2010 International Conference on Broadband, Wireless Computing, Communication and Applications最新文献

筛选
英文 中文
A Diagnosis Approach Based on Kolmogorov Complexity 一种基于Kolmogorov复杂度的诊断方法
N. Kabbaj, A. Doncescu, M. Benkaci
{"title":"A Diagnosis Approach Based on Kolmogorov Complexity","authors":"N. Kabbaj, A. Doncescu, M. Benkaci","doi":"10.1109/BWCCA.2010.121","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.121","url":null,"abstract":"The aim of this work is to develop a methodology of failure diagnosis in automotive systems based on log file similarity. We propose a similarity metric based on Kolmogorov complexity to measure the amount of shared information between log files.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126025728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differentiated Bandwidth Allocation and WaveLength Assignment Method in WDM EPON WDM EPON中的差分带宽分配和波长分配方法
Min-Jun Kim, Yong-Suk Jang, Yong-Do Choi, Sung-Ho Kim
{"title":"Differentiated Bandwidth Allocation and WaveLength Assignment Method in WDM EPON","authors":"Min-Jun Kim, Yong-Suk Jang, Yong-Do Choi, Sung-Ho Kim","doi":"10.1109/BWCCA.2010.59","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.59","url":null,"abstract":"In information society based on the Internet, demands for high-capacity multimedia services are always increasing. However, it is not possible to offer users satisfactory services, because of lower transmission rate and the limitation of the distance through access networks. In order to solve limitation of transmission rate through access networks and to guarantee Quality-of-Service, it is proposed that a differential bandwidth allocation method should be a priority, and a wavelength division method should be implemented in Wavelength Division Multiplexing Ethernet-Passive Optical Network. The proposed algorithm was estimated by measuring the maximum and average traffic latency of lower-higher traffic ratios using a simulation model implemented by OPNET.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116767673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Modular Exponentiation Resistant to Simple Power Analysis in DSA-Like Systems 类dsa系统中抗简单功率分析的高效模幂
Chia-Yu Lu, Wu-Chuan Yang, C. Laih
{"title":"Efficient Modular Exponentiation Resistant to Simple Power Analysis in DSA-Like Systems","authors":"Chia-Yu Lu, Wu-Chuan Yang, C. Laih","doi":"10.1109/BWCCA.2010.104","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.104","url":null,"abstract":"In this paper, based on the concept of asynchronous strategy, we propose a new novel method to compute modular exponentiations against simple power analysis (SPA) in DSA-like schemes. Since the probabilities of digits in different detected computations are equivalent, the proposed methods are resistant to simple power analysis. Based on the SU1 method of asynchronous strategy, an efficient SPA-resistant method is proposed and has expected time complexity nS + 0.667nM (???1.467nM), where n, S, and M are the number of digits, squaring and multiplication, respectively. Although the performance can be further improved by using signed-digit representations, the security is reduced because of the non-equivalent probabilities of digits.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"26 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114001246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parallel Implementation of a Balancing Domain Decomposition Method for Multi-core Processors 多核处理器平衡域分解方法的并行实现
M. Ogino, H. Kawai, R. Shioya, S. Yoshimura
{"title":"Parallel Implementation of a Balancing Domain Decomposition Method for Multi-core Processors","authors":"M. Ogino, H. Kawai, R. Shioya, S. Yoshimura","doi":"10.1109/BWCCA.2010.48","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.48","url":null,"abstract":"To improve the total performance of a PC cluster or a supercomputer with multi-core scalar CPU, not only parallel efficiency among computational nodes or CPUs, but also efficient utilization of processor cores of CPU are becoming more important than ever before. In this paper, we implement the BDD method by three kinds of programming styles to evaluate parallel performance on a multi-core CPU node. We demonstrate some numerical examples using a multi-core CPU. Especially, by changing the design from memory access intensive approach to matrix storage-free one, the parallel performance is improved.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Obfuscation Techniques: A Brief Survey 恶意软件混淆技术:简要调查
I. You, Kangbin Yim
{"title":"Malware Obfuscation Techniques: A Brief Survey","authors":"I. You, Kangbin Yim","doi":"10.1109/BWCCA.2010.85","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.85","url":null,"abstract":"As the obfuscation is widely used by malware writers to evade antivirus scanners, so it becomes important to analyze how this technique is applied to malwares. This paper explores the malware obfuscation techniques while reviewing the encrypted, oligomorphic, polymorphic and metamorphic malwares which are able to avoid detection. Moreover, we discuss the future trends on the malware obfuscation techniques.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125160776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 514
A Motion Planning of Swarm Robots Using Genetic Algorithm 基于遗传算法的群体机器人运动规划
Chien-Chou Lin, Po-Yuan Hsiao, Kun-Cheng Chen
