{"title":"Proxy Based Resource Management Scheme in IoT Environment","authors":"Daewon Lee, Kangbin Yim, Hwa-Min Lee","doi":"10.1109/BWCCA.2015.28","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.28","url":null,"abstract":"By the improvement of IoT devices and Internet techniques, the environmental change has occurred. In this paper, we are focused on mobility management at IoT environment. We tried to solve a major problem of IoT environment: There are too many IoT device/sensor devices that move irregular or group movement. And they keep updating its current point of attachment and gathered data to their home and corresponding cloud server. To overcome frequently occurred routing problem and minimize cost, we proposed mobility management scheme using PMIPv6. First of all, we extend router advertisement message whether SR supports our proposed scheme, Secondly, to reduce registration cost, we used domain based architecture. We also added heuristic that takes into account real world mobile environment. By numerical analysis, we shows proposed scheme reduces signaling overheads than PMIPv6 protocol.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121466574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Enterprise Personnel Management System Based on B/S Design","authors":"Xue Zhang","doi":"10.1109/BWCCA.2015.43","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.43","url":null,"abstract":"This B/S structure is refers to the Browse/Server (browser/Server) structure model, the main is discussed in this paper based on B/S structure of the characteristics of knowledge management system and the practical design ideas and implementation principle of the personnel management system, to satisfy the geographically dispersed, communication medium factors such as inconvenience, at the same time, it can help leaders at all levels to management work standardization, efficient.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132308080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tibetan Sentence Sentiment Analysis Based on the Maximum Entropy Model","authors":"Xiaodong Yan, Tao Huang","doi":"10.1109/BWCCA.2015.32","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.32","url":null,"abstract":"In this paper, the Tibetan sentence sentiment analysis is done by learning from the Chinese and English sentiment analysis based on statistical method. We established the Tibetan sentence sentiment analysis system based on the maximum entropy model, and we test this system. Results show that the evaluation parameter is good and it can achieve practicability to some extent.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134432173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative Spectrum Sensing in Cognitive Radio Networks Using Hidden Markov Model","authors":"Jyu-Wei Wang","doi":"10.1109/BWCCA.2015.45","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.45","url":null,"abstract":"We study the cooperative spectrum sensing in cognitive radio networks using hidden Markov model (HMM) for opportunistic spectrum access (OSA). We assume that the primary channel is operating in a TDMA manner. Thus, the spectrum sensing is operating in a slot-by-slot basis. A HMM is used for studying the cooperative spectrum sensing. In contrast to the conventional Bayesian update using only one observation in update, in this work, we propose to perform a recursive update with the observations from all the secondary users (SUs). In the proposed HMM scheme, a predefined threshold on the belief is used for determining the channel activity. With the threshold, the proposed HMM scheme is more flexible in the system operation than the simple majority vote scheme, in which no such threshold is available. We compare, by simulations, the performance of the proposed HMM scheme to that of the majority vote scheme and show that the probabilities of correctly detecting a busy state and an idle state are about 1 as the number of SUs is as large as 15, so the effects of further increase in the number of SUs are limited.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114328958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hammad Maqsood, N. Javaid, Muhammad Zain-ul-Abidin, Mudassir Ejaz, Muhammad, Usman Shakeel
{"title":"Energy Balanced Interference Aware Energy Efficient Depth Base Routing Protocol for UWSNs","authors":"Hammad Maqsood, N. Javaid, Muhammad Zain-ul-Abidin, Mudassir Ejaz, Muhammad, Usman Shakeel","doi":"10.1109/BWCCA.2015.85","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.85","url":null,"abstract":"From few past years, researchers are attracted towards the unexplored region of earth due to is extreme usefulness and that region is water. As we know 70 % of earth surface is water and only 30 % is land that is already explored well. Due to the presence of useful resources in acoustic environment, researchers felt the need to explore the unexplored world of water. In order to explore the acoustic environment, many Underwater Wireless Sensor Network (UWSNs) routing protocols are already proposed. In UWSNs, small sensing nodes are deployed to monitor the desired area and mostly sinks (to gather information from nodes) are deployed on top of the water surface. But the sensing nodes in UWSNs posses limited battery for its operation. Due to harsh environmental conditions of acoustic life, it is impossible to replace or recharge the battery of nodes. Hence, energy is the main constraint in UWSNs. For this purpose, many energy efficient routing protocols are proposed, but it cannot completely solve the issue. In this paper we have proposed the energy balanced and interference avoidance technique due to which the network lifetime and through put increases. In EB-IAEEDBR we introduce the concept of energy balancing. The initial energy of all the nodes is divided into energy chunks, when the energy garde falls it informs its neighbor node about energy degradation by broadcasting the control packet. The node on receiving the control packet changes its transmission mode from multi hop to direct transmission mode as initially nodes are on multi-hop transmission mode. By this mechanism, energy consumption of node is evenly distributed in the entire network, results in better network lifetime, throughput and efficient energy consumption of nodes.