2011 International Conference on Ubiquitous Computing and Multimedia Applications最新文献

筛选
英文 中文
Performance Comparision of AODV, DSR and DSDV under Various Network Conditions: A Survey AODV、DSR和DSDV在不同网络条件下的性能比较研究
G. Tomar, Tripti Sharma, D. Bhattacharyya, Tai-hoon Kim
{"title":"Performance Comparision of AODV, DSR and DSDV under Various Network Conditions: A Survey","authors":"G. Tomar, Tripti Sharma, D. Bhattacharyya, Tai-hoon Kim","doi":"10.1109/UCMA.2011.9","DOIUrl":"https://doi.org/10.1109/UCMA.2011.9","url":null,"abstract":"Mobile Ad-hoc networks are characterized by constant topology changes, in the absence of fixed infrastructure and lack of any centralized control. Traditional routing algorithms prove to be inefficient in such a changing environment. Ad-hoc routing protocols such as Dynamic Source Routing (DSR), Ad-hoc On-Demand Distance Vector Routing (AODV) and Destination sequence Vector (DSDV) have been proposed to solve the multi hop routing problem in Ad-hoc networks. Extensive research has been done in comparing the different proposed ad-hoc routing protocols under varying network scenarios. Routing overhead, packet delivery ratio, end-to-end delay, path optimality, and throughput are some metrics commonly used in the comparisons. In this survey paper we had analyzed the performance of the routing algorithms under various networks conditions.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127151251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Investigation of Effects of Mobility on Routing Protocols in MANET 移动对MANET中路由协议影响的研究
S. Kushwah, G. Tomar
{"title":"Investigation of Effects of Mobility on Routing Protocols in MANET","authors":"S. Kushwah, G. Tomar","doi":"10.1109/UCMA.2011.26","DOIUrl":"https://doi.org/10.1109/UCMA.2011.26","url":null,"abstract":"The routing protocols are the backbone to provide efficient call services in mobile ad hoc networks, in terms of both performance and reliability. Many routing protocols for such networks have been proposed so far. Amongst the most popular ones are Ad hoc On-demand Distance Vector (AODV), Destination-Sequenced Distance-Vector Routing protocol (DSDV), Dynamic Source Routing Protocol (DSR). This paper presents investigations regarding the performance comparison of the said protocols for varying node mobility in mobile ad hoc networks (MANETs). The simulated results are observed using simulations, using NS-2 simulator. The outcome of the investigation is that reactive protocols perform better than proactive protocols. Further DSR has performed well for the performance parameters namely delivery ratio while AODV performed better in terms of average delay.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129127013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Component Adaptation Mechanism 组件适配机制
Sae-Hoon Kim, Jeong Ah Kim
{"title":"Component Adaptation Mechanism","authors":"Sae-Hoon Kim, Jeong Ah Kim","doi":"10.1109/UCMA.2011.28","DOIUrl":"https://doi.org/10.1109/UCMA.2011.28","url":null,"abstract":"This research developed the technique necessary for the Adaptation of components and a tool which supports this. The Adaptation of components becomes necessary during the process of reusing or assembling components, and this is because the interface of the component is, in many cases, different than the component the developer wishes to assemble. Occasionally, additional attributes may need to be defined in accordance to new requirements. Consequently, the process for component adaptation is crucial for the reuse and assembly of components. In order to support the adaptation of components, this research proposes an adaptation technique dependent upon binary component adaptation techniques and adaptation components. In addition, a support tool was developed to support an effective adaptation process. Through this, by modifying existing components without source code, easy adaptation of components which are not well suited for the new requirements or face problems upon assembly with other components is supported.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of Guideline-Based CDSS 实施以指引为基础的CDSS
Jeong Ah Kim, Shim, Suntae Kim, Jaehoon Lee, Insook Cho, Yoon Kim
{"title":"Implementation of Guideline-Based CDSS","authors":"Jeong Ah Kim, Shim, Suntae Kim, Jaehoon Lee, Insook Cho, Yoon Kim","doi":"10.1109/UCMA.2011.29","DOIUrl":"https://doi.org/10.1109/UCMA.2011.29","url":null,"abstract":"We present architecture for implementing independent, extensible, and interoperable clinical decision support service based on guideline-based clinical knowledge. In our architecture knowledge engine is critical component for implementing knowledge service. SAGE is very powerful knowledge representation for guideline modeling and well-defined knowledge framework to integrate with terminology standard and EMR databases. Therefore, SAGE can be powerful tool for knowledge authoring for clinicians but guideline execution engine is not available yet. In this paper, we suggested interoperable CDSS (clinical decision support system) architecture and knowledge engine architecture.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123650195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identification of Abnormal Masses in Digital Mammography Images 数字乳房x线摄影图像中异常肿块的识别
S. Bandyopadhyay, I. Maitra, Tai-hoon Kim
{"title":"Identification of Abnormal Masses in Digital Mammography Images","authors":"S. Bandyopadhyay, I. Maitra, Tai-hoon Kim","doi":"10.1109/UCMA.2011.16","DOIUrl":"https://doi.org/10.1109/UCMA.2011.16","url":null,"abstract":"Mammography is at present one of the available method for early detection of masses or abnormalities which is related to breast cancer. The most common said abnormalities that may indicate breast cancer are masses and calcifications. The challenge is to early and accurately detect to overcome the development of breast cancer, which affects more and more women throughout the world. Masses appear in a mammogram as fine, granular clusters, which are often difficult to identify in a raw mammogram. Digital mammogram is one of the best technologies currently being used for diagnosing breast cancer. Breast cancer is diagnosed at advanced stages with the help of the digital mammogram image. In the paper a method have been develop to make a supporting tool to easy and less time consuming of identification of abnormal masses in digital mammography images. The identification technique is divided into two distinct parts i.e. Formation of Homogeneous Blocks and Color Quantization after preprocessing. The type of masses, orientation of masses, shape and distribution of masses, size of masses, position of masses, density of masses, symmetry between two pair etc are clearly sited after proposed method is executed on raw mammogram for easy and early detection abnormality.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129086507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Implement of Integrated Solution for Zoos Using RFID/USN Based LBS Technology 基于RFID/USN的动物园LBS集成解决方案的实现
