2010 Second International Conference on Future Networks最新文献

筛选
英文 中文
Digital DC Resistance Tester 数字直流电阻测试仪
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.54
Tieyuan Chang, Jingjing Zhang, Wenjun Chen
{"title":"Digital DC Resistance Tester","authors":"Tieyuan Chang, Jingjing Zhang, Wenjun Chen","doi":"10.1109/ICFN.2010.54","DOIUrl":"https://doi.org/10.1109/ICFN.2010.54","url":null,"abstract":"This test method adopted the method of four-wire test to eliminate the influence of the lead resistance and the contact resistance effectively. And design the automatically selects the range of the circuit to measure the values of different resistance. We use two A/D converters to enlarge the values of voltage and current at the same time, and using software programming to realize the processing and displaying of the data.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130282339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Congestion Control Strategy in Delay Tolerant Networks 延迟容忍网络中一种新的拥塞控制策略
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.49
Li Yun, C. Xinjian, Liu Qilie, Y. Xiaohu
{"title":"A Novel Congestion Control Strategy in Delay Tolerant Networks","authors":"Li Yun, C. Xinjian, Liu Qilie, Y. Xiaohu","doi":"10.1109/ICFN.2010.49","DOIUrl":"https://doi.org/10.1109/ICFN.2010.49","url":null,"abstract":"Delay-Tolerant Networks(DTN) are wireless networks where disconnections may occur frequently due to node mobility, power outages and propagation phenomena. In order to achieve data delivery, store-and-forward protocols are used in DTN and routing protocols based on epidemic message dissemination has been proposed, such as Epidemic routing. Under Epidemic routing, packets can be completely delivered between any two nodes if each node buffer is big enough and the communication time is long enough after one node contacts another one. But congestion will occur easily at one node if the buffer of this node is limited under epidemic routing in DTN. In order to solve this problem, a novel congestion control strategy called average forwarding number based on epidemic routing(AFNER) has been proposed based on epidemic routing protocols. Using simulations based on a random waypoint model, the results show the improvement of AFNER congestion control strategy.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127794367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
A Methodology for the Deployment of Consistent Hashing 一致性哈希的部署方法
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.62
Wang Jun
{"title":"A Methodology for the Deployment of Consistent Hashing","authors":"Wang Jun","doi":"10.1109/ICFN.2010.62","DOIUrl":"https://doi.org/10.1109/ICFN.2010.62","url":null,"abstract":"As well known, the courseware must work effectively. Given the current status of omniscient communication, cryptographers shockingly desire the unproven unification of redundancy and object-oriented languages, which embodies the confusing principles of metamorphic machine learning. In order to address this issue, we prove not only that erasure coding and Lamport clocks are rarely incompatible, but that the same is true for architecture in the system design.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115812609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Designs of PBB Interoperating with H-VPLS Based on MPLS Networks 基于MPLS网络的PBB与H-VPLS互操作设计
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.35
Weijia Zhu
{"title":"Designs of PBB Interoperating with H-VPLS Based on MPLS Networks","authors":"Weijia Zhu","doi":"10.1109/ICFN.2010.35","DOIUrl":"https://doi.org/10.1109/ICFN.2010.35","url":null,"abstract":"This paper first presents a brief overview of the PBB and the H-VPLS technologies, along with the shortcomings of existing H-VPLS, and then designs the solutions by deploying PBB interoperating with H-VPLS over networks with a MPLS core, which improve the standard H-VPLS.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132123799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Logic-Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks 基于模糊逻辑的无线传感器网络分布式节点耗尽攻击检测决策
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.73
Z. Baig, S. Khan
{"title":"Fuzzy Logic-Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks","authors":"Z. Baig, S. Khan","doi":"10.1109/ICFN.2010.73","DOIUrl":"https://doi.org/10.1109/ICFN.2010.73","url":null,"abstract":"Recent advances in the field of wireless networks have entailed collateral growth in the number of possible malicious attacks against them. A significant amount of work has been done towards ensuring security of a class of such networks, namely, Wireless Sensor Networks. Considering the untrusted environments of operations of such networks, the threat of distributed attacks against constrained resources i.e. sensor power, computation and communication capabilities cannot be overlooked. In [1], we modeled a class of attack called a distributed denial of service attack in such networks, and proposed a pattern-based scheme to detect such attacks. The limitation of this proposed scheme was on the lack of a tradeoff mechanism between improved performance of the detection scheme (higher detection rates) and corresponding increase in the use of the energy resources of the sensor nodes participating in the detection process. In this paper, we propose a fuzzy logic-based approach towards achieving demarkation in the values of specific parameters of the detection scheme, so as to ascertain a reasonable tradeoff between attack detection and node energy utilization. Simulation results depict the use of a fuzzy-based approach for addressing the energy-detection rate tradeoff problem effectively.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131398368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
The Theory and Empirical Research of Value-added Positioning Based on Relational Value 基于关系价值的增值定位理论与实证研究
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.100
Jingdong Chen, Xiaoqian Gao
