
twor
k
mus
t
f
oll
ow
a
pr
otocol
of
s
ophis
ti
c
a
ted
r
outi
ng
in
or
de
r
to
a
c
hieve
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
S
N
:
1693
-
6930
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
,
Vol.
18
,
No
.
1
,
F
e
br
ua
r
y
2020
:
47
6
-
48
4
478
thes
e
be
ne
f
it
s
.
T
he
pr
o
tocols
that
we
r
e
e
a
r
ly
pr
o
pos
e
d
a
r
e
not
de
s
igned
to
ope
r
a
te
whe
n
the
a
tt
a
c
ke
r
s
a
r
e
pr
e
s
e
nt.
T
hus
,
thi
s
led
to
s
ome
major
c
ha
ll
e
nge
s
in
M
AN
E
T
s
a
s
e
xplaine
d
in
the
T
a
ble
1
[
13
-
20
]
.
T
a
ble
1
.
L
a
r
ge
-
s
c
a
le
of
c
ha
ll
e
nge
s
in
M
AN
E
T
s
C
ha
ll
e
nge
s
C
la
r
if
ic
a
ti
on
1
I
nde
pe
nde
nc
e
I
n
ma
na
gi
ng
di
f
f
e
r
e
nt
a
c
ti
ons
of
node
s
of
mob
il
e
,
th
e
r
e
is
no
c
e
nt
r
a
li
z
e
d
ma
na
ge
me
nt
e
nt
it
y a
va
il
a
bl
e
2
D
yna
mi
c
t
opol
ogy
I
n a
r
a
ndom m
a
nne
r
, node
s
c
a
n be
c
onne
c
te
d
a
nd mobi
le
dyna
mi
c
a
ll
y. T
he
c
onn
e
c
ti
on
of
th
e
ne
twor
ks
is
in
v
a
r
ia
ti
on
ti
me
ly
a
nd
is
in
pr
oxi
mi
ti
e
s
to
e
a
c
h
ot
he
r
in
a
ddi
ti
ona
l
node
s
a
c
c
or
di
ngl
y.
3
D
e
vi
c
e
D
e
te
c
ti
on
I
de
nt
if
ic
a
ti
on
of
node
r
e
le
va
nc
ie
s
in
te
r
ms
of
move
s
a
nd
gi
vi
ng
i
nf
or
ma
ti
on
on
th
e
ne
e
d
f
or
e
xi
s
te
nc
e
of
dyna
mi
c
upda
te
l
e
s
s
e
n
th
e
di
f
f
ic
ul
ti
e
s
in
a
ut
oma
ti
c
s
e
le
c
ti
on
of
opt
im
a
l
r
out
e
.
4
B
a
ndw
id
th
opt
im
iz
a
ti
on
I
n
te
r
ms
of
c
a
pa
c
it
y, t
he
w
ir
e
d l
in
ks
a
r
e
gr
e
a
te
r
t
ha
n t
he
w
ir
e
le
s
s
l
in
ks
.
5
S
e
c
ur
it
y
S
us
c
e
pt
ib
il
it
y
of
th
e
mobi
le
li
nk
to
bot
h
in
te
r
na
l
a
nd
e
xt
e
r
na
l
in
tr
us
io
n
a
s
r
e
nde
r
o
f
mobi
li
ty
of
node
. A
bi
g c
h
a
ll
e
nge
i
n
M
A
N
E
T
c
a
n
be
a
ny
node
t
ha
t
c
a
n
e
nt
e
r
a
nd l
e
a
ve
f
r
e
e
ly
t
he
ne
twor
k a
nd give
s
e
c
ur
it
y c
omm
uni
c
a
ti
on.
6
T
opol
ogy M
a
in
te
na
n
c
e
O
ne
of
th
e
ma
jo
r
th
r
e
a
ts
a
mong
th
e
M
A
N
E
T
’
s
node
s
is
th
e
i
nf
or
ma
ti
on
upda
te
s
of
dyna
mi
c
l
in
ks
.
7
N
e
twor
k C
onf
ig
ur
a
ti
on
T
he
f
a
c
t
th
a
t
th
e
r
e
is
dyn
a
mi
s
m
in
th
e
in
f
r
a
s
tr
uc
tu
r
e
of
M
A
N
E
T
is
th
e
mot
iv
e
be
hi
nd
th
e
c
onne
c
ti
on a
nd dis
c
onn
e
c
ti
on of
t
he
va
r
ia
bl
e
l
in
ks
.
8
L
im
it
e
d R
e
s
our
c
e
s
A
s
pow
e
r
a
nd
s
to
r
a
ge
c
a
pa
c
it
y
a
r
e
s
tr
ic
tl
y
pa
r
ti
a
l,
mobi
le
node
s
ha
s
a
r
e
li
a
nc
e
on
ba
tt
e
r
y
pow
e
r
–
a
ve
r
y s
c
a
r
c
e
r
e
s
our
c
e
.
9
S
c
a
la
bi
l
ity
T
hi
s
is
w
he
th
e
r
th
e
ne
twor
k
is
a
bl
e
to
ma
ke
a
pr
ovi
s
io
n
in
th
e
pr
e
s
e
nc
e
of
la
r
ge
numbe
r
s
of
node
s
on a
n a
c
c
e
pt
a
bl
e
l
e
ve
l
of
s
e
r
vi
c
e
.
10
L
im
it
a
ti
on i
n phys
ic
a
l
s
e
c
ur
it
y
M
obi
li
ty
me
a
ns
hi
gh
r
is
k
in
s
e
c
ur
it
y
s
uc
h
a
s
s
ha
r
e
d
a
c
c
e
s
s
ib
le
w
ir
e
le
s
s
me
di
um
or
pe
e
r
to
pe
e
r
ne
twor
k
a
gr
ic
ul
tu
r
e
to
bot
h
ma
li
c
io
us
a
tt
a
c
k
e
r
s
a
nd
le
gi
ti
ma
te
ne
twor
k
us
e
r
s
.
T
he
r
e
s
houl
d be
c
ons
id
e
r
a
ti
on f
or
s
poof
in
g, s
e
r
vi
c
e
a
tt
a
c
k d
e
ni
a
l
a
nd e
a
ve
s
dr
oppi
ng
11
I
nf
r
a
s
tr
uc
tu
r
e
-
le
s
s
a
nd
s
e
lf
-
ope
r
a
ti
on
M
a
ne
t
i
s
r
e
qui
r
e
d
by
s
e
lf
-
h
e
a
li
ng
f
unc
ti
on
in
or
de
r
to
in
te
gr
a
te
i
nt
o
bl
a
nke
t
of
movi
ng
node
s
out
of
r
a
nge
.
12
P
oor
T
r
a
ns
mi
s
s
io
n of
Q
ua
li
ty
T
hi
s
is
a
w
ir
e
le
s
s
c
omm
uni
c
a
ti
on
r
e
la
te
d
pr
obl
e
m
a
s
a
r
e
s
ul
t
o
f
ma
ny
in
he
r
e
nt
s
our
c
e
of
e
r
r
or
t
ha
t
le
a
d t
o de
gr
a
da
ti
on of
r
e
c
e
iv
e
d s
ig
na
l
13
A
d H
oc
A
ddr
e
s
s
in
g
P
r
obl
e
ms
r
e
la
te
d t
o i
mpl
e
me
nt
a
ti
on of
s
ta
nda
r
d a
ddr
e
s
s
in
g s
c
he
me
As
s
ur
a
nc
e
of
M
AN
E
T
ne
twor
ks
is
the
major
c
ha
ll
e
nge
due
to
it
s
s
us
c
e
pti
bil
it
y
to
a
tt
a
c
ks
in
a
mobi
le
li
nk
while
the
mobi
li
ty
of
the
node
s
r
e
nde
r
s
the
ne
twor
k
to
pos
s
e
s
s
ing
a
highl
y
dyna
mi
c
topol
ogy.
E
xter
na
l
a
nd
int
e
r
na
l
a
r
e
the
two
c
a
tegor
ies
of
a
tt
a
c
ks
a
ga
ins
t
r
outi
ng
pr
o
tocols
.
T
he
int
e
r
na
l
a
tt
a
c
k
is
a
r
e
s
ult
of
a
mi
s
c
onf
igur
e
d,
malicious
r
outer
,
f
a
ult
y
a
nd
c
om
pr
omi
s
e
d
ins
ide
a
ne
twor
k
domain.
