2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)最新文献

筛选
英文 中文
Proxy Based Resource Management Scheme in IoT Environment 物联网环境下基于代理的资源管理方案
Daewon Lee, Kangbin Yim, Hwa-Min Lee
{"title":"Proxy Based Resource Management Scheme in IoT Environment","authors":"Daewon Lee, Kangbin Yim, Hwa-Min Lee","doi":"10.1109/BWCCA.2015.28","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.28","url":null,"abstract":"By the improvement of IoT devices and Internet techniques, the environmental change has occurred. In this paper, we are focused on mobility management at IoT environment. We tried to solve a major problem of IoT environment: There are too many IoT device/sensor devices that move irregular or group movement. And they keep updating its current point of attachment and gathered data to their home and corresponding cloud server. To overcome frequently occurred routing problem and minimize cost, we proposed mobility management scheme using PMIPv6. First of all, we extend router advertisement message whether SR supports our proposed scheme, Secondly, to reduce registration cost, we used domain based architecture. We also added heuristic that takes into account real world mobile environment. By numerical analysis, we shows proposed scheme reduces signaling overheads than PMIPv6 protocol.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121466574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Enterprise Personnel Management System Based on B/S Design 基于B/S设计的企业人事管理系统
Xue Zhang
{"title":"The Enterprise Personnel Management System Based on B/S Design","authors":"Xue Zhang","doi":"10.1109/BWCCA.2015.43","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.43","url":null,"abstract":"This B/S structure is refers to the Browse/Server (browser/Server) structure model, the main is discussed in this paper based on B/S structure of the characteristics of knowledge management system and the practical design ideas and implementation principle of the personnel management system, to satisfy the geographically dispersed, communication medium factors such as inconvenience, at the same time, it can help leaders at all levels to management work standardization, efficient.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132308080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tibetan Sentence Sentiment Analysis Based on the Maximum Entropy Model 基于最大熵模型的藏文句子情感分析
Xiaodong Yan, Tao Huang
{"title":"Tibetan Sentence Sentiment Analysis Based on the Maximum Entropy Model","authors":"Xiaodong Yan, Tao Huang","doi":"10.1109/BWCCA.2015.32","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.32","url":null,"abstract":"In this paper, the Tibetan sentence sentiment analysis is done by learning from the Chinese and English sentiment analysis based on statistical method. We established the Tibetan sentence sentiment analysis system based on the maximum entropy model, and we test this system. Results show that the evaluation parameter is good and it can achieve practicability to some extent.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134432173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Cooperative Spectrum Sensing in Cognitive Radio Networks Using Hidden Markov Model 基于隐马尔可夫模型的认知无线电网络协同频谱感知
Jyu-Wei Wang
{"title":"Cooperative Spectrum Sensing in Cognitive Radio Networks Using Hidden Markov Model","authors":"Jyu-Wei Wang","doi":"10.1109/BWCCA.2015.45","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.45","url":null,"abstract":"We study the cooperative spectrum sensing in cognitive radio networks using hidden Markov model (HMM) for opportunistic spectrum access (OSA). We assume that the primary channel is operating in a TDMA manner. Thus, the spectrum sensing is operating in a slot-by-slot basis. A HMM is used for studying the cooperative spectrum sensing. In contrast to the conventional Bayesian update using only one observation in update, in this work, we propose to perform a recursive update with the observations from all the secondary users (SUs). In the proposed HMM scheme, a predefined threshold on the belief is used for determining the channel activity. With the threshold, the proposed HMM scheme is more flexible in the system operation than the simple majority vote scheme, in which no such threshold is available. We compare, by simulations, the performance of the proposed HMM scheme to that of the majority vote scheme and show that the probabilities of correctly detecting a busy state and an idle state are about 1 as the number of SUs is as large as 15, so the effects of further increase in the number of SUs are limited.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114328958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Energy Balanced Interference Aware Energy Efficient Depth Base Routing Protocol for UWSNs 面向uwsn的能量平衡干扰感知高效深度基路由协议
Hammad Maqsood, N. Javaid, Muhammad Zain-ul-Abidin, Mudassir Ejaz, Muhammad, Usman Shakeel
{"title":"Energy Balanced Interference Aware Energy Efficient Depth Base Routing Protocol for UWSNs","authors":"Hammad Maqsood, N. Javaid, Muhammad Zain-ul-Abidin, Mudassir Ejaz, Muhammad, Usman Shakeel","doi":"10.1109/BWCCA.2015.85","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.85","url":null,"abstract":"From few past years, researchers are attracted towards the unexplored region of earth due to is extreme usefulness and that region is water. As we know 70 % of earth surface is water and only 30 % is land that is already explored well. Due to the presence of useful resources in acoustic environment, researchers felt the need to explore the unexplored world of water. In order to explore the acoustic environment, many Underwater Wireless Sensor Network (UWSNs) routing protocols are already proposed. In UWSNs, small sensing nodes are deployed to monitor the desired area and mostly sinks (to gather information from nodes) are deployed on top of the water surface. But the sensing nodes in UWSNs posses limited battery for its operation. Due to harsh environmental conditions of acoustic life, it is impossible to replace or recharge the battery of nodes. Hence, energy is the main constraint in UWSNs. For this purpose, many energy efficient routing protocols are proposed, but it cannot completely solve the issue. In this paper we have proposed the energy balanced and interference avoidance technique due to which the network lifetime and through put increases. In EB-IAEEDBR we introduce the concept of energy balancing. The initial energy of all the nodes is divided into energy chunks, when the energy garde falls it informs its neighbor node about energy degradation by broadcasting the control packet. The node on receiving the control packet changes its transmission mode from multi hop to direct transmission mode as initially nodes are on multi-hop transmission mode. By this mechanism, energy consumption of node is evenly distributed in the entire network, results in better network lifetime, throughput and efficient energy consumption of nodes.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126008428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and Implementation of an Omnidirectional Wheelchair for Playing Badminton 羽毛球全向轮椅的设计与实现
