{"title":"Digital DC Resistance Tester","authors":"Tieyuan Chang, Jingjing Zhang, Wenjun Chen","doi":"10.1109/ICFN.2010.54","DOIUrl":"https://doi.org/10.1109/ICFN.2010.54","url":null,"abstract":"This test method adopted the method of four-wire test to eliminate the influence of the lead resistance and the contact resistance effectively. And design the automatically selects the range of the circuit to measure the values of different resistance. We use two A/D converters to enlarge the values of voltage and current at the same time, and using software programming to realize the processing and displaying of the data.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130282339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Congestion Control Strategy in Delay Tolerant Networks","authors":"Li Yun, C. Xinjian, Liu Qilie, Y. Xiaohu","doi":"10.1109/ICFN.2010.49","DOIUrl":"https://doi.org/10.1109/ICFN.2010.49","url":null,"abstract":"Delay-Tolerant Networks(DTN) are wireless networks where disconnections may occur frequently due to node mobility, power outages and propagation phenomena. In order to achieve data delivery, store-and-forward protocols are used in DTN and routing protocols based on epidemic message dissemination has been proposed, such as Epidemic routing. Under Epidemic routing, packets can be completely delivered between any two nodes if each node buffer is big enough and the communication time is long enough after one node contacts another one. But congestion will occur easily at one node if the buffer of this node is limited under epidemic routing in DTN. In order to solve this problem, a novel congestion control strategy called average forwarding number based on epidemic routing(AFNER) has been proposed based on epidemic routing protocols. Using simulations based on a random waypoint model, the results show the improvement of AFNER congestion control strategy.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127794367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Methodology for the Deployment of Consistent Hashing","authors":"Wang Jun","doi":"10.1109/ICFN.2010.62","DOIUrl":"https://doi.org/10.1109/ICFN.2010.62","url":null,"abstract":"As well known, the courseware must work effectively. Given the current status of omniscient communication, cryptographers shockingly desire the unproven unification of redundancy and object-oriented languages, which embodies the confusing principles of metamorphic machine learning. In order to address this issue, we prove not only that erasure coding and Lamport clocks are rarely incompatible, but that the same is true for architecture in the system design.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115812609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designs of PBB Interoperating with H-VPLS Based on MPLS Networks","authors":"Weijia Zhu","doi":"10.1109/ICFN.2010.35","DOIUrl":"https://doi.org/10.1109/ICFN.2010.35","url":null,"abstract":"This paper first presents a brief overview of the PBB and the H-VPLS technologies, along with the shortcomings of existing H-VPLS, and then designs the solutions by deploying PBB interoperating with H-VPLS over networks with a MPLS core, which improve the standard H-VPLS.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132123799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Logic-Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks","authors":"Z. Baig, S. Khan","doi":"10.1109/ICFN.2010.73","DOIUrl":"https://doi.org/10.1109/ICFN.2010.73","url":null,"abstract":"Recent advances in the field of wireless networks have entailed collateral growth in the number of possible malicious attacks against them. A significant amount of work has been done towards ensuring security of a class of such networks, namely, Wireless Sensor Networks. Considering the untrusted environments of operations of such networks, the threat of distributed attacks against constrained resources i.e. sensor power, computation and communication capabilities cannot be overlooked. In [1], we modeled a class of attack called a distributed denial of service attack in such networks, and proposed a pattern-based scheme to detect such attacks. The limitation of this proposed scheme was on the lack of a tradeoff mechanism between improved performance of the detection scheme (higher detection rates) and corresponding increase in the use of the energy resources of the sensor nodes participating in the detection process. In this paper, we propose a fuzzy logic-based approach towards achieving demarkation in the values of specific parameters of the detection scheme, so as to ascertain a reasonable tradeoff between attack detection and node energy utilization. Simulation results depict the use of a fuzzy-based approach for addressing the energy-detection rate tradeoff problem effectively.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131398368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Theory and Empirical Research of Value-added Positioning Based on Relational Value","authors":"Jingdong Chen, Xiaoqian Gao","doi":"10.1109/ICFN.2010.100","DOIUrl":"https://doi.org/10.1109/ICFN.2010.100","url":null,"abstract":"The mutual benefit position between business and its relation is to meet people's needs in the industrial age, while the coming of the commercial era resulted in the value-added location based on relational value into the purpose of people's pursuit.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115197492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shuai Zhang, Shufen Zhang, Xuebin Chen, Xiuzhen Huo