A
tempor
a
r
y
n
e
twor
k
is
f
or
med
by
a
c
oll
e
c
ti
on
o
f
wir
e
les
s
mobi
le
hos
ts
wh
ich
f
or
ms
f
inally
the
ne
twor
k
in
a
d
-
hoc
without
the
ne
e
d
to
include
a
s
tand
a
lone
in
f
r
a
s
tr
uc
tur
e
or
c
e
ntr
a
li
z
e
d
a
dmi
nis
tr
a
ti
on
[
6]
.
S
e
l
f
o
r
ga
niza
ti
on
a
nd
s
e
lf
-
c
onf
igur
ing
a
r
e
the
c
h
a
r
a
c
ter
is
ti
c
s
of
the
mo
bil
e
mul
ti
-
hop
a
d
-
hoc
ne
twor
k
whe
r
e
ne
twor
k
s
tr
uc
tur
e
is
s
ubjec
ted
to
dyna
mi
c
c
ha
nge
s
a
s
a
r
e
s
ult
of
node
mobi
li
ty.
I
n
thes
e
node
s
,
c
ha
nne
ls
of
r
a
ndom
a
c
c
e
s
s
a
r
e
u
ti
li
z
e
d
by
the
node
s
a
nd
thus
be
incor
por
a
ted
to
pa
r
ti
c
ipate
f
r
iendly
in
the
mul
ti
-
hop
f
or
wa
r
d
ing.
W
or
king
a
s
hos
ts
a
nd
r
outer
s
is
wha
t
node
s
of
the
ne
twor
k
do
a
nd
thus
t
r
a
ns
mi
tt
ing
da
ta
to
o
r
f
r
om
othe
r
nod
e
s
in
the
ne
twor
k
.
F
or
wa
r
d
ing
the
pa
c
ke
ts
in
a
n
a
p
pr
opr
iate
wa
y
be
twe
e
n
the
de
s
ti
na
ti
on
a
nd
f
r
om
the
s
our
c
e
of
mobi
le
ad
-
hoc
ne
twor
k
r
e
quir
e
s
loca
ti
ng
a
pa
th
by
a
r
outi
ne
pr
oc
e
dur
e
whe
n
inf
r
a
s
tr
uc
tur
e
s
uppor
t
i
s
mi
s
s
ing
a
s
s
e
e
n
in
the
c
a
s
e
of
wir
e
les
s
ne
twor
k
or
whe
n
de
s
ti
na
ti
on
mode
is
out
of
the
r
a
nge
o
f
a
s
our
c
e
node
t
r
a
ns
mi
tt
ing
pa
c
ke
t.
T
he
node
s
in
thes
e
ne
twor
ks
us
e
wir
e
les
s
c
ha
nne
l
of
r
a
ndom
a
c
c
e
s
s
,
manif
e
s
ti
ng
it
in
a
good
manne
r
to
put
thems
e
lves
in
m
u
lt
i
hop
f
or
wa
r
ding
a
s
s
hown
in
F
igur
e
1
.
T
he
node
s
o
f
ne
t
wor
ks
c
a
n
be
the
hos
ts
a
nd
the
r
outer
s
da
ta
to
o
r
f
r
om
other
node
s
in
ne
twor
k.
B
a
s
e
s
tation
c
a
n
r
e
a
c
h
a
l
l
the
mobi
le
node
s
withi
n
a
c
e
ll
with
no
r
outi
ng
us
ing
br
oa
dc
a
s
t
in
a
c
omm
on
wir
e
les
s
ne
twor
k.
T
a
king
a
d
hoc
ne
twor
ks
a
s
e
xa
mpl
e
,
da
ta
c
a
n
be
f
or
wa
r
de
d
by
e
a
c
h
node
t
o
other
s
.
B
y
the
wa
y,
mor
e
c
ha
ll
e
nge
s
will
be
f
a
c
e
d
r
e
ga
r
ding
dyna
mi
c
s
topol
ogy
whic
h
is
known
a
s
unpr
e
dicta
ble
c
ha
nge
s
in
c
onne
c
ti
vit
y.
I
n
the
c
u
r
r
e
nt
wor
k
a
no
ve
l
method
ha
ve
be
e
n
a
ppli
e
d
to
a
c
hieve
s
e
c
ur
it
y
in
both
pha
s
e
s
.
F
ir
s
t
to
e
nha
nc
e
s
e
c
ur
it
y
in
the
r
outi
ng
pha
s
e
by
us
e
a
tr
us
t
ba
s
e
d
mul
ti
pa
th
r
outi
ngs
.
S
e
c
ondly,
dis
c
ove
r
a
s
e
c
ur
e
d
tr
us
twor
thy
pa
th
f
r
o
m
a
s
our
c
e
to
a
de
s
ti
na
ti
on
with
mi
n
im
a
l
ove
r
he
a
d.
I
n
pr
e
vious
s
tudi
e
s
M
ult
ipl
e
node
dis
joi
nt
pa
ths
a
r
e
dis
c
ove
r
e
d
to
e
nha
nc
e
the
s
e
c
ur
it
y
o
f
the
da
ta
de
li
ve
r
y
pha
s
e
.
F
u
r
ther
mor
e
,
mi
s
be
ha
ving
node
s
a
r
e
de
tec
ted
a
nd
e
xe
mpt
e
d
f
r
om
s
uc
h
pa
th
s
u
s
ing
the
tr
us
t
va
lue
of
the
node
s
I
t’
s
we
ll
known
that
S
e
nding
c
onf
idential
da
ta
on
one
pa
th
he
lps
a
tt
a
c
ke
r
s
to
ge
t
t
he
whole
da
ta
e
a
s
il
y,
whe
r
e
a
s
s
e
nding
it
in
pa
r
ts
on
dif
f
e
r
e
nt
dis
joi
nted
pa
ths
incr
e
a
s
e
s
the
c
onf
identialit
y
r
obus
tnes
s
,
a
s
it
is
a
lm
os
t
im
pos
s
ibl
e
to
ob
tain
a
ll
the
pa
r
ts
of
a
mes
s
a
ge
f
r
a
gmente
d
a
nd
s
e
nt
on
mul
ti
ple
pa
ths
e
xis
ti
ng
be
twe
e
n
the
s
our
c
e
a
nd
the
de
s
ti
na
ti
on.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
Optimiz
ati
on
image
pr
oc
e
s
s
ing
and
c
lus
ter
ing
to
miti
gate
the
s
e
c
ur
it
y
thr
e
ats
in
...
(
I
br
ahim
A
.
A
lam
e
r
i)
479
F
igur
e
1.
Ne
twor
k
of
a
ge
ne
r
a
l
a
d
-
hoc
in
-
a
c
ti
on
c
ondit
ion
2.
3.
S
ys
t
e
m
in
e
xis
t
e
n
c
e
M
AN
E
T
ha
s
be
e
n
made
a
popular
topi
c
of
r
e
s
e
a
r
c
h
with
the
gr
owth
o
f
laptop
s
ys
tem
a
nd
W
i
-
F
i
ne
twor
king
s
ince
the
mi
d
-
1990s
.
E
va
luations
of
di
f
f
e
r
e
nt
s
e
c
ur
it
y
mea
s
ur
e
s
a
r
e
done
by
major
it
y
o
f
a
c
a
de
mi
c
pa
pe
r
s
f
or
pr
ov
idi
ng
s
e
c
ur
it
y
a
ga
ins
t
thr
e
a
t
t
o
M
AN
E
T
;
mo
s
t
pr
otocols
a
r
e
de
s
igned
to
pr
ovide
s
e
c
ur
it
y
[
2
1
,
22
]
.
T
he
i
r
c
a
pa
bil
it
ies
a
r
e
us
ua
ll
y
c
onne
c
ted
with
a
ll
node
s
withi
n
a
f
e
w
hops
of
on
e
a
nother
a
s
s
umi
ng
ther
e
a
r
e
va
r
ying
de
gr
e
e
s
of
mobi
li
ty
w
it
hin
bounde
d
s
pa
c
e
.
T
he
n,
the
r
e
is
e
va
luation
of
dif
f
e
r
e
nt
pr
otocols
a
c
c
or
ding
to
the
mea
s
ur
e
s
uc
h
a
s
the
poc
ke
t
dr
op
a
te,
the
e
nd
-
to
-
e
nd
de
lays
,
the
ove
r
he
a
d
in
tr
oduc
e
d
by
r
outi
ng
pr
o
tocol
a
nd
ne
twor
k
thr
oughput
[
2
3
-
24
]
.
I
n
or
de
r
to
make
pa
s
s
wor
d
memor
a
ble
a
nd
mor
e
s
e
c
ur
e
,
gr
a
phica
l
pa
s
s
wor
ds
a
r
e
int
r
oduc
e
d.
