{"title":"An Intelligent Learning Approach for Information Hiding in 3D Multimedia","authors":"R. Motwani, M. Motwani, Frederick C. Harris, Jr.","doi":"10.1109/ICFN.2010.104","DOIUrl":"https://doi.org/10.1109/ICFN.2010.104","url":null,"abstract":"This paper presents a new watermarking algorithm for 3D triangular mesh models that is based on surface curvature estimation and supervised learning. A feedforward backpropagation neural network is adopted for selecting vertices for watermark insertion. A variety of 3D models with varying degrees of surface curvature are used to train and simulate the neural network. An array of neural networks is used for vertices with different valences to achieve higher watermark embedding capacity. A gray scale bitmap image is used as the watermark. The watermark extraction process is informed and needs the original watermark and 3D model. Experimental results evaluate the embedding capacity, imperceptibility and robustness of the proposed algorithm and simulate various attacks including noise addition, smoothing and cropping.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128487561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of Vulnerabilities in Identity Management Using Biometrics","authors":"Fathimath Sabena, A. Dehghantanha, Andy Seddon","doi":"10.1109/ICFN.2010.79","DOIUrl":"https://doi.org/10.1109/ICFN.2010.79","url":null,"abstract":"Although in a number of civilian applications biometric systems have been effectively deployed the current biometric systems are not flawless. For an ID Management system consistent person recognition is an intrinsic component. By distinguishing individuals based on their physiological and/or behavioral characteristics that are innate to the person, Biometrics proposes a natural and dependable solution to the difficulty of identity determination. In this paper various obstacles that prevent biometric systems from achieving foolproof automatic person recognition are represented, some problems faced by single modal biometric systems are explained and vulnerabilities of biometrics systems are discussed with on how to safeguard them from some ordinary attacks","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131419527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qiu Qinlong, Chen Jian, Ping Ling-di, Pan Xue-zeng
{"title":"Hierarchy Virtual Queue Based Flow Control in LTE/SAE","authors":"Qiu Qinlong, Chen Jian, Ping Ling-di, Pan Xue-zeng","doi":"10.1109/ICFN.2010.8","DOIUrl":"https://doi.org/10.1109/ICFN.2010.8","url":null,"abstract":"One of the key targets for LTE/SAE is 100Mbps peak data rate in downlink. While compared to the lined data rate, the wireless data rate is still a bottleneck. This means if there is no flow control in aGW; packets will be buffered in eNB. While the buffer in eNB is limited, packets may be dropped. To reduce the harm to the performance of the TCP based application from packet loss, flow control is needed. There are huge amount of flows in one eNB and the rate varies from 10kbps to 100Mbps. In addition, the radio channel has the time-varying nature. All of them produce the challenge to the flow control of LTE/SAE. This paper proposes the hierarchy virtual queue (HVQ) based flow control mechanism to solve the problems. Simulation results show HVQ flow control requires fewer resources but produces better system performance.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125301493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Dynamic Spectrum Hole Sensing Scheme","authors":"Yingtao Niu, F. Yao, Jianzhong Chen, Y. Cheng","doi":"10.1109/ICFN.2010.33","DOIUrl":"https://doi.org/10.1109/ICFN.2010.33","url":null,"abstract":"A novel dynamic spectrum hole sensing scheme is developed for the chirp signal. A narrow band energy detector combined with frequency scanner is used for achievement of the basic spectrum occupied scene. The Kalman filter predicts the instantaneous frequency and energy of chirp signal. Based on the predict results, the CR user can exploit the spectrum hole of chirp signal and coexist with chirp signal system. Simulation results show that the narrow band energy detection combined with frequency scanner can sense the primary signal scene coarsely which is enough for judgment the subchannel's occupancy. Meanwhile, the Kalman filter can predict the chirp signal's parameter precisely.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126627642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Safal Shrestha, Dong Seong Kim, Seulki Lee, Jong Sou Park
{"title":"A Peer-to-Peer RFID Resolution Framework for Supply Chain Network","authors":"Safal Shrestha, Dong Seong Kim, Seulki Lee, Jong Sou Park","doi":"10.1109/ICFN.2010.98","DOIUrl":"https://doi.org/10.1109/ICFN.2010.98","url":null,"abstract":"In a supply chain network, having up-to-date and prompt information is very crucial for minimizing, the bullwhip effect, inventory cost, out of stocks and time/cost of information sharing. Supply chain management is highly involved and complex process involving collaboration and information sharing between distributed partners. With the advent of RFID and new internet technologies, supply chain management process has been significantly streamlined. However, one of the major challenges in RFID based supply chain management is resolving the data stored in the RFID tags to the actual location of the data in the network. In this paper we evaluate several established techniques of RFID resolution in supply chain network and then propose a simple, yet novel approach for resolving RFID code to the actual data on the distributed supply chain network. The proposed approach is based on peer-to-peer (P2P) network, where each participant of supply chain is a node in the P2P network. These nodes form a structured P2P overlay network with each node having a partial view of other nodes. These nodes then act collaboratively in resolving RFID data and sharing business information.