{"title":"A Motion Planning of Swarm Robots Using Genetic Algorithm","authors":"Chien-Chou Lin, Po-Yuan Hsiao, Kun-Cheng Chen","doi":"10.1109/BWCCA.2010.128","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.128","url":null,"abstract":"In this paper, a potential-based genetic algorithm is proposed for formation control of robot swarm. The proposed algorithm consists of a global path planner and a motion planner. The global path planning algorithm searches a path, which the center of robot swarm should follow, within a Voronoi diagram of the free space. The motion planning is a genetic algorithm based on artificial potential models. The potential functions are used as a repulsion to keep robots away from obstacles and as an attraction/repulsion to keep robot swarm within a certain distance. With Voronoi diagram and potential models, the algorithm plans safe paths efficiently and the formation of robot swarm is also maintained.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Application Techniques of Particle Swarm Optimization 粒子群优化的应用技术
Z. Meng
{"title":"Application Techniques of Particle Swarm Optimization","authors":"Z. Meng","doi":"10.1109/BWCCA.2010.138","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.138","url":null,"abstract":"Particle swarm optimizer (PSO) is a powerful tool for designing antennas, solving inverse scattering problems, and so on. The algorithm is controlled with several parameters. Unless the parameters are selected appropriately, the search efficiency of PSO drops significantly. There are, however, no clear rules for the selection, and users have considerable difficulty to use PSO efficiently. This paper proposes a guideline for the selection to make the algorithm easy-to-use and keeping high performance.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126155934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Teleoperation of a Robot Arm System Using Pneumatic Artificial Rubber Muscles: Teleoperation over the Internet Using UDP and a Web Camera 使用气动人造橡胶肌肉的机器人手臂系统的远程操作:使用UDP和网络摄像头在互联网上的远程操作
Tomonori Kato, T. Higashi, K. Shimizu
{"title":"Teleoperation of a Robot Arm System Using Pneumatic Artificial Rubber Muscles: Teleoperation over the Internet Using UDP and a Web Camera","authors":"Tomonori Kato, T. Higashi, K. Shimizu","doi":"10.1109/BWCCA.2010.160","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.160","url":null,"abstract":"Teleoperation of pneumatic robots is desired in the fields of rescue, surgery, and rehabilitation therapy. In the present study, teleoperation control of a four-DOF robot arm system incorporating pneumatic artificial rubber muscles is proposed. In the experiment of the present study, the distance between the master and the slave systems is approximately 30km. Signals and images from the master controller side are sent over the Internet using user data gram protocol (UDP). The effectiveness of the proposed system is confirmed by the experimental results.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126200519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Wireless Sensor Networks: Challenges Ahead 无线传感器网络:未来的挑战
A. Rathnayaka, V. Potdar, Atif Sharif, Saeed Sarencheh, Samitha Kuruppu
{"title":"Wireless Sensor Networks: Challenges Ahead","authors":"A. Rathnayaka, V. Potdar, Atif Sharif, Saeed Sarencheh, Samitha Kuruppu","doi":"10.1109/BWCCA.2010.179","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.179","url":null,"abstract":"The aim of this paper is to analyze the different Wireless Sensor Network (WSN) transport protocols by identifying various experimental parameters in order to undertake a comparative evaluation. To build the groundwork, we first discuss the generic design for a transport protocol based on three key concepts, congestion control, reliability support and priority support. The basis of this design was developed by assessing several aspects of numerous transport protocols. However they all using different set of parameters and settings and hence it is difficult to benchmark one against the other. In this paper, we discuss the simulation settings like packet size, number of exploited sensors and their distribution in the field, buffer size, coverage area and power levels.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126294566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Experimental Studies on Various Types of Animal Mimicking Robots 各类动物模拟机器人的实验研究
Y. Kawamura
{"title":"Experimental Studies on Various Types of Animal Mimicking Robots","authors":"Y. Kawamura","doi":"10.1109/BWCCA.2010.167","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.167","url":null,"abstract":"We have studied various types of animal mimicking robots, such as a fish robot, birds robot and an insect robot, since 2000. In the studies of the fish and the bird robots, optimization of the complex motions of swimming in the water and the flapping in the air were optimized in order to generate the maximum propulsion forces. In the studies of the robot of insect type, aerodynamic studies using a wind tunnel were performed. We also developed an advanced wind tunnel experimental method, by which small flapping robots of insect type can fly statically at a fixed point in the wind tunnel. It enables us to measure or observe various aerodynamic characteristics of the flapping micro air vehicles.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128526136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信