B
y
us
ing
gr
a
phica
l
pa
s
s
wor
d,
r
a
ther
than
typi
ng
a
lphanume
r
ic
c
ha
r
a
c
ter
s
,
the
us
e
r
s
c
li
c
k
on
the
im
a
ge
s
.
T
he
P
a
s
s
P
oint
s
a
r
e
ne
w
g
r
a
phica
l
pa
s
s
wor
d
s
ys
tem
a
nd
mor
e
s
e
c
ur
e
[
2
5
].
B
y
digi
tal
wa
ter
mar
k
,
a
uthenti
c
a
ti
on
of
i
m
a
ge
c
a
n
be
done
[
26
]
.
A
wa
ter
mar
k
c
a
n
be
us
e
d
a
s
a
s
e
c
r
e
t
i
mage
or
c
ode
e
nc
ode
d
int
o
a
n
o
r
igi
na
l
i
mage
that
it
s
f
unc
ti
on
is
to
identi
f
y
both
c
ontent
a
nd
im
a
ge
ow
ne
r
.
One
of
the
f
or
ms
of
im
a
ge
a
uthentica
ti
on
is
the
pe
r
pe
tually
us
e
of
invi
s
ibl
e
wa
ter
mar
ks
.
T
he
a
lgor
it
hm
of
wa
t
e
r
mar
k
is
divi
de
d
int
o
th
r
e
e
c
a
tegor
ies
:
mar
king
a
lgor
it
hm
;
ve
r
i
f
ica
ti
on
a
lgor
it
hm;
a
nd
wa
ter
mar
k.
T
he
s
e
c
ur
it
y
o
f
the
s
ys
tem
is
im
pr
ove
d
by
the
a
pp
r
oa
c
h
of
Dé
jà
vu
that
de
pe
nds
not
on
r
e
c
a
ll
-
ba
s
e
d
a
uthentica
ti
on
but
on
r
e
c
ognit
ion
-
ba
s
e
d.
T
hr
ough
t
he
a
bil
i
ty
to
r
e
c
ognize
pr
e
vious
ly
s
e
e
n
im
a
ge
s
,
the
Dé
jà
vu
a
uthentica
tes
a
u
s
e
r
[
2
]
.
Us
ing
im
a
ge
pr
oc
e
s
s
ing
a
nd
vis
ua
l
c
r
yptogr
a
phy
in
S
e
c
ur
e
Authe
nti
c
a
ti
on
is
a
n
a
lgor
it
hm
ba
s
e
d
on
im
a
ge
p
r
oc
e
s
s
ing
a
nd
vis
ua
l
c
r
yptogr
a
phy.
T
his
a
ppli
e
s
a
wa
y
of
c
us
tom
e
r
s
ignatur
e
pr
oc
e
s
s
ing
a
nd
incor
por
a
ti
ng
it
int
o
s
ha
r
e
s
s
ubs
e
q
ue
ntl
y.
T
he
ba
nk
c
hos
e
a
s
c
he
me
that
de
ter
m
ines
the
tot
a
l
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
S
N
:
1693
-
6930
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
,
Vol.
18
,
No
.
1
,
F
e
br
ua
r
y
2020
:
47
6
-
48
4
480
number
of
s
ha
r
e
s
to
be
pr
oduc
e
d.
T
hus
,
du
r
ing
the
c
r
e
a
ti
on
of
two
s
ha
r
e
s
,
while
one
is
ke
pt
by
the
c
us
tom
e
r
,
the
other
is
s
tor
e
d
in
the
ba
nk
o
f
da
taba
s
e
.
Du
r
ing
a
ll
the
de
a
ls
o
f
the
c
us
tom
e
r
,
the
s
ha
r
e
is
pr
e
s
e
nted.
T
o
ge
t
the
or
igi
na
l
s
ignatur
e
,
the
f
i
r
s
t
s
ha
r
e
is
s
tac
ke
d
b
y
thi
s
s
ha
r
e
.
T
he
r
e
f
or
e
,
de
c
is
ion
is
take
n
us
ing
c
or
r
e
lation
method
whe
ther
r
e
jec
ti
on
or
a
c
c
e
ptanc
e
of
the
c
us
tom
e
r
a
nd
output
a
uthentica
ti
on.
3.
T
HE
P
ROP
OS
E
D
S
YST
E
M
:
S
E
CU
RI
T
Y
USI
NG
I
M
AGE
P
ROCE
S
S
I
NG
F
OR
M
AN
E
T
I
n
Anytim
e
ther
e
is
e
ntr
a
nc
e
f
or
a
us
e
r
int
o
the
mo
bil
e
a
d
-
hoc
ne
twor
k
in
the
ne
a
r
e
s
t
f
utur
e
,
a
n
im
a
ge
take
n
f
r
om
a
us
e
r
is
d
ivi
de
d
int
o
two:
the
gr
e
y
im
a
ge
of
the
or
igi
na
l
im
a
ge
of
the
us
e
r
will
be
the
f
ir
s
t
one
a
nd
the
f
il
e
with
im
a
ge
’
s
c
olou
r
p
ixel
va
lue
is
th
e
other
one
.
T
he
pa
r
t
of
the
ke
y
s
ha
ll
c
ompr
is
e
both
the
im
a
ge
a
nd
the
f
il
e
.
T
he
r
e
is
e
nc
r
ypti
on
o
f
the
f
i
le
a
nd
gr
e
y
im
a
ge
with
the
a
id
o
f
two
ke
ys
of
va
r
io
us
types
.
T
he
s
malles
t
s
ize
of
the
ke
y
in
a
mount
will
ha
ve
12
8
bit
s
.
T
he
n,
the
e
nc
r
ypted
f
i
les
will
be
joi
ne
d
a
nd
s
e
pa
r
a
ted
int
o
s
maller
pa
c
ke
ts
while
with
the
a
id
f
r
om
a
nother
ke
y,
e
a
c
h
pa
c
ke
t
will
be
e
nc
r
yp
ted.
B
e
f
or
e
the
im
a
ge
pr
oc
e
s
s
ing,
the
r
e
a
r
e
two
laye
r
s
o
f
s
e
c
ur
i
ty
f
r
o
m
thi
s
wa
y.
E
a
c
h
pa
c
ke
t
pa
s
s
e
s
via
the
ne
two
r
k.
A
f
ter
r
e
c
e
ivi
ng
pa
c
ke
t
a
t
the
s
ide
of
ha
nds
e
t
with
the
s
uppor
t
of
f
ir
s
t
pr
ivate
,
ther
e
will
be
s
e
pa
r
a
ti
on
of
e
nc
r
ypted
f
il
e
f
or
c
olo
r
pixel
a
nd.
g
r
e
y
im
a
ge
va
lues
.
Af
ter
t
ha
t,
ther
e
will
be
de
c
r
y
pti
on
wi
th
the
he
lp
of
bo
th
f
il
e
s
a
nd
thi
s
will
joi
n
togethe
r
to
f
o
r
m
the
im
a
ge
.
S
mall
p
a
c
ke
t
s
ize
f
or
tr
a
ns
mi
s
s
ion
mus
t
a
lwa
ys
be
f
ixed
f
r
om
thi
s
pr
opos
e
d
s
ys
tem
to
mana
ge
a
be
tt
e
r
pe
r
f
or
manc
e
a
nd
the
r
e
c
e
iver
s
ide
buf
f
e
r
s
pa
c
e
s
hould
be
e
xtende
d
to
a
void
c
onge
s
ti
on.
T
his
c
ompl
e
te
im
a
ge
pr
oc
e
s
s
ing
is
s
u
ppor
ted
unde
r
Us
e
r
Da
tagr
a
m
P
r
otocol
(
UD
P
)
w
hich
ha
s
higher
s
pe
e
d.
Node
s
W
he
n
the
ne
twor
k
is
be
ing
e
nter
e
d
by
the
us
e
r
a
nd
r
e
a
dy
to
tr
a
ns
f
e
r
the
s
e
c
ur
e
d
a
ta
with
other
node
s
in
M
AN
E
T
:
−
At
f
ir
s
t,
the
us
e
r
c
a
pt
ur
e
s
or
s
e
lec
ts
the
input
im
a
g
e
a
nd
then
s
e
lec
ts
the
ke
y
mea
nt
f
or
tr
a
ns
mi
s
s
ion
.
−
T
he
us
e
r
divi
de
s
the
ke
y
int
o
two
-
ha
lf
.
−
T
he
input
c
olour
i
mage
is
divi
de
d
by
the
us
e
r
i
nto:
gr
e
y
im
a
ge
s
with
256
gr
e
y
leve
ls
a
nd
other
with
the
text
f
i
les
a
r
e
made
up
of
c
omp
one
nts
o
f
R
GB
o
f
the
c
olou
r
im
a
ge
.