Jaeyeun Kim, Young-Gu Lee, Kwang-Hyong Lee, Moon-seog Jun
{"title":"Implement of Integrated Solution for Zoos Using RFID/USN Based LBS Technology","authors":"Jaeyeun Kim, Young-Gu Lee, Kwang-Hyong Lee, Moon-seog Jun","doi":"10.1109/UCMA.2011.22","DOIUrl":"https://doi.org/10.1109/UCMA.2011.22","url":null,"abstract":"In addition to the diffusion of internet, the advancements in information communication technology have continued with the appearances of numerous new technologies and supply of new services. Ubiquitous computing has also been developed based on such technologies and is the most representative information communication technology that has been developed. The wireless communication technology of ubiquitous computing does not only provide useful services in industries but also in various environments including households, schools and hospitals. This paper suggests the system that accurately confirms the location of the moving body by fusing the communications network and USN based RFID and based on that provides various services. Based on the location confirmation of the moving body, the various service systems are being developed and provided in hospitals, ports and distribution centers and this paper proposes the integrated service system for zoos and theme parks. The sensor with its distinct ID is attached to children, who are the major subjects for protection in zoos and theme parks, to search the proximity contents with the location information gained through the RFID receiver located in the elements throughout the zoo and output the searched contents through the output device. Moreover, the current location information and course of the moving body is used to provide services to protect children from getting lost. Along with the supply of education contents suited to the situation of the moving body, the specialized integrated service is materialized to take measures when children get lost in zoos.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132246880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mobile Information Centre -- An Approach to Fast Handoff 移动信息中心——一种快速切换的方法
K. Bose, K. Hari
{"title":"Mobile Information Centre -- An Approach to Fast Handoff","authors":"K. Bose, K. Hari","doi":"10.1109/UCMA.2011.21","DOIUrl":"https://doi.org/10.1109/UCMA.2011.21","url":null,"abstract":"In 802.11 based wireless networks, the mobile nodes (MN) are associated with the available Access Points (APs) and communicate through them. In conventional handoff schemes, the mobile nodes receives the information regarding active APs in their neighbourhood by scanning the available channels and listen to transmitted beacons. In this paper a new handoff agent, specifically designed to reduce authentication delay during handoff, is introduced to enhance handoff speed.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134057726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Location Based Service Using 2.45GHz Active Tag 使用2.45GHz有源标签的基于位置的服务
Jae-Hwe You, Young-Gu Lee, Moon-seog Jun
{"title":"Location Based Service Using 2.45GHz Active Tag","authors":"Jae-Hwe You, Young-Gu Lee, Moon-seog Jun","doi":"10.1109/UCMA.2011.14","DOIUrl":"https://doi.org/10.1109/UCMA.2011.14","url":null,"abstract":"In this thesis, the future-oriented system using RFID technology was developed for figure out the number of people following by the guide promptly and effectively every time location changes. By having the tourists carry RFID tag, the group leader can check the number of the tourists by collecting the information on surrounding tags real-time through PDA with attached RFID reader. To make this feasible, the RFID based location check for the group members were made possible. To examine the safety of the proposed system, the directionality of antenna was tested. The result showed that the presence of the followers can be easily checked using the reader, processing the signals from the active tag, it could overcome the limitations of the location which the existing the prevention of lost children system in theme parks.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127619747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Based Public Key Method for Steganography 基于网络的隐写公钥方法
S. Bandyopadhyay, Tai-hoon Kim, S. Parui
{"title":"Network Based Public Key Method for Steganography","authors":"S. Bandyopadhyay, Tai-hoon Kim, S. Parui","doi":"10.1109/UCMA.2011.19","DOIUrl":"https://doi.org/10.1109/UCMA.2011.19","url":null,"abstract":"Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be apparent to an observer. The original steganographic applications used \"null ciphers\", or clear text. A null cipher conveys that the message has not been encrypted in any way, whether it is using basic character shifting, substitution or advanced modern day encryption algorithm. So, the message is often in plain view but for a reason can either not be detected as being present or cannot be seen once detected. As is common with cryptography, steganography has its roots in military and government applications and has advanced in ingenuity and complexity. In this paper, Network Based Public Key Method for Steganography is proposed under RSA cryptographic assumptions.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123673310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Relation between UML Models UML模型之间的关系
R. Jung, Jeong Ah Kim
{"title":"Relation between UML Models","authors":"R. Jung, Jeong Ah Kim","doi":"10.1109/UCMA.2011.30","DOIUrl":"https://doi.org/10.1109/UCMA.2011.30","url":null,"abstract":"There are different diagram models that use Unified Modeling Language (UML.) Those diagrams that express UML models are interconnected and provide the basic foundation for traceability of numerous documents generated in regard with development projects. A diagram may express various models in different levels of abstraction and there may also be a relationship between documents needed for requirement identification, analysis and design processes. It is important to understand the semantic relationship between models as well as simple syntactical relations since relationships are very useful to identify modeling elements during the modeling process. This study is focused on parts that are important to achieve the goal to improve modeling capabilities.","PeriodicalId":172729,"journal":{"name":"2011 International Conference on Ubiquitous Computing and Multimedia Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127718621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信