{"title":"A method for topology conformance tests under logical constraints","authors":"Jianwu Zhang, Guoai Xu, Yixian Yang, Shize Guo","doi":"10.1109/WCINS.2010.5541805","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541805","url":null,"abstract":"Common Criteria(CC) provides only the standard for evaluating information security product or system. Conformance test is considered from a statistical point of view, while the determination of whether the topology is consistent with the standard depends on a conformance test. CC based topology conformance test is in trouble without an effective method. In this paper, a method for topology conformance test was presented and an algorithm for topology conformance test under logical constraints was introduced. In our method, the topology is described by a matrix and the logical constraints are stored using Binary Decision Diagrams (BDDs) data structure. From the experimental results, we can see the method is efficient enough for topology conformance test.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124825354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fast motion estimation optimization for H.264/AVC encoder","authors":"Chen Zu-jue, Cao Jie, Liu Shao-qing","doi":"10.1109/WCINS.2010.5541901","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541901","url":null,"abstract":"Compared with previous video standards, the computational complexity of H.264/AVC is extraordinarily high due to newly adopted tools such as variable block size motion estimation. A fast motion estimation scheme based on H.264 is proposed in this paper. Firstly it predicts the motion range of the current block based on the computed RDO value character and the relation between the collocated blocks. Then based on this, variable search masks are applied in the following search steps. This scheme consists of the improved initial search point, search pattern, search range and match criterion. The experiment result shows that the method can save about 30% encode time compared to the current fast algorithms in the latest JM(Joint Model reference) software, while achieve almost the same PSNR as the full search algorithm.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124830155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust transmission of progressive images in the deep space communication","authors":"Jiayan Zhang, Ma Jing, Shaochuan Wu","doi":"10.1109/WCINS.2010.5544054","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544054","url":null,"abstract":"Signal to noise ratio in the deep space communication channel is so low that it is essential for deep space communication systems that information received is adequately used. Focused on the long delay and the high fading in the deep communication channel, a method of progressive robust image transmission is proposed based on the image compression algorithms using wavelet transform suggested by CCSDS. It divides Wavelet Coefficient of tree structure in CCSDS standard to different groups, which compensated the deficiency of the low efficiency in forward error correct and the long delay of automatic repeat-request if it is used to protect the image compression data in deep space communication. And with the help of a rate-distortion model for progressive wavelet coder and a way for voice quantization optimum bit assignment, the paper proposed a new method to allocate different compression rates to image groups in order to meet the minimum image data lost in the situation of constant channel rate. Simulation results have shown that the method is suited to implement error containment of the progressive image transmission in the deep space communication.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121699159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of signal acquisition system based on wireless transmission","authors":"Chunjiang Yao, Xiaohu Chen, Xuping Wang, Q. He","doi":"10.1109/WCINS.2010.5541752","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541752","url":null,"abstract":"This paper designs and develops a signal acquisition system based on wireless transmission, analyzes the system's principle and structure, and gives the design of hardware in detail. The system includes wireless data acquisition units and a wireless data receiver unit. The data acquisition unit realizes signal acquisition, tem-storage and communication with the receiver unit, which uses STR-30 as wireless transmission module, ADS774 as acquisition chip, MAX813L chip to realize power-on reset and watchdog reset, and realize monitoring supply voltage. The receiver unit uses dual serial port MCU W77E58 to achieve communication with PC and acquisition units. Finally it designs the system software, and gives the wireless transmission protocol and system workflow.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121730949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel estimation and symbol demodulation of the transform domain communication system","authors":"Caihua Yin, Dawei Ma, Yu Zheng, G. Yu, Jian Wang","doi":"10.1109/WCINS.2010.5541728","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541728","url":null,"abstract":"The transform domain communication system (TDCS) is one spectrum agile transceiver technology in the cognitive radio (CR) contexts. It gives an effective and available way to resolve current spectrum resource scarcity. This paper briefly introduces the basic theory of the TDCS transceiver. The primary goal of this paper is to give a detailed description of the channel estimation (CE) in TDCS receiver and its applications in receiving symbol demodulation, where the CE-based demodulation algorithm is proposed. Computer simulation results verify that the CE of TDCS is available and realizable, and the bit error ratio (BER) performance of CE-based demodulation algorithm is better than the one of traditional TDCS RAKE receiver algorithm in the Additive White Gaussian Noise (AWGN) and multi-path fading channels.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122127071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of low-power wireless sensor networks for environmental monitoring","authors":"Jue Yang, Xinrong Li","doi":"10.1109/WCINS.2010.5543952","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5543952","url":null,"abstract":"Environmental monitoring represents a major application domain for wireless sensor networks. In this paper, we present the design and implementation of low-power wireless sensor networks for long-term, autonomous, and near-real-time environmental monitoring applications. We have developed a suite of networking protocols to provide reliable data collection with extremely low power consumption. A network of 35 sensor nodes has been deployed in a remote field station to monitor soil moisture along with other environmental parameters. The system has been integrated into the Texas Environmental Observatory infrastructure for long-term operation. Some field performance results are also presented to demonstrate the reliability and energy-efficiency of the network.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":" 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113952454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Narayan, S. Sodhi, Paula Raymond Lutui, K. Vijayakumar