−
Additi
on
of
the
divi
de
d
ke
y
int
o
gr
e
y
a
nd
text
im
a
ge
r
e
s
pe
c
ti
ve
ly
.
−
T
he
n,
the
e
nc
r
ypti
on
o
f
the
gr
e
y
a
nd
text
im
a
ge
by
a
pplyi
ng
one
-
ti
me
ha
s
h
a
lgor
it
hm
of
c
r
yptogr
a
phy
.
−
F
oll
owe
d
by
a
s
e
pa
r
a
te
tr
a
ns
mi
s
s
ion
of
gr
e
y
im
a
ge
a
nd
text
f
il
e
int
o
the
ne
twor
k
.
T
his
im
pli
e
s
if
a
n
int
r
ude
r
ge
ts
a
f
il
e
,
it
would
be
ha
r
d
to
ge
t
a
ke
y
due
to
the
a
bs
e
nc
e
of
the
F
UL
L
ke
y.
−
Af
ter
a
s
e
pa
r
a
te
de
c
r
ypti
on
of
the
GR
E
Y
im
a
ge
,
b
y
the
c
ombi
na
ti
on
R
GB
im
a
ge
T
E
X
T
f
il
e
s
a
nd
the
gr
e
y,
the
or
igi
n
a
l
im
a
ge
is
c
ons
tr
uc
ted
ba
c
k.
−
L
a
s
tl
y,
ther
e
is
c
ombi
na
ti
on
o
f
ke
ys
in
or
de
r
to
ha
v
e
a
s
e
c
ur
e
ke
y
.
4.
RE
S
UL
T
S
OF
T
HE
E
XP
E
RI
M
E
NT
T
he
pr
oc
e
s
s
of
taking
the
he
a
d
of
we
ight
e
d
c
lus
ter
ing
a
lgor
i
thm
is
a
c
c
ompl
is
he
d
by
the
ins
tanta
ne
ous
va
lue
of
we
ight
[
24]
.
T
he
r
e
a
s
on
why
no
e
li
gibl
e
node
c
a
n
s
e
nd
it
s
we
ight
va
lue
be
c
a
us
e
of
the
pos
s
ibi
li
ty
of
high
tr
a
f
f
ic,
a
lt
hough
s
ome
node
s
a
r
e
a
ble
is
to
be
a
c
lus
ter
he
a
d.
T
h
is
lea
ds
to
the
c
onc
lus
ion
that
the
wr
ong
s
e
lec
ti
on
of
a
c
lus
te
r
he
a
d
c
a
n
be
take
n
plac
e
[
2
5
-
2
7
]
.
Ac
c
or
dingl
y
,
a
s
olut
ion
f
or
s
uc
h
a
n
is
s
ue
c
a
n
be
pr
ovided;
it
is
F
W
C
A
(
F
or
e
c
a
s
t
W
e
ight
C
lus
ter
Algor
it
hm)
thi
s
a
lt
e
r
na
ti
ve
take
s
t
he
old
va
lue
on
a
di
f
f
e
r
e
nt
s
ide
f
r
om
the
c
ur
r
e
nt
va
lue
of
the
node
.
T
he
r
e
s
ult
he
r
e
lea
ds
to
a
n
a
ppr
op
r
i
a
te
he
a
d
of
a
c
lus
ter
.
I
n
o
r
de
r
to
c
a
lcula
te
the
f
or
e
c
a
s
t
we
ig
ht,
a
mode
o
f
c
omput
a
ti
on
is
e
mpl
oye
d.
T
his
mode
is
c
a
ll
e
d
E
M
A:
e
xpone
nti
a
l
movi
ng
a
ve
r
a
g
e
.
T
h
is
is
us
e
f
ul
in
that
it
doe
s
not
r
e
quir
e
the
f
or
mer
v
a
lues
of
f
or
e
c
a
s
t.
[
20
,
2
8
-
30
]
.
F
or
e
c
a
s
ted
we
ight
(
F
W
)
is
d
e
f
ined
a
s
:
FW
=
α
Wcu
r
r
e
nt
+
(
1
−
α
)
F
Wp
r
e
v
io
u
s
(
1)
α
is
a
s
moot
hing
f
a
c
to
r
;
a
tunable
pa
r
a
mete
r
be
twe
e
n
z
e
r
o
a
nd
one
.
W
C
A
c
a
n
be
us
e
d
to
c
a
lcula
te
the
we
ight
of
e
a
c
h
node
a
s
:
=
1
+
2
+
3
+
4
(
2)
w
he
r
e
:
d
=
de
gr
e
e
of
dif
f
e
r
e
nc
e
in
e
a
c
h
node
D
=
S
um
o
f
dis
tanc
e
with
a
ll
ne
ighbour
s
S
=
the
node
’
s
s
pe
e
d
P
=
B
a
tt
e
r
y
c
ons
umed
by
the
ba
tt
e
r
y
w1
+
w2
+
w3
+
w4
=
1
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
Optimiz
ati
on
image
pr
oc
e
s
s
ing
and
c
lus
ter
ing
to
miti
gate
the
s
e
c
ur
it
y
thr
e
ats
in
...
(
I
br
ahim
A
.
A
lam
e
r
i)
481
T
he
f
or
e
c
a
s
t
we
ight
(
F
W
)
is
c
a
lcula
ted
in
ou
r
pr
op
os
e
d
F
W
C
A
a
s
:
(
+
1
)
=
a
∑
(
1
−
)
−
1
=
0
(
−
)
+
(
1
−
)
(
3)
F
W
i
(
t+1)
=
F
o
r
e
c
a
s
t
va
lue
f
or
pe
r
iod
t
+
1
a
t
ti
me
,
t.
W
i
=
the
a
c
tual
va
lue
a
t
pe
r
iod
,
t
.
F
W
i
(
t
-
k)
=
F
or
e
c
a
s
t
va
lue
f
o
r
pe
r
iod
t
a
t
t
im
e
,
t
–
1
I
n
F
igu
r
e
2
,
ther
e
a
r
e
s
e
ve
r
a
l
c
lus
ter
s
,
s
1,
s
2,
s
3
r
e
s
pe
c
ti
ve
ly
a
t
the
s
e
r
ve
r
node
s
of
c
lus
ter
1
,
c
lus
ter
2
a
nd
c
lus
ter
3.
T
he
f
o
r
e
c
a
s
t
we
ight
is
c
a
lcula
ted
w
it
h
thes
e
node
s
us
ing
we
ight
va
lue
of
node
s
a
nd
t
he
ga
me
theor
y
a
ppr
oa
c
h
is
us
e
d
to
de
c
ide
the
c
lus
ter
he
a
d
t
o
a
void
c
onf
li
c
ti
on
of
ha
ving
s
im
il
a
r
we
ight
s
.
w1
+
w2
+
w3
+
w4
=
1
w1
=
0.
7
w1
=
0.
2
w1=
0.
06
.
Us
ing
the
f
oll
owing
f
or
mu
la,
T
a
bles
2
,
3
a
nd
4
[
30
]
p
r
e
s
e
nt
the
we
ight
va
lues
o
f
node
s
f
o
r
e
a
c
h
c
lus
ter
to
c
a
lcula
te
the
we
ight
:
Wi
=
w
1
d
i
+
w
2
Di
+
w
3
S
i
+
w
4
P
i
(
4)
F
igur
e
2
.
S
t
r
uc
tur
e
o
f
c
lus
ter
s
ubmi
s
s
ion
T
he
pa
r
a
mete
r
s
to
c
a
lcula
te
we
ight
va
lue
wa
s
a
s
s
umed
he
r
e
that
a
s
f
oll
ows
:
M
obil
it
y
of
node
s
(
10km/
hr
to
30
km/
hr
)
Dis
tanc
e
be
twe
e
n
node
s
(
0.
1km
to
0
.
9km)
B
a
tt
e
r
y
powe
r
c
ons
umed
us
ing
the
f
or
mul
a
to
c
a
lc
ulate
the
we
ight
(
20
Ampe
r
e
-
hour
to
70
Ampe
r
e
-
h
our
)
T
a
ble
2
.
C
lus
ter
n
o
.