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126008428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of an Omnidirectional Wheelchair for Playing Badminton","authors":"Keita Matsuo, L. Barolli","doi":"10.1109/BWCCA.2015.99","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.99","url":null,"abstract":"The wheelchair with good performance for the aged and disabled is attracting attention from the society. Also, the wheelchair can provide the user with many benefits, such as maintaining mobility, continuing or broadening community and social activities, conserving strength and energy, and enhancing quality of life. The wheelchair body must be compact enough and should be able to make different movements in order to have many applications. In this paper, we present the design and implementation of an omnidirectional wheelchair for playing badminton. Finally, we discuss some implementation and application issues.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126110910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Threats to the Platform Identification","authors":"Kyungroul Lee, Hyeungjun Yeuk, Habin Lim, Kangbin Yim","doi":"10.1109/BWCCA.2015.102","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.102","url":null,"abstract":"In this paper, we analyze security threats against the services that limits allowance only to the registered platforms for their users, of which core technology is called designated platform solution and it has been deployed in several critical services such as on-line banking, financial transactions and so on. In this paper, we classify potential security threats against this solution into four different areas, process, network layer, software module, and terminal environment. Then, we analyze the security threats by deriving the practical vulnerabilities in each area. The results from this work will be helpful for defining new criteria to improve the security level of the services based on the designated platform solution.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129928886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Encrypted Image Search in Mobile Cloud Computing","authors":"Qin Zou, Jianfeng Wang, Xiaofeng Chen","doi":"10.1109/BWCCA.2015.41","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.41","url":null,"abstract":"Mobile could computing is an area of cloud computing which considers resource constrained devices. Therefore there naturally appears a new design goal which is efficiency of mobile client applications. In this paper we consider encrypted image search schemes. In particular, we design a scheme for which distances between encrypted images are close to distances between images in plaintexts, which allows for more efficient search mechanisms. At the same time, this scheme can ensure privacy of image content. Previous solutions achieve this goal by exploiting homomorphic encryption schemes, which are far to inefficient and hard to realize on the resource constrained mobile devices. In this paper, we introduce a novel encryption search scheme for CBIR (Content-Based Image Retrieval) by using comparable encryption. Our scheme greatly reduces the amount of computation on the client side, and improves the distance consistency and precision of fuzzy search, compared to previous solutions.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130464774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Shinko, Tetsuya Oda, Evjola Spaho, Vladi Koliçi, Makoto Ikeda, L. Barolli
{"title":"A Simulation System Based on ONE and SUMO Simulators: Performance Evaluation of First Contact, Prophet and Spray-and-Wait DTN Protocols","authors":"I. Shinko, Tetsuya Oda, Evjola Spaho, Vladi Koliçi, Makoto Ikeda, L. Barolli","doi":"10.1109/BWCCA.2015.60","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.60","url":null,"abstract":"In this paper, we investigate the performance of First Contact, Prophet and Spray-and-Wait protocols in a Vehicular Delay Tolerant Network (VDTN) crossroad scenario. The mobility patterns of vehicles are generated by means of SUMO (Simulation of Urban MObility) and as communication protocol simulator is used ONE (Opportunistic Network Environment). For the simulations, we used IEEE 802.11p standard and TwoRayGround Propagation Loss Model. We use Packet Delivery Ratio (PDR), Relay Delivery Ratio (RDR), hop count and delay as evaluation metrics. We compared the performance of three protocols and the simulation results show that for PDR the Prophet protocol has better performance than other protocols. Considering RDR, the performance of First Contact and Spray-and-Wait protocols is better than Prophet protocol. For hop count, the performance of Spray-and-Wait protocol is better than other protocols. While for delay, the performance of Prophet protocol is better than other protocols.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126663861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Based Cyber-Physical Architecture for Environment Protection","authors":"M. Durresi, A. Durresi","doi":"10.1109/BWCCA.2015.66","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.66","url":null,"abstract":"We propose a Security based Cyber-Physical Architecture for Environment Protection (SCPAEP). Protecting the environment from many threats has become a priority worldwide. The existing sensor technologies enable the continuous monitoring of various environments parameters, such as air quality, waters, and many others. In this paper we propose a general Cyber-Physical architecture, tailored for environment protection, based on cellular networks to collect such sensors' information in real time. The cell phones can interact with the cellular network and the sensor networks at the same time. This unique ability can be leveraged to provide better authentication and security. We propose an architecture for these networks along with protocols that can be used to establish security.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134058605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}