2013 Fourth International Conference on Networking and Distributed Computing最新文献

筛选
英文 中文
Comparisons of Encryption Algorithms in Histogram-Equalized Image 直方图均衡化图像加密算法的比较
2013 Fourth International Conference on Networking and Distributed Computing Pub Date : 2013-12-21 DOI: 10.1109/ICNDC.2013.22
Lican Huang, Chuane Wu, LiYa Chen, Lian Zhu
{"title":"Comparisons of Encryption Algorithms in Histogram-Equalized Image","authors":"Lican Huang, Chuane Wu, LiYa Chen, Lian Zhu","doi":"10.1109/ICNDC.2013.22","DOIUrl":"https://doi.org/10.1109/ICNDC.2013.22","url":null,"abstract":"In personal healthcare information systems we need to encrypt medical image for security reason. Histogram equalization is a significant application for image gray level transformation, which is widely used in image enhancement processing. We adopt keeping encrypted histogram-equalized image data in the database as the security strategy for our personal healthcare information cloud platform system. Three kinds of symmetric encryption algorithms are used to test histogram equalized image. The experiment results show AES encryption algorithm suitable for our personal healthcare information system.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115721870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy Saving Analysis of Harmonic Suppression in a Distribution Network 配电网谐波抑制的节能分析
2013 Fourth International Conference on Networking and Distributed Computing Pub Date : 2013-12-21 DOI: 10.1109/ICNDC.2013.13
Kelin Deng, Junwei Cao, Peng Guo, Xingtao Xu
{"title":"Energy Saving Analysis of Harmonic Suppression in a Distribution Network","authors":"Kelin Deng, Junwei Cao, Peng Guo, Xingtao Xu","doi":"10.1109/ICNDC.2013.13","DOIUrl":"https://doi.org/10.1109/ICNDC.2013.13","url":null,"abstract":"Harmonic in power systems would not only reduce the work efficiency of a distribution network and electrical equipments so as to cause faults, shorten service life of the network, but also increase the system loss, reduce the power factor and efficiency of electric consumption utilization, and cause greater economic loss. In this paper, through the analysis of generation mechanism of harmonic in power systems, and the effect of harmonic on a variety of electrical components, found that harmonic suppression has a certain energy-saving efficiency theoretically, finally, verified through an example when cost used for harmonic suppression is lower than electric fee saved, eliminating harmonics would improve the power quality, and at the same time obtain certain economic benefits.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114440353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Using a Time Series of Satellite Imagery to Study the Wild Birds' Migration 利用时间序列卫星图像研究野生鸟类的迁徙
2013 Fourth International Conference on Networking and Distributed Computing Pub Date : 2013-12-21 DOI: 10.1109/ICNDC.2013.34
Haiming Zhang, Jianhui Li, Yuanchun Zhou, Xuezhi Wang, Baoping Yan
{"title":"Using a Time Series of Satellite Imagery to Study the Wild Birds' Migration","authors":"Haiming Zhang, Jianhui Li, Yuanchun Zhou, Xuezhi Wang, Baoping Yan","doi":"10.1109/ICNDC.2013.34","DOIUrl":"https://doi.org/10.1109/ICNDC.2013.34","url":null,"abstract":"The first major outbreak of HPAI H5N1 virus in wild waterbirds took place in Qinghai Lake, western China, May 2005. During fall/winter of 2005 and spring 2006, H5N1 virus spread rapidly over Asia, Europe, and Africa. One hypothesis for the global patterns and dynamics of the spread of H5N1 virus is that seasonally migratory wild waterbirds may carry the virus and spread it along migratory flyways. Since 2007, Tens of waterbirds had been marked with GPS transmitters to get the migration tracks in Qinghai Lake. Satellite remote sensing is a useful tool to help analyzing the birds' GPS tracks. In this paper, we take advantage of Moderate Resolution Imaging Spectroradiometer (MODIS) sensor images to study the birds' migration patens. How to process and use the massive remote sensing images efficiently across computer cluster is discussed detailedly. At last, land surface temperature and cloud coverage information are obtained and used to study the wild birds' migration.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129103329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SSL VPN System Based on Simulated Virtual NIC 基于模拟虚拟网卡的SSL VPN系统
2013 Fourth International Conference on Networking and Distributed Computing Pub Date : 2013-12-21 DOI: 10.1109/ICNDC.2013.42
Zhu Yanjun, Wang Bin-jun, Zhang Wei