1
o
f
n
ode
s
N
ode
I
D
W
e
ig
h V
a
lu
e
1
W
1 =
0.7
∗
6 +
0.2
∗
1.2 +
0.06
∗
10 +
0.04
∗
30 =
6.24
2
W
2 =
0.7
∗
4 +
0.2
∗
0.35 +
0.06
∗
20 +
0.04
∗
70 =
6.87
3
W
3 =
0.7
∗
4 +
0.2
∗
0.4 +
0.06
∗
25 +
0.04
∗
60 =
6.78
4
W
4 =
0.7
∗
3 +
0.2
∗
0.1 +
0.06
∗
23.6 +
0.04
∗
50 =
6.24
5
W
5 =
0.7
∗
5 +
0.2
∗
0.35 +
0.06
∗
15 +
0.04
∗
70 =
7.27
6
W
6 =
0.7
∗
3 +
0.2
∗
0.5 +
0.06
∗
20 +
0.04
∗
70 =
6.50
7
W
7 =
0.7
∗
4 +
0.2
∗
0.45 +
0.06
∗
26 +
0.04
∗
60 =
6.85
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
S
N
:
1693
-
6930
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
,
Vol.
18
,
No
.
1
,
F
e
br
ua
r
y
2020
:
47
6
-
48
4
482
T
a
ble
3
.
C
lus
ter
n
o.
2
o
f
n
ode
s
N
ode
I
D
W
e
ig
ht
V
a
lu
e
14
W
14 =
0.7
∗
4 +
0.2
∗
0.6 +
0.06
∗
15 +
0.04
∗
30 =
5.02
6
W
6 =
0.7
∗
3 +
0.2
∗
0.5 +
0.06
∗
20 +
0.04
∗
70 =
6.50
17
W
17 =
0.7
∗
3 +
0.2
∗
0.9 +
0.06
∗
25 +
0.04
∗
50 =
7.4
18
W
18 =
0.7
∗
4 +
0.2
∗
0.57 +
0.06
∗
20 +
0.04
∗
40 =
5.74
19
W
19 =
0.7
∗
3 +
0.2
∗
0.5 +
0.06
∗
18 +
0.04
∗
60 =
5.02
T
a
ble
4
.
C
lus
ter
n
o.
3
o
f
n
ode
s
N
ode
I
D
W
e
ig
ht
V
a
lu
e
9
W
9
=
0
.
7
∗
4 +
0
.
2
∗
0
.
8 +
0
.
06
∗
10 +
0
.
04
∗
20 =
4
.
36
3
W
3
=
0
.
7
∗
4 +
0
.
2
∗
0
.
4 +
0
.
06
∗
25 +
0
.
04
∗
60 =
6
.
78
10
W
10
=
0
.
7
∗
3 +
0
.
2
∗
0
.
9 +
0
.
06
∗
25 +
0
.
04
∗
60
=
6
.
18
13
W
13
=
0
.
7
∗
2 +
0
.
2
∗
0
.
7 +
0
.
06
∗
30 +
0
.
04
∗
65
=
5
.
94
15
W
15
=
0
.
7
∗
3 +
0
.
2
∗
0
.
8 +
0
.
06
∗
26 +
0
.
04
∗
60
=
6
.
22
5.
CONC
L
USI
ON
F
or
s
e
c
ur
it
y
o
f
ne
twor
ks
in
M
AN
E
T
,
s
e
c
ur
e
k
e
y
tr
a
ns
f
e
r
is
i
mpor
tant
.
I
t
is
dif
f
icult
to
know
the
de
pe
nda
ble
node
s
in
M
AN
E
T
ne
twor
k
withou
t
the
idea
li
s
ti
c
c
onc
e
pt
of
the
int
e
r
media
te
node
id
e
nti
ty
in
ope
r
a
ti
on.
Ad
hoc
ne
twor
k
is
a
type
of
ne
twor
ks
t
ha
t
do
not
r
e
lay
on
a
ny
inf
r
a
s
tr
uc
tur
e
du
r
ing
e
s
tablis
hment.
W
he
r
e
int
r
ude
r
s
c
a
n
moni
tor
a
nd
int
e
r
c
e
pt
the
pa
s
s
wor
d,
a
uthentica
ti
on
ke
y
tr
a
ns
f
e
r
in
M
AN
E
T
ne
tw
or
ks
via
na
mele
s
s
mi
dwa
y
node
s
is
not
s
uit
a
ble
to
be
u
s
e
d.
I
t
is
im
pe
r
a
ti
ve
to
us
e
a
s
tr
ong
s
e
c
ur
e
method
of
ke
y
tr
a
ns
f
e
r
that
hides
da
ta
of
ve
r
i
f
ica
ti
on
ke
ys
.
T
hus
,
thi
s
p
r
opos
e
d
s
ys
tem
is
s
uit
a
ble
whe
r
e
ke
y
is
hidden
in
the
im
a
ge
f
r
om
the
s
ys
tem
that
is
dif
f
e
r
e
nt
f
r
om
o
ther
s
in
or
de
r
to
s
e
c
ur
e
ke
y
tr
a
ns
f
e
r
in
M
AN
E
T
n
e
twor
ks
.
T
he
im
a
ge
then
s
pli
ts
int
o
two
pa
r
ts
while
the
pa
r
ts
a
r
e
ther
e
f
o
r
e
e
nc
r
ypted
f
or
double
leve
l
of
s
e
c
ur
it
y.
Abili
ty
to
de
ve
lop
a
doubled
leve
l
of
s
e
c
ur
it
y
of
ke
y
tr
a
ns
f
e
r
in
the
ne
two
r
ks
of
M
AN
E
T
with
e
nc
r
ypted
s
e
c
ur
e
ke
y
tr
a
ns
f
e
r
is
the
pr
im
a
r
y
a
dva
ntage
of
the
f
utur
e
a
pp
r
oa
c
h.
A
c
lus
ter
he
a
d
is
r
e
s
pons
ibl
e
f
or
r
outi
ng
pr
oc
e
s
s
in
c
lus
ter
-
ba
s
e
d
r
outi
ng
pr
otocol
a
nd
inf
o
r
mation
li
ke
c
lus
ter
li
nks
a
nd
membe
r
s
hip
a
r
e
maintaine
d
by
thi
s
c
lus
ter
he
a
d
in
a
c
c
or
da
nc
e
to
whic
h
wha
t
it
is
pos
s
ibl
e
to
dyna
mi
c
a
ll
y
dis
c
ove
r
the
int
e
r
-
c
lus
ter
r
oute
s
.
T
hus
,
A
f
or
e
c
a
s
ted
we
ight
e
d
c
lus
ter
ing
a
lgor
it
hm
is
pr
op
os
e
d
in
thi
s
s
tudy
whe
r
e
mor
e
e
li
gibl
e
a
nd
pr
ope
r
n
ode
s
a
r
e
s
e
lec
ted
a
s
c
lus
ter
he
a
d
a
s
we
ll
a
s
int
r
oduc
ing
s
e
r
ve
r
node
to
r
e
duc
e
pe
r
node
c
a
lcula
ti
on
ove
r
he
a
d.
Abbr
e
viations
a
nd
Ac
r
onyms
ID
A
bbr
e
vi
a
ti
ons
1
M
A
N
E
T
M
obi
le
a
d hoc
ne
twor
k
2
F
W
C
A
F
or
e
c
a
s
t
W
e
ig
ht
e
d C
lu
s
te
r
in
g A
lg
or
it
hm
3
W
C
A
W
e
ig
ht
e
d C
lu
s
te
r
in
g A
lg
or
it
hm
4
D
I
P
D
ig
it
a
l
I
ma
ge
P
r
oc
e
s
s
in
g
5
UDP
U
s
e
r
D
a
ta
gr
a
m P
r
ot
oc
ol
6
E
M
A
E
xpone
nt
ia
l
M
ovi
ng A
ve
r
a
ge
7
FW
F
or
e
c
a
s
te
d W
e
ig
ht
RE
F
E
RE
NC
E
S
[1
]
R.
C.
G
o
n
zal
ez
an
d
R.
E
.
W
o
o
d
s
,
“D
i
g
i
t
al
Imag
e
Pr
o
ces
s
i
n
g
,
”
Pears
o
n
Pren
t
i
ce
H
al
l
,
2
0
0
8
.
[2
]
R.
Ch
ad
h
a
an
d
A
.
A
u
s
h
i
k
,
“
O
ri
g
i
n
al
A
p
p
ro
a
ch
W
i
t
h
Ima
g
e
Pro
ce
s
s
i
n
g
Fo
r
Secu
r
i
n
g
A
d
-
H
o
c
N
et
w
o
r
k
,
”
In
t
er
n
a
t
i
o
n
a
l
Jo
u
r
n
a
l
o
f
Co
r
e
E
n
g
i
n
eer
i
n
g
&
M
a
n
a
g
em
e
n
t
(IJC
E
M
)
,
v
o
l
.
1
,
n
o
.