{"title":"The Theory and Empirical Research of Value-added Positioning Based on Relational Value","authors":"Jingdong Chen, Xiaoqian Gao","doi":"10.1109/ICFN.2010.100","DOIUrl":"https://doi.org/10.1109/ICFN.2010.100","url":null,"abstract":"The mutual benefit position between business and its relation is to meet people's needs in the industrial age, while the coming of the commercial era resulted in the value-added location based on relational value into the purpose of people's pursuit.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115197492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Computing Research and Development Trend 云计算研究与发展趋势
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.58
Shuai Zhang, Shufen Zhang, Xuebin Chen, Xiuzhen Huo
{"title":"Cloud Computing Research and Development Trend","authors":"Shuai Zhang, Shufen Zhang, Xuebin Chen, Xiuzhen Huo","doi":"10.1109/ICFN.2010.58","DOIUrl":"https://doi.org/10.1109/ICFN.2010.58","url":null,"abstract":"With the development of parallel computing, distributed computing, grid computing, a new computing model appeared. The concept of computing comes from grid, public computing and SaaS. It is a new method that shares basic framework. The basic principles of cloud computing is to make the computing be assigned in a great number of distributed computers, rather then local computer or remoter server. The running of the enterprise’s data center is just like Internet. This makes the enterprise use the resource in the application that is needed, and access computer and storage system according to the requirement. This article introduces the background and principle of cloud computing, the character, style and actuality. This article also introduces the application field the merit of cloud computing, such as, it do not need user’s high level equipment, so it reduces the user’s cost. It provides secure and dependable data storage center, so user needn’t do the awful things such storing data and killing virus, this kind of task can be done by professionals. It can realize data share through different equipments. It analyses some questions and hidden troubles, and puts forward some solutions, and discusses the future of cloud computing. Cloud computing is a computing style that provide power referenced with IT as a service. Users can enjoy the service even he knows nothing about the technology of cloud computing and the professional knowledge in this field and the power to control it.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115369901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 517
Improvement of Decision Making Protocol for Duty Cycle Division Multiplexing (DCDM) System DCDM系统决策协议的改进
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.52
M. N. Derahman, K. Dimyati, A. M. Mohammadi, M. Abdullah
{"title":"Improvement of Decision Making Protocol for Duty Cycle Division Multiplexing (DCDM) System","authors":"M. N. Derahman, K. Dimyati, A. M. Mohammadi, M. Abdullah","doi":"10.1109/ICFN.2010.52","DOIUrl":"https://doi.org/10.1109/ICFN.2010.52","url":null,"abstract":"Duty Cycle Division Multiplexing (DCDM) hasbeen shown to be able to improve utilization of the optical bandwidth. However, the challenge arises on its signal recoveryat the receiver ends. Decision making protocol plays an important role to determine the correctness of its regenerated data. Previous approach regenerate inaccurate data due to its assumption that all received signals are valid. Thus, the automatic mapping is used in their decision process with no consideration on invalid signals. Due to this motivation, we design a new signal recovery protocol for DCDM. In this protocol, the signal properties such as amplitude level, distance between slots, number of slot change and probabilities of occurrence are used in order to discriminate the received signal into an appropriate data. The simulation is established through OptiSystem simulator and Matlab programming. It is observed that an improvement of the BER by 16.2 percent can be achieved using the new proposed protocol.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"69 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114113231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal Tweakable Blockcipher Based on Dual MISTY-Type Structure 基于双misty型结构的最优可调加密算法
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.21
Fengtong Wen, Lizi Yin
{"title":"Optimal Tweakable Blockcipher Based on Dual MISTY-Type Structure","authors":"Fengtong Wen, Lizi Yin","doi":"10.1109/ICFN.2010.21","DOIUrl":"https://doi.org/10.1109/ICFN.2010.21","url":null,"abstract":"In this paper, on the basis of four round Dual MISTY-Type transformations, we give a method to solve an open problem about tweakable blockcipher proposed by Liskov et al. The problem is how to construct tweakable blockciphers without using a pre-existing blockcipher. We show that tweakable blockcipher can be created directly from dual MISTY-Type structure. Concretely, we built and analyze an optimal four round tweakable dual MISTY-Type transformation which use the XOR-universal permutation to replace some round pseudo random permutation and reduce the number of the pseudorandom permutation by using some permutation repeatedly.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116598333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experimental Study on RFID Performance Factors of Conveyor Belt System Using DOE Methodology 基于DOE方法的输送带系统RFID性能影响因素实验研究
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.89
Xing-zhou Wang, Dong Wang
{"title":"Experimental Study on RFID Performance Factors of Conveyor Belt System Using DOE Methodology","authors":"Xing-zhou Wang, Dong Wang","doi":"10.1109/ICFN.2010.89","DOIUrl":"https://doi.org/10.1109/ICFN.2010.89","url":null,"abstract":"This paper investigates how the performance factors affect RFID (Radio Frequency Identification) system performance. We focus on the following parameters: tag placement, angle of reader antenna and conveyor speed. We use commercial RFID reader and tags in experiments and DOE methodology to access the effect of different factors. Experiment result shows that tag placement, angle of reader antenna and the interaction between them have main effect on read performance. Specifically, we find that it’s not true that the slower conveyor moves, the higher read rate gets. Moreover, when we set the angle of reader antenna at 15 degrees, we get maximum average read rate overall.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128816980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信