{"title":"Network performance evaluation of routers in IPv4/IPv6 environment","authors":"S. Narayan, S. Sodhi, Paula Raymond Lutui, K. Vijayakumar","doi":"10.1109/WCINS.2010.5541871","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541871","url":null,"abstract":"Last century brought us the dawn of the Information age and in this century information technology continues to rapidly enhance in all aspects of personal, social and business activities. Times are changing, technology is changing, and so do the demands and the expectations of its users. Undoubtedly, the Internet is playing a vital role by providing a global information superhighway. Internet Protocol (IP) v4 is the standard for the design and interconnection of networks today; however IPv4 has limitations that hinder growth of the Internet. IPv6 is the solution and it has two-fold advantage - it addresses inherent problems in the earlier version protocol, and it offers new opportunities that can enhance communication experiences of users beyond current scope. However, IPv6 has larger data overhead than its counterpart, which hints network performance issues. In this paper, performance of four software routers with IPv4 and IPv6 has been evaluated in a test bed setup. It is seen that throughput, jitter and delay differ between the operating systems and IP versions when all else remains constant in the test bed.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124207982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. S. Khodadad, S. B. H. Karani, A. Safaei, M. Ata, A. Taheri
{"title":"The direction of arrival estimation in DS-CDMA systems employing the code-matched filters and parallel ESPRIT algorithms","authors":"F. S. Khodadad, S. B. H. Karani, A. Safaei, M. Ata, A. Taheri","doi":"10.1109/WCINS.2010.5541936","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541936","url":null,"abstract":"It was shown that the number of array elements must exceed the number of sources for subspace-based direction-of-arrival (DOA) estimation. But this is not practical for a direct-sequence code-division multiple access (DS-CDMA) wireless system, since the number of mobile users is very large. To remove the aforementioned restriction, a DOA estimator, employing the code-matched filters and parallel ESPRIT algorithms, is proposed. This algorithm does not use to search all angles such as MUSIC method. Besides, it is not necessary to use AIC and MDL criterion to estimate the number of sources in the proposed algorithm. Simulation results illustrates the appropriate performance of the new method.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129607911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of attack models via Unified Modeling Language in Wireless Sensor Networks: A survey study","authors":"Sunghyuck Hong, Sunho Lim","doi":"10.1109/WCINS.2010.5541868","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541868","url":null,"abstract":"Wireless Sensor Networks (WSNs) are widely used in various environments in monitoring temperature, motion, sound, and vibration. These applications often include the detection of sensitive information from enemy movements in hostile areas or in locations of personnel in buildings. Due to characteristics of WSNs, nodes tend to be exposed to the enemy, and security is a major concern in WSNs. Many researchers have developed various security protocols. However, there is no research paper describing and analyzing security models in WSNs by using a standard notation such as The Unified Modeling Language (UML). Using the UML helps security developers to analyze security attacks and design secure WSNs. In this research, we provide standard models for security attacks by UML Sequence Diagrams to describe and analyze possible attacks in a network and transport layer.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129655721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ARATOS: An intelligent machine-to-machine framework for services based on satellite Earth Observation data","authors":"Nikolaos Bogonikolos, G. Mantas, G. Kostopoulos","doi":"10.1109/WCINS.2010.5542314","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5542314","url":null,"abstract":"This paper presents ARATOS, an intelligent machine-to-machine framework for the provision of seamless services to remote end-users over Next Generation Networks (NGNs) without human intervention as well as services interruption. The provided services are based on information derived from captured satellite Earth Observation data. ARATOS framework takes advantages of the convergence of Machine-to-Machine technology and Multi-Agent technology in order to overcome the issues raised because of its heterogeneous, complicated and dynamic nature. Machine-to-Machine technology is applied to address interoperability issues raised between the communicating machine domains. Additionally, Machine-to-Machine technology provides communication facilities between the domains according to human behavior approach of communication. Furthermore, Multi-Agent technology is used for the management of the huge quantities of the captured Earth Observation data and for their efficient on-demand processing. The on-demand processing leads to the provision of services tailored to the needs, interests and preferences of the end-user.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124603353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}