8
,
p
p
.
1
0
-
1
5
,
N
o
v
2
0
1
4
.
[3
]
M.
H
.
A
b
d
u
l
ameer,
et
al
.
,
“
F
ace
reco
g
n
i
t
i
o
n
t
ech
n
i
q
u
e
b
as
ed
o
n
ad
a
p
t
i
v
e
-
o
p
p
o
s
i
t
i
o
n
p
ar
t
i
c
l
e
s
w
arm
o
p
t
i
mi
za
t
i
o
n
(A
O
PSO
)
a
n
d
s
u
p
p
o
rt
v
ect
o
r
mach
i
n
e
(S
V
M
),
”
A
R
P
N
Jo
u
r
n
a
l
o
f
E
n
g
i
n
ee
r
i
n
g
a
n
d
A
p
p
l
i
e
d
S
c
i
en
ce
s
,
v
o
l
.
1
3
,
p
p
.
2
2
5
9
-
2
2
6
6
,
Mar
2
0
1
8
.
[4
]
J
.
A
mu
d
h
a,
N
.
Prad
eep
a,
an
d
R.
Su
d
h
ak
ar,
“A
s
u
rv
e
y
o
n
d
i
g
i
t
al
i
ma
g
e
res
t
o
rat
i
o
n
,
”
E
l
s
ev
i
er
Pro
ced
i
a
E
n
g
i
n
eer
i
n
g
,
v
o
l
.
3
8
,
p
p
.
2
3
7
8
–
2
3
8
2
,
2
0
1
2
.
[5
]
H
.
Mo
u
d
n
i
,
et
a
l
.
,
“
Secu
re
ro
u
t
i
n
g
p
r
o
t
o
c
o
l
s
f
o
r
mo
b
i
l
e
ad
h
o
c
n
e
t
w
o
rk
s
,
”
2
0
1
6
In
t
er
n
a
t
i
o
n
a
l
C
o
n
f
er
e
n
ce
o
n
In
f
o
r
m
a
t
i
o
n
Tech
n
o
l
o
g
y
f
o
r
O
r
g
a
n
i
z
a
t
i
o
n
s
D
evel
o
p
m
en
t
(IT4
O
D
),
F
e
z
,
p
p
.
1
-
7
,
2
0
1
6
.
[6
]
A.
E
.
C.
Pan
d
el
ea,
et
al
.
, “
I
mag
e
p
ro
ces
s
i
n
g
u
s
i
n
g
art
i
fi
c
i
al
n
e
u
ral
n
e
t
w
o
rk
s
,
”
B
u
l
l
e
t
i
n
o
f
t
h
e
P
o
l
yt
ec
h
n
i
c
In
s
t
i
t
u
t
e
o
f
Ja
s
s
y
–
C
o
n
s
t
r
u
ct
i
o
n
s
,
A
r
c
h
i
t
ect
u
r
e
S
ect
i
o
n
,
v
o
l
.
6
1
,
n
o
.
6
5
,
p
p
.
9
-
2
1
,
2
0
1
5
.
[7
]
J
.
K
u
n
d
u
,
et
al
.
,
“A
n
E
f
fi
ci
e
n
t
T
r
u
s
t
-
Bas
e
d
Ro
u
t
i
n
g
Sch
e
me
b
y
Max
-
Mi
n
Co
m
p
o
s
i
t
i
o
n
o
f
Fu
zzy
L
o
g
i
c
fo
r
MA
N
E
T
,
”
P
r
o
ceed
i
n
g
s
o
f
t
h
e
In
t
er
n
a
t
i
o
n
a
l
C
o
n
f
er
e
n
ce
o
n
R
ecen
t
C
o
g
n
i
z
a
n
ce
i
n
W
i
r
e
l
es
s
C
o
m
m
u
n
i
c
a
t
i
o
n
&
Im
a
g
e
P
r
o
ce
s
s
i
n
g
,
2
0
1
6
,
p
p
.
4
3
5
-
4
4
0
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
Optimiz
ati
on
image
pr
oc
e
s
s
ing
and
c
lus
ter
ing
to
miti
gate
the
s
e
c
ur
it
y
thr
e
ats
in
...
(
I
br
ahim
A
.
A
lam
e
r
i)
483
[8
]
Su
res
h
a
D
.
an
d
Prak
as
h
H
.
N
.
,
“A
N
o
v
e
l
A
p
p
r
o
ac
h
U
s
i
n
g
Imag
e
Pro
ce
s
s
i
n
g
fo
r
Secu
ri
n
g
A
d
-
H
o
c
N
e
t
w
o
r
k
s
,
”
In
t
e
r
n
a
t
i
o
n
a
l
Jo
u
r
n
a
l
o
f
In
n
o
va
t
i
ve
R
es
e
a
r
c
h
i
n
S
c
i
en
ce,
E
n
g
i
n
ee
r
i
n
g
a
n
d
Tech
n
o
l
o
g
y
,
v
o
l
.
3
,
n
o
.
2
,
p
p
.
9
2
9
5
-
9
3
0
1
,
Feb
2
0
1
4
.
[9
]
I.
A
.
A
l
ameri
an
d
G
.
R
ad
ch
en
k
o
,
“D
ev
e
l
o
p
men
t
o
f
St
u
d
en
t
In
fo
rma
t
i
o
n
Man
a
g
emen
t
Sy
s
t
em
b
as
e
d
o
n
Cl
o
u
d
Co
mp
u
t
i
n
g
P
l
at
f
o
rm,
”
Jo
u
r
n
a
l
o
f
A
p
p
l
i
e
d
Co
m
p
u
t
e
r
S
ci
en
ce
&
M
a
t
h
e
m
a
t
i
c
s
,
v
o
l
.
1
1
,
n
o
.
2
,
p
p
.
9
-
1
4
,
2
0
1
7
.
[1
0
]
I
.
A
.
A
l
ai
mera
an
d
G
.
R
ad
ch
en
k
o
,
“Cl
o
u
d
co
mp
u
t
i
n
g
an
d
w
eb
s
i
t
es
d
e
s
i
g
n
an
d
d
e
v
el
o
p
me
n
t
,
”
L
amb
ert
acad
e
mi
c
p
u
b
l
i
s
h
i
n
g
,
J
u
l
2
0
1
6
.
[1
1
]
I.
A
.
A
l
ameri
,
“A
N
o
v
el
ap
p
ro
ac
h
t
o
c
o
m
p
arat
i
v
e
an
a
l
y
s
i
s
o
f
l
eg
ac
y
an
d
n
a
t
u
re
i
n
s
p
i
re
d
an
t
co
l
o
n
y
o
p
t
i
m
i
zat
i
o
n
b
as
e
d
r
o
u
t
i
n
g
p
ro
t
o
c
o
l
i
n
MA
N
E
T
,”
Jo
u
r
n
a
l
o
f
S
o
u
t
h
we
s
t
Ji
a
o
t
o
n
g
U
n
i
ver
s
i
t
y
,
v
o
l
.
5
4
,
n
o
.
4
,
2
0
1
9
.
[1
2
]
M.
B.
M.
K
amel
,
et
al
.
,
“ST
A
O
D
V
:
A
s
ecu
re
a
n
d
t
ru
s
t
b
as
ed
ap
p
ro
ach
t
o
mi
t
i
g
at
e
b
l
ac
k
h
o
l
e
a
t
t
ac
k
o
n
A
O
D
V
b
a
s
e
d
MA
N
E
T
,
”
P
r
o
ceed
i
n
g
s
o
f
2
0
1
7
IE
E
E
2
n
d
A
d
v
a
n
ce
d
In
f
o
r
m
a
t
i
o
n
Tech
n
o
l
o
g
y,
E
l
ect
r
o
n
i
c
a
n
d
A
u
t
o
m
a
t
i
o
n
C
o
n
t
r
o
l
Co
n
f
er
e
n
ce,
IA
E
A
C
2
0
1
7
,
Mar
2
0
1
7
,
p
p
.
1
2
7
8
-
1
2
8
2
.
[1
3
]
Sat
h
i
s
h
a
M.
S.
,
et
al
.
,
“Imp
l
emen
t
a
t
i
o
n
o
f
Pro
t
ec
t
ed
Ro
u
t
i
n
g
t
o
D
ef
en
d
By
zan
t
i
n
e
A
t
t
ac
k
s
fo
r
MA
N
E
T
’s
,
”
In
t
e
r
n
a
t
i
o
n
a
l
Jo
u
r
n
a
l
o
f
A
d
va
n
ced
R
es
e
a
r
c
h
i
n
C
o
m
p
u
t
e
r
S
ci
e
n
ce
,
v
o
l
.