{"title":"SSL VPN System Based on Simulated Virtual NIC","authors":"Zhu Yanjun, Wang Bin-jun, Zhang Wei","doi":"10.1109/ICNDC.2013.42","DOIUrl":"https://doi.org/10.1109/ICNDC.2013.42","url":null,"abstract":"SSL VPN system depends on TUN device on Linux host. Without TUN device, it can't be deployed on Linux hosts. In order to overcome this limitation, a new kind of SSL VPN system is developed. This system is based on simulated virtual NIC based on loopback interface. With the help of simulated virtual NIC, SSL VPN client can be deployed on Linux hosts without TUN devices. Thus a Linux host without TUN devices can access the protected resources by SSL VPN. After system experiments and analysis, this kind of SSL VPN system can work well with normal network traffic. It is a new model of SSL VPN system, compared with traditional SSL VPN system.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130439233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Black Box Testing for Cloud-Based Client Security Software in Network Behaviors 基于云的客户端安全软件在网络行为中的黑盒测试
Bin Cao, Zhen Chen, Hongjia Liu, G. Ma, Peng Zhang, Guodong Peng
{"title":"Black Box Testing for Cloud-Based Client Security Software in Network Behaviors","authors":"Bin Cao, Zhen Chen, Hongjia Liu, G. Ma, Peng Zhang, Guodong Peng","doi":"10.1109/ICNDC.2013.9","DOIUrl":"https://doi.org/10.1109/ICNDC.2013.9","url":null,"abstract":"With the rapid growth of Internet, the amount of malicious codes is exploding. Some security software vendors provide new cloud-based safeguard software for client users. These software, as part of Internet ware, consist of many modules with different functions and Internet behaviors. The Trojan scanning module, for instance, is based on cloud scanning function, which is achieved by collecting a large number of suspicious files on users' hosts and scanning them in remote cloud platforms. While providing security, they also bring a serious problem of user privacy. In this paper, we use black box testing method to analyze the network behavior of four safeguard software, especially the Trojan scanning module based on cloud scanning function. In specific, we conduct extensive experiments to examine the network behaviors of the major function modules used by these safeguard software. In this paper we present a reasonable network behavior model that can help the safeguard software to protect users' privacy. One way of looking at our contributions is the network behavior comparison and analysis of four safeguard software which are widely used in China. And the experimental results validate our claims either.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128618531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Responsive Design: e-Learning Site Transformation 响应式设计:电子学习网站转型
2013 Fourth International Conference on Networking and Distributed Computing Pub Date : 2013-12-21 DOI: 10.1109/ICNDC.2013.41
Bin Zhu
{"title":"Responsive Design: e-Learning Site Transformation","authors":"Bin Zhu","doi":"10.1109/ICNDC.2013.41","DOIUrl":"https://doi.org/10.1109/ICNDC.2013.41","url":null,"abstract":"The development of mobile internet and high popularization of mobile terminal have brought new chances for E-learning. But the traditional teaching website cannot provide good user experience on mobile platform, while the responsive design can help improve the flexibility of website to multi-platform.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"39 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114021994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Novel Method of Parallel GPU Implementation of KNN Used in Text Classification 基于并行GPU实现KNN的文本分类新方法
2013 Fourth International Conference on Networking and Distributed Computing Pub Date : 2013-12-21 DOI: 10.1109/ICNDC.2013.20
Lican Huang, Zhilong Li
{"title":"A Novel Method of Parallel GPU Implementation of KNN Used in Text Classification","authors":"Lican Huang, Zhilong Li","doi":"10.1109/ICNDC.2013.20","DOIUrl":"https://doi.org/10.1109/ICNDC.2013.20","url":null,"abstract":"Automatic text classification is useful when websites have huge volume of web pages or other articles. K-Nearest Neighbour (KNN) is a way to classify the domains of text documents. The performance of text classification depends on lots of factors but KNN process contributes most of computational loads. We present a novel method of parallel GPU implementation of KNN with speed-ups of 40 times compared with CPU implementation.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115204736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Geometry-Based Virtual Simulation for Fire Escape in Emergency Environment 基于几何的紧急环境下火灾逃生虚拟仿真