{"title":"Cloud Computing Research and Development Trend","authors":"Shuai Zhang, Shufen Zhang, Xuebin Chen, Xiuzhen Huo","doi":"10.1109/ICFN.2010.58","DOIUrl":"https://doi.org/10.1109/ICFN.2010.58","url":null,"abstract":"With the development of parallel computing, distributed computing, grid computing, a new computing model appeared. The concept of computing comes from grid, public computing and SaaS. It is a new method that shares basic framework. The basic principles of cloud computing is to make the computing be assigned in a great number of distributed computers, rather then local computer or remoter server. The running of the enterprise’s data center is just like Internet. This makes the enterprise use the resource in the application that is needed, and access computer and storage system according to the requirement. This article introduces the background and principle of cloud computing, the character, style and actuality. This article also introduces the application field the merit of cloud computing, such as, it do not need user’s high level equipment, so it reduces the user’s cost. It provides secure and dependable data storage center, so user needn’t do the awful things such storing data and killing virus, this kind of task can be done by professionals. It can realize data share through different equipments. It analyses some questions and hidden troubles, and puts forward some solutions, and discusses the future of cloud computing. Cloud computing is a computing style that provide power referenced with IT as a service. Users can enjoy the service even he knows nothing about the technology of cloud computing and the professional knowledge in this field and the power to control it.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115369901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. N. Derahman, K. Dimyati, A. M. Mohammadi, M. Abdullah
{"title":"Improvement of Decision Making Protocol for Duty Cycle Division Multiplexing (DCDM) System","authors":"M. N. Derahman, K. Dimyati, A. M. Mohammadi, M. Abdullah","doi":"10.1109/ICFN.2010.52","DOIUrl":"https://doi.org/10.1109/ICFN.2010.52","url":null,"abstract":"Duty Cycle Division Multiplexing (DCDM) hasbeen shown to be able to improve utilization of the optical bandwidth. However, the challenge arises on its signal recoveryat the receiver ends. Decision making protocol plays an important role to determine the correctness of its regenerated data. Previous approach regenerate inaccurate data due to its assumption that all received signals are valid. Thus, the automatic mapping is used in their decision process with no consideration on invalid signals. Due to this motivation, we design a new signal recovery protocol for DCDM. In this protocol, the signal properties such as amplitude level, distance between slots, number of slot change and probabilities of occurrence are used in order to discriminate the received signal into an appropriate data. The simulation is established through OptiSystem simulator and Matlab programming. It is observed that an improvement of the BER by 16.2 percent can be achieved using the new proposed protocol.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"69 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114113231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Tweakable Blockcipher Based on Dual MISTY-Type Structure","authors":"Fengtong Wen, Lizi Yin","doi":"10.1109/ICFN.2010.21","DOIUrl":"https://doi.org/10.1109/ICFN.2010.21","url":null,"abstract":"In this paper, on the basis of four round Dual MISTY-Type transformations, we give a method to solve an open problem about tweakable blockcipher proposed by Liskov et al. The problem is how to construct tweakable blockciphers without using a pre-existing blockcipher. We show that tweakable blockcipher can be created directly from dual MISTY-Type structure. Concretely, we built and analyze an optimal four round tweakable dual MISTY-Type transformation which use the XOR-universal permutation to replace some round pseudo random permutation and reduce the number of the pseudorandom permutation by using some permutation repeatedly.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116598333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Study on RFID Performance Factors of Conveyor Belt System Using DOE Methodology","authors":"Xing-zhou Wang, Dong Wang","doi":"10.1109/ICFN.2010.89","DOIUrl":"https://doi.org/10.1109/ICFN.2010.89","url":null,"abstract":"This paper investigates how the performance factors affect RFID (Radio Frequency Identification) system performance. We focus on the following parameters: tag placement, angle of reader antenna and conveyor speed. We use commercial RFID reader and tags in experiments and DOE methodology to access the effect of different factors. Experiment result shows that tag placement, angle of reader antenna and the interaction between them have main effect on read performance. Specifically, we find that it’s not true that the slower conveyor moves, the higher read rate gets. Moreover, when we set the angle of reader antenna at 15 degrees, we get maximum average read rate overall.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128816980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}