3
,
n
o
.
4
,
p
p
.
1
0
9
-
1
1
4
,
2
0
1
2
.
[1
4
]
A
.
T
ø
n
n
e
s
en
,
“
Mo
b
i
l
e
A
d
-
H
o
c
N
et
w
o
r
k
s
,
”
h
t
t
p
:
/
/
w
w
w
.
o
l
s
r.
o
rg
/
d
o
cs
/
w
o
s
3
-
o
l
s
r.
p
d
f
.
[1
5
]
P.
D
i
p
es
h
an
d
N
.
Rak
e
s
h
,
“A
d
h
o
c
W
i
re
l
es
s
N
et
w
o
r
k
s
,
”
h
t
t
p
:
/
/
w
w
w
.
acs
u
.
b
u
ffal
o
.
e
d
u
/
~
n
a
g
i
/
co
u
rs
e
s
/
6
8
4
/
a
d
h
o
c.
p
d
f
.
[1
6
]
L
.
Z
h
o
u
an
d
Z
.
J
.
H
aas
,
“Secu
r
i
n
g
A
d
H
o
c
N
e
t
w
o
rk
s
,
”
IE
E
E
n
et
w
o
r
k,
s
p
ec
i
a
l
i
s
s
u
e
o
n
n
et
w
o
r
k
s
ecu
r
i
t
y
,
1
9
9
9
.
h
t
t
p
:
/
/
w
w
w
.
cs
.
c
o
rn
e
l
l
.
ed
u
/
h
o
me
/
l
d
zh
o
u
/
ad
h
o
c.
p
d
f
.
[1
7
]
H
.
L
u
o
,
et
a
l
.
,
“Sel
f
-
s
ec
u
ri
n
g
A
d
H
o
c
W
i
re
l
es
s
N
e
t
w
o
rk
s
,
”
P
r
o
ceed
i
n
g
s
o
f
t
h
e
S
even
t
h
In
t
er
n
a
t
i
o
n
a
l
S
ym
p
o
s
i
u
m
o
n
Co
m
p
u
t
er
s
a
n
d
Co
m
m
u
n
i
ca
t
i
o
n
s
(I
S
CC’0
2
)
-
IE
E
E
,
J
u
l
2
0
0
2
.
[1
8
]
Pi
y
al
i
k
ar
,
et
al
.
,
“Fo
reca
s
t
W
e
i
g
h
t
e
d
Cl
u
s
t
eri
n
g
i
n
M
A
N
E
T
,
”
P
r
o
ce
d
i
a
-
P
r
o
ce
d
i
a
Co
m
p
u
t
er
S
ci
e
n
ce,
Twel
f
t
h
In
t
e
r
n
a
t
i
o
n
a
l
M
u
l
t
i
-
Co
n
f
e
r
en
ce
o
n
In
f
o
r
m
a
t
i
o
n
P
r
o
ce
s
s
i
n
g
(IM
CI
P
-
2
0
1
6
)
,
v
o
l
.
8
9
,
p
p
.
2
5
3
-
2
6
0
,
2
0
1
6
.
[1
9
]
D
.
Rav
i
l
l
a
an
d
C.
S.
R.
Pu
t
t
a
,
“E
n
h
a
n
ci
n
g
t
h
e
Secu
ri
t
y
o
f
MA
N
E
T
s
U
s
i
n
g
H
as
h
A
l
g
o
r
i
t
h
ms
,
”
P
r
o
ced
i
a
-
P
r
o
c
ed
i
a
Co
m
p
u
t
er
S
c
i
en
c
e,
E
l
eve
n
t
h
In
t
er
n
a
t
i
o
n
a
l
M
u
l
t
i
-
Co
n
f
e
r
en
ce
o
n
In
f
o
r
m
a
t
i
o
n
P
r
o
ce
s
s
i
n
g
(IM
CI
P
-
2
0
1
5
)
,
v
o
l
.
5
4
,
p
p
.
1
9
6
-
2
0
6
,
2
0
1
5
.
[2
0
]
FIPS
PU
B
1
8
0
-
4
,
“
Secu
re
H
as
h
St
a
n
d
ar
d
(SH
S),
”
I
n
fo
rma
t
i
o
n
T
e
ch
n
o
l
o
g
y
L
ab
o
r
at
o
ry
,
N
a
t
i
o
n
a
l
In
s
t
i
t
u
t
e
o
f
s
t
a
n
d
ar
d
s
an
d
T
ec
h
n
o
l
o
g
y
G
a
i
t
h
er
s
b
u
rg
,
MD
2
0
8
9
9
-
8
9
0
0
,
Mar
2
0
1
2
.
[2
1
]
S.
M.
S.
S.
D
,
“Imp
l
emen
t
at
i
o
n
o
f
Sec
u
re
Bi
o
met
r
i
c
A
u
t
h
en
t
i
ca
t
i
o
n
U
s
i
n
g
K
erb
ero
s
Pro
t
o
co
l
,
”
In
t
er
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
A
d
va
n
ced
R
es
e
a
r
c
h
i
n
C
o
m
p
u
t
er
S
c
i
en
c
e
a
n
d
S
o
f
t
wa
r
e
E
n
g
i
n
ee
r
i
n
g
,
v
o
l
.
3
,
p
p
.
2
4
9
-
2
5
4
,
2
0
1
3
.
[2
2
]
S.
W
i
ed
e
n
b
ec
k
,
et
al
.
,
“
A
u
t
h
en
t
i
ca
t
i
o
n
U
s
i
n
g
G
rap
h
i
cal
Pas
s
w
o
r
d
s
:
Bas
i
c
Res
u
l
t
s
,
”
P
r
o
cee
d
i
n
g
:
S
O
U
P
S
'
0
5
P
r
o
ceed
i
n
g
s
o
f
t
h
e
2
0
0
5
s
ym
p
o
s
i
u
m
o
n
U
s
a
b
l
e
p
r
i
v
a
cy
a
n
d
s
ecu
r
i
t
y
,
pp.
1
-
1
2
,
J
u
l
2
0
0
5
.
[2
3
]
R.
B.
W
o
l
f
g
an
g
an
d
E
.
J
.
D
e
l
p
,
“
O
v
er
v
i
e
w
o
f
i
ma
g
e
s
e
cu
ri
t
y
t
ech
n
i
q
u
e
s
w
i
t
h
a
p
p
l
i
ca
t
i
o
n
s
i
n
mu
l
t
i
med
i
a
s
y
s
t
e
ms
,
”
P
r
o
c.
S
P
I
E
3
2
2
8
,
M
u
l
t
i
m
ed
i
a
Ne
t
wo
r
ks
:
S
ec
u
r
i
t
y,
D
i
s
p
l
a
ys
,
Ter
m
i
n
a
l
s
,
a
n
d
G
a
t
ew
a
ys
,
Feb
1
9
9
8
.
[2
4
]
H
.
N
.
Saad
a
n
d
M.
B.
M.
K
amel
,
“
W
ei
g
h
t
an
a
l
y
s
i
s
fo
r
w
ei
g
h
t
e
d
cl
u
s
t
er
al
g
o
r
i
t
h
ms
i
n
mo
b
i
l
e
ad
-
h
o
c
n
et
w
o
r
k
w
ei
g
h
t
an
al
y
s
i
s
fo
r
w
ei
g
h
t
ed
c
l
u
s
t
er
a
l
g
o
ri
t
h
m
s
i
n
mo
b
i
l
e
ad
-
h
o
c
n
et
w
o
r
k
,
”
J
o
u
rn
a
l
o
f
T
h
e
o
ret
i
cal
a
n
d
A
p
p
l
i
ed
I
n
fo
rma
t
i
o
n
T
ech
n
o
l
o
g
y
,
v
o
l
.
9
5
,
n
o
.
1
4
,
p
p
.
3
3
5
2
-
3
3
6
4
,
J
u
l
2
0
1
7
.
[2
5
]
S.
D
h
amo
d
h
arav
a
d
h
a
n
i
,
"
A
s
u
rv
e
y
o
n
cl
u
s
t
er
i
n
g
b
as
e
d
ro
u
t
i
n
g
p
ro
t
o
c
o
l
s
i
n
Mo
b
i
l
e
ad
h
o
c
n
et
w
o
rk
s
,
"
In
t
ern
a
t
i
o
n
al
Co
n
fere
n
ce
o
n
S
o
ft
-
C
o
mp
u
t
i
n
g
an
d
N
et
w
o
r
k
s
Secu
r
i
t
y
(
ICSN
S),
Co
i
mb
a
t
o
r
e,
p
p
.