Keita Matsuo, L. Barolli
{"title":"Design and Implementation of an Omnidirectional Wheelchair for Playing Badminton","authors":"Keita Matsuo, L. Barolli","doi":"10.1109/BWCCA.2015.99","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.99","url":null,"abstract":"The wheelchair with good performance for the aged and disabled is attracting attention from the society. Also, the wheelchair can provide the user with many benefits, such as maintaining mobility, continuing or broadening community and social activities, conserving strength and energy, and enhancing quality of life. The wheelchair body must be compact enough and should be able to make different movements in order to have many applications. In this paper, we present the design and implementation of an omnidirectional wheelchair for playing badminton. Finally, we discuss some implementation and application issues.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126110910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Threats to the Platform Identification 平台安全威胁识别
Kyungroul Lee, Hyeungjun Yeuk, Habin Lim, Kangbin Yim
{"title":"Security Threats to the Platform Identification","authors":"Kyungroul Lee, Hyeungjun Yeuk, Habin Lim, Kangbin Yim","doi":"10.1109/BWCCA.2015.102","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.102","url":null,"abstract":"In this paper, we analyze security threats against the services that limits allowance only to the registered platforms for their users, of which core technology is called designated platform solution and it has been deployed in several critical services such as on-line banking, financial transactions and so on. In this paper, we classify potential security threats against this solution into four different areas, process, network layer, software module, and terminal environment. Then, we analyze the security threats by deriving the practical vulnerabilities in each area. The results from this work will be helpful for defining new criteria to improve the security level of the services based on the designated platform solution.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129928886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Encrypted Image Search in Mobile Cloud Computing 移动云计算中的安全加密图像搜索
Qin Zou, Jianfeng Wang, Xiaofeng Chen
{"title":"Secure Encrypted Image Search in Mobile Cloud Computing","authors":"Qin Zou, Jianfeng Wang, Xiaofeng Chen","doi":"10.1109/BWCCA.2015.41","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.41","url":null,"abstract":"Mobile could computing is an area of cloud computing which considers resource constrained devices. Therefore there naturally appears a new design goal which is efficiency of mobile client applications. In this paper we consider encrypted image search schemes. In particular, we design a scheme for which distances between encrypted images are close to distances between images in plaintexts, which allows for more efficient search mechanisms. At the same time, this scheme can ensure privacy of image content. Previous solutions achieve this goal by exploiting homomorphic encryption schemes, which are far to inefficient and hard to realize on the resource constrained mobile devices. In this paper, we introduce a novel encryption search scheme for CBIR (Content-Based Image Retrieval) by using comparable encryption. Our scheme greatly reduces the amount of computation on the client side, and improves the distance consistency and precision of fuzzy search, compared to previous solutions.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130464774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Simulation System Based on ONE and SUMO Simulators: Performance Evaluation of First Contact, Prophet and Spray-and-Wait DTN Protocols 基于ONE和SUMO模拟器的仿真系统:首次接触、预测和喷雾等待DTN协议的性能评估
I. Shinko, Tetsuya Oda, Evjola Spaho, Vladi Koliçi, Makoto Ikeda, L. Barolli
{"title":"A Simulation System Based on ONE and SUMO Simulators: Performance Evaluation of First Contact, Prophet and Spray-and-Wait DTN Protocols","authors":"I. Shinko, Tetsuya Oda, Evjola Spaho, Vladi Koliçi, Makoto Ikeda, L. Barolli","doi":"10.1109/BWCCA.2015.60","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.60","url":null,"abstract":"In this paper, we investigate the performance of First Contact, Prophet and Spray-and-Wait protocols in a Vehicular Delay Tolerant Network (VDTN) crossroad scenario. The mobility patterns of vehicles are generated by means of SUMO (Simulation of Urban MObility) and as communication protocol simulator is used ONE (Opportunistic Network Environment). For the simulations, we used IEEE 802.11p standard and TwoRayGround Propagation Loss Model. We use Packet Delivery Ratio (PDR), Relay Delivery Ratio (RDR), hop count and delay as evaluation metrics. We compared the performance of three protocols and the simulation results show that for PDR the Prophet protocol has better performance than other protocols. Considering RDR, the performance of First Contact and Spray-and-Wait protocols is better than Prophet protocol. For hop count, the performance of Spray-and-Wait protocol is better than other protocols. While for delay, the performance of Prophet protocol is better than other protocols.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126663861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security Based Cyber-Physical Architecture for Environment Protection 基于安全的信息物理环境保护体系结构
M. Durresi, A. Durresi
{"title":"Security Based Cyber-Physical Architecture for Environment Protection","authors":"M. Durresi, A. Durresi","doi":"10.1109/BWCCA.2015.66","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.66","url":null,"abstract":"We propose a Security based Cyber-Physical Architecture for Environment Protection (SCPAEP). Protecting the environment from many threats has become a priority worldwide. The existing sensor technologies enable the continuous monitoring of various environments parameters, such as air quality, waters, and many others. In this paper we propose a general Cyber-Physical architecture, tailored for environment protection, based on cellular networks to collect such sensors' information in real time. The cell phones can interact with the cellular network and the sensor networks at the same time. This unique ability can be leveraged to provide better authentication and security. We propose an architecture for these networks along with protocols that can be used to establish security.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134058605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信