2013 Fourth International Conference on Networking and Distributed Computing Pub Date : 2013-12-21 DOI: 10.1109/ICNDC.2013.36
Xiang Chen, Yang Li
{"title":"Geometry-Based Virtual Simulation for Fire Escape in Emergency Environment","authors":"Xiang Chen, Yang Li","doi":"10.1109/ICNDC.2013.36","DOIUrl":"https://doi.org/10.1109/ICNDC.2013.36","url":null,"abstract":"The paper research the choosing of the optimal escape routes in fire emergency simulation. Aiming at the lack of fire emergency behavior description and its path pre-processing mechanism without dynamic adapting, this paper presented a novel algorithm based on geometry method in order to make the simulation according with the facts. We abstracted complex scenes as the graph model, and established an adaptive dynamic path query table to create the dynamically generated map, and proposed a model of population density to restrict the escape expectation velocity, which reflects the population movement of social group behavior in emergency situations. Experimental results show that the algorithm can not only access the dynamic optimal escape route, but also realistically describe the crowd social escape behavior under fire emergency situations.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129682461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Combination of DRM and Mobile Code: A Practice to Protect TV Contents and Applications on Android Smartphone DRM和移动代码的结合:Android智能手机上电视内容和应用程序的保护实践
2013 Fourth International Conference on Networking and Distributed Computing Pub Date : 2013-12-21 DOI: 10.1109/ICNDC.2013.33
Tian Chen, Xie Lanchi, Wang Xingjun
{"title":"Combination of DRM and Mobile Code: A Practice to Protect TV Contents and Applications on Android Smartphone","authors":"Tian Chen, Xie Lanchi, Wang Xingjun","doi":"10.1109/ICNDC.2013.33","DOIUrl":"https://doi.org/10.1109/ICNDC.2013.33","url":null,"abstract":"With the internet's influence, an obvious trend can be seen that digital TV industry will embrace multi-screen and IP-based technology. Due to Chinese specific political environment, how to make sure the TV's contents controllable has become a key problem when the contents are accepted by more and more non-TV terminals like Android phones. In this paper, we focus on digital home network environment where Android terminals receive TV contents and display them with authorization. We introduce a new architecture for Android applications where an installed app works as a translator can run mobile code (Code that's loaded from server at runtime) through our defined android xml drama. What's more, we build an Android Digital Right Management (DRM) system referenced by China DRM Technical specification on that architecture. We show that DRM can effectively protect TV contents and mobile code can provide at least 2 benefits: first, it can protect some important code from exposure, second, it can keep the Android app's flexibility.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125541050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Wall Pass Algorithm in a Geographic Location-Based Distributed Routing System 基于地理位置的分布式路由系统中的墙通算法
2013 Fourth International Conference on Networking and Distributed Computing Pub Date : 2013-12-21 DOI: 10.1109/ICNDC.2013.23
Kumiko Kobayashi, I. Nugraha, H. Morita
{"title":"Wall Pass Algorithm in a Geographic Location-Based Distributed Routing System","authors":"Kumiko Kobayashi, I. Nugraha, H. Morita","doi":"10.1109/ICNDC.2013.23","DOIUrl":"https://doi.org/10.1109/ICNDC.2013.23","url":null,"abstract":"In this paper, we propose Wall Pass Algorithm (WPA). WPA presents a function to forward the messages to a neighboring area. We evaluate the performance of a geographic location-based distributed routing (GDR) system when the mobile terminals are moving. The results show that GDR and CAN have the same mean and the variance of the path length and the relay length when storing data, while the mean and the variance of the path length and the relay length of GDR are smaller than those of Chord and Kademlia. On the other hand, when sending query, GDR, Chord and Kademlia have the same mean and the variance of the path length, while the mean and the variance of the relay length of GDR are smaller than those of Chord and Kademlia. Furthermore, while GDR and CAN have the same mean and the variance of the relay length, the mean and the variance of the path length of GDR are smaller than those of CAN. In addition, WPA can decrease the communication overhead of the system.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131097902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信