1
-
6
,
2
0
1
5
.
[2
6
]
N
.
A
g
ar
w
al
a,
“Mo
b
i
l
e
A
d
h
o
c
N
e
t
w
o
rk
s
an
d
i
t
s
C
l
u
s
t
er
i
n
g
Sch
eme,
”
I
n
t
er
n
at
i
o
n
al
J
o
u
rn
a
l
o
f
Sc
i
en
ce
a
n
d
Re
s
ear
ch
,
v
o
l
.
1
,
n
o
.
3
,
p
p
.
3
6
-
4
3
,
D
ec
20
1
2
.
[2
7
]
P
.
K
ar,
M
.
K
.
D
.
Barma,
S
.
Ro
y
an
d
S.
K
.
Sen
,
“
E
n
erg
y
E
ffi
c
i
en
t
W
ei
g
h
t
Bas
ed
Cl
u
s
t
eri
n
g
i
n
MA
N
E
T
,
”
2
nd
In
t
er
n
at
i
o
n
al
Co
n
fere
n
ce
o
n
D
a
t
a
E
n
g
i
n
ee
ri
n
g
an
d
Co
m
mu
n
i
cat
i
o
n
Sy
s
t
em
(ICD
E
CS),
v
o
l
.
1
0
,
p
p
.
8
2
–
8
6
,
D
ec
2015
.
[2
8
]
Y
.
Sat
o
,
A
.
K
o
y
ama,
an
d
L
.
Baro
l
l
i
,
“A
Z
o
n
e
Bas
ed
R
o
u
t
i
n
g
Pro
t
o
c
o
l
fo
r
A
d
H
o
c
N
et
w
o
r
k
s
an
d
It
s
Perfo
rma
n
ce
Imp
ro
v
emen
t
b
y
Re
d
u
c
t
i
o
n
o
f
Co
n
t
ro
l
Pack
e
t
s
,
”
2
0
1
0
In
t
ern
a
t
i
o
n
a
l
Co
n
fere
n
ce
o
n
Bro
a
d
b
a
n
d
,
W
i
rel
e
s
s
C
o
mp
u
t
i
n
g
,
Co
mmu
n
i
ca
t
i
o
n
an
d
A
p
p
l
i
ca
t
i
o
n
s
,
IE
E
E
Co
mp
u
t
er
S
o
ci
et
y
,
Fu
k
u
o
k
a,
p
p
.
1
7
-
2
4
,
2
0
1
0
.
[2
9
]
M.
O
.
Perv
ai
z,
M.
Card
ei
,
an
d
J
.
W
u
,
“Ro
u
t
i
n
g
Secu
ri
t
y
i
n
A
d
H
o
c
W
i
re
l
es
s
N
et
w
o
r
k
s
,
”
H
u
an
g
SH
.
,
Mac
Cal
l
u
m
D
.
,
D
u
D
Z
.
(ed
s
)
N
et
w
o
r
k
Secu
ri
t
y
.
Sp
r
i
n
g
er,
Bo
s
t
o
n
,
MA
,
p
p
.
1
1
7
–
1
4
2
,
2
0
1
0
.
[3
0
]
P.
K
ar,
M.
K
an
t
i
,
a
n
d
D
.
Barma,
“Fo
reca
s
t
W
e
i
g
h
t
e
d
Cl
u
s
t
eri
n
g
i
n
MA
N
E
T
,
”
T
w
el
f
t
h
I
n
t
er
n
at
i
o
n
a
l
Mu
l
t
i
-
Co
n
fere
n
ce
o
n
I
n
fo
rma
t
i
o
n
Pro
ce
s
s
i
n
g
(IMCIP
-
2
0
1
6
),
v
o
l
.
8
9
,
p
p
.
2
5
3
–
2
6
0
,
2
0
1
6
.
B
I
OG
RA
P
H
I
E
S
OF
AU
T
HO
RS
I
bra
hi
m
A
l
a
m
eri
i
s
cu
rren
t
l
y
a
Ph
D
s
t
u
d
e
n
t
at
Pard
u
b
i
ce
u
n
i
v
ers
t
y
-
Czec
h
Rep
u
b
l
i
c.
A
d
d
i
t
i
o
n
a
l
l
y
,
h
e
i
s
w
o
r
k
i
n
g
as
an
a
s
s
i
s
t
a
n
t
l
ec
t
u
rer
i
n
Co
l
l
eg
e
o
f
Med
i
c
i
n
e
–
J
ab
i
r
Ib
n
H
ay
y
a
n
Med
i
ca
l
U
n
i
v
er
s
i
t
y
.
H
e
earn
e
d
a
Mas
t
er
d
eg
ree
i
n
co
mp
u
t
er
s
ci
e
n
ce
fro
m
So
u
t
h
U
ra
l
St
at
e
Uni
v
er
s
t
y
.
Mr.
A
l
ameri
h
a
s
ei
g
h
t
y
ear
s
o
f
res
earc
h
ex
p
er
i
en
ce.
H
i
s
res
earc
h
fi
el
d
s
are
Mo
b
i
l
e
ad
h
o
c
n
e
t
w
o
rk
s
,
p
ro
t
o
c
o
l
o
p
t
i
m
i
zat
i
o
n
s
an
d
cl
o
u
d
co
mp
u
t
i
n
g
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
S
N
:
1693
-
6930
T
E
L
KO
M
NI
KA
T
e
lec
omm
un
C
omput
E
l
C
ontr
o
l
,
Vol.
18
,
No
.
1
,
F
e
br
ua
r
y
2020
:
47
6
-
48
4
484
J
a
w
a
d
Ka
dhi
m
M
uta
r
is
an
a
s
s
i
s
t
a
n
t
l
ec
t
u
rer
i
n
h
i
s
t
o
r
y
d
ep
ar
t
men
t
i
n
t
h
e
ed
u
ca
t
i
o
n
a
l
co
l
l
eg
e
o
f
H
u
man
i
t
i
es
i
n
al
m
u
t
h
an
a
u
n
i
v
er
s
i
t
y
.
He
ear
n
ed
h
i
s
mas
t
er
i
n
co
m
p
u
t
er
s
ci
e
n
ce
i
n
o
s
ma
n
i
a
h
u
n
i
v
er
s
i
t
y
.
A
m
eer
N
.
Ona
i
z
a
h
is
a
n
a
s
s
i
s
t
a
n
t
l
ec
t
u
rer
i
n
C
o
l
l
eg
e
o
f
Co
mp
u
t
er
Sc
i
en
ce
a
n
d
Mat
h
ema
t
i
c
s
u
n
i
v
er
s
i
t
y
o
f
K
u
fa.
Cu
rre
n
t
l
y
,
h
e
i
s
a
Ph
D
s
t
u
d
e
n
t
at
Be
i
j
i
n
g
In
s
t
i
t
u
t
e
o
f
T
ech
n
o
l
o
g
y
,
Ch
i
n
a
I
fti
kha
r
A
h
m
ed
Ko
o
ndh
a
r
i
s
cu
rre
n
t
l
y
Ph
D
s
t
u
d
e
n
t
at
Bei
j
i
n
g
In
s
t
i
t
u
t
e
o
f
T
ech
n
o
l
o
g
y
,
Ch
i
n
a.
H
e
i
s
w
o
r
k
i
n
g
as
an
as
s
i
s
t
a
n
t
p
r
o
fes
s
o
r
i
n
t
h
e
d
e
p
art
me
n
t
o
f
co
mp
u
t
er
s
y
s
t
ems
en
g
i
n
eer
i
n
g
i
n
Q
u
a
i
d
-
e
-
a
w
am
U
n
i
v
er
s
i
t
y
-
Pa
k
i
s
t
a
n
.
Mr.
K
o
o
n
d
h
ar
earn
ed
h
i
s
Mas
t
er
o
f
E
n
g
i
n
eeri
n
g
d
e
g
ree
i
n
Co
mm
u
n
i
ca
t
i
o
n
Sy
s
t
em
s
an
d
N
e
t
w
o
rk
s
fro
m
Me
h
ran
U
n
i
v
er
s
i
t
y
o
f
E
n
g
i
n
eeri
n
g
a
n
d
T
ech
n
o
l
o
g
y
-
Pak
i
s
t
a
n
.
H
i
s
res
earch
i
n
t
ere
s
t
s
i
n
c
l
u
d
e
co
mp
u
t
er
n
e
t
w
o
rk
s
,
d
at
a
mi
n
i
n
g
an
d
h
i
g
h
-
p
erf
o
rman
ce
co
mp
u
t
i
n
g
an
d
i
n
t
ern
e
t
o
f
t
h
i
n
g
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.