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124049496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Social Networking Services System Based on the “Six Degrees of Separation” Theory and Damping Factors","authors":"Xiaohua Ke","doi":"10.1109/ICFN.2010.22","DOIUrl":"https://doi.org/10.1109/ICFN.2010.22","url":null,"abstract":"In the 1960s, a mathematical conjecture was brought forward with the name \"Six Degrees of Separation\" and indicated that the gap between any two people was not more than 6. It was widely used in the field of sociology and came under more and more attention. However, with the help of the Internet, people are becoming connected than ever and the social networking is expanding well beyond previous limits and barriers. We established an instant message system to provide online-chatting services for people so as to collect their social relationship information and calculate the lastest \"degrees\" nowadays. The routing algorithm and damping factors were applied to the system so as to get satisfactory resluts while optimizing the theory's validation and increasing its credibility.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124255687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive FAST TCP","authors":"He-ying Zhang, Xunying Zhang, Baohua Fan, Li-Song Shao","doi":"10.1109/ICFN.2010.43","DOIUrl":"https://doi.org/10.1109/ICFN.2010.43","url":null,"abstract":"FAST TCP is a new transmission control protocol proposed for future high bandwidth-delay product networks. The stability and performance analysis of FAST TCP is an active research area. Researches show that the performance of FAST TCP, such as throughput, packet drop rate, link utilization, is sensitive to the setting of alpha , which is one of the key parameter for FAST TCP. To eliminate the sensitivity, an adaptive FAST TCP algorithm named AFAST TCP is proposed, which can adjust the value of alpha according to the difference between current estimated queuing delay of the buffer in router and the target queuing delay expected by the applications. As a result, the queuing delay can be controlled to a specific value. The analyses and simulation show that AFAST TCP performs better in networks with widely changing conditions and eliminates the dependence of performance on parameter setting effectively.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115017361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Satisfaction Based Resource Allocation for OFDMA Relay Networks in the Resource-constrained System","authors":"Benxu Wang, X. Wen, Dongming Su, Wei Zheng","doi":"10.1109/ICFN.2010.78","DOIUrl":"https://doi.org/10.1109/ICFN.2010.78","url":null,"abstract":"we consider the resource allocation problem in a resource-constrained system for OFDMA-based relay networks. In the resource-constrained system, our allocation strategy is based on economic aim to maximize the user satisfaction which means we can get the more profits. It is impossible to meet all the users’ data rate requirement in the resource-constrained system. So we divide the users into two classes: non realtime users and realtime users, and priority to satisfy the realtime users’ requirement, because of the realtime users have a more stringent QoS requirement. Meanwhile a new user satisfaction model is formulated based on the different user classes. The numerical results show that our proposed resource allocation scheme can significantly improve the user satisfaction compared with a normal resource allocation scheme.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115366088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Call Dropping Probability of Next Generation Wireless Cellular Networks with Mobile Relay Station","authors":"Rujing Zhao, X. Wen, Dongming Su, Wei Zheng","doi":"10.1007/978-3-642-19712-3_18","DOIUrl":"https://doi.org/10.1007/978-3-642-19712-3_18","url":null,"abstract":"","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129701949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fast Handover Scheme in IEEE802.16 Relay Networks","authors":"Li Yun, Wang Ying, Weiliang Zhao, X. You","doi":"10.1109/ICFN.2010.46","DOIUrl":"https://doi.org/10.1109/ICFN.2010.46","url":null,"abstract":"In wireless IEEE802.16-based relay networks, link layer handover requires more signaling interactions, and the signaling cost and processing delay will increase while using MIPv6 to relay networks. Aiming to this problem, we propose a fast handover scheme to apply FMIPv6 to 802.16j networks, which determines the cross-subnet handover in advance through the interaction of MAC layer messages. Our scheme can reduce the handover signaling cost and decrease handover delay.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125333974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}