{"title":"A Diagnosis Approach Based on Kolmogorov Complexity","authors":"N. Kabbaj, A. Doncescu, M. Benkaci","doi":"10.1109/BWCCA.2010.121","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.121","url":null,"abstract":"The aim of this work is to develop a methodology of failure diagnosis in automotive systems based on log file similarity. We propose a similarity metric based on Kolmogorov complexity to measure the amount of shared information between log files.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126025728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Min-Jun Kim, Yong-Suk Jang, Yong-Do Choi, Sung-Ho Kim
{"title":"Differentiated Bandwidth Allocation and WaveLength Assignment Method in WDM EPON","authors":"Min-Jun Kim, Yong-Suk Jang, Yong-Do Choi, Sung-Ho Kim","doi":"10.1109/BWCCA.2010.59","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.59","url":null,"abstract":"In information society based on the Internet, demands for high-capacity multimedia services are always increasing. However, it is not possible to offer users satisfactory services, because of lower transmission rate and the limitation of the distance through access networks. In order to solve limitation of transmission rate through access networks and to guarantee Quality-of-Service, it is proposed that a differential bandwidth allocation method should be a priority, and a wavelength division method should be implemented in Wavelength Division Multiplexing Ethernet-Passive Optical Network. The proposed algorithm was estimated by measuring the maximum and average traffic latency of lower-higher traffic ratios using a simulation model implemented by OPNET.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116767673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Modular Exponentiation Resistant to Simple Power Analysis in DSA-Like Systems","authors":"Chia-Yu Lu, Wu-Chuan Yang, C. Laih","doi":"10.1109/BWCCA.2010.104","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.104","url":null,"abstract":"In this paper, based on the concept of asynchronous strategy, we propose a new novel method to compute modular exponentiations against simple power analysis (SPA) in DSA-like schemes. Since the probabilities of digits in different detected computations are equivalent, the proposed methods are resistant to simple power analysis. Based on the SU1 method of asynchronous strategy, an efficient SPA-resistant method is proposed and has expected time complexity nS + 0.667nM (???1.467nM), where n, S, and M are the number of digits, squaring and multiplication, respectively. Although the performance can be further improved by using signed-digit representations, the security is reduced because of the non-equivalent probabilities of digits.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"26 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114001246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallel Implementation of a Balancing Domain Decomposition Method for Multi-core Processors","authors":"M. Ogino, H. Kawai, R. Shioya, S. Yoshimura","doi":"10.1109/BWCCA.2010.48","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.48","url":null,"abstract":"To improve the total performance of a PC cluster or a supercomputer with multi-core scalar CPU, not only parallel efficiency among computational nodes or CPUs, but also efficient utilization of processor cores of CPU are becoming more important than ever before. In this paper, we implement the BDD method by three kinds of programming styles to evaluate parallel performance on a multi-core CPU node. We demonstrate some numerical examples using a multi-core CPU. Especially, by changing the design from memory access intensive approach to matrix storage-free one, the parallel performance is improved.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malware Obfuscation Techniques: A Brief Survey","authors":"I. You, Kangbin Yim","doi":"10.1109/BWCCA.2010.85","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.85","url":null,"abstract":"As the obfuscation is widely used by malware writers to evade antivirus scanners, so it becomes important to analyze how this technique is applied to malwares. This paper explores the malware obfuscation techniques while reviewing the encrypted, oligomorphic, polymorphic and metamorphic malwares which are able to avoid detection. Moreover, we discuss the future trends on the malware obfuscation techniques.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125160776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Motion Planning of Swarm Robots Using Genetic Algorithm","authors":"Chien-Chou Lin, Po-Yuan Hsiao, Kun-Cheng Chen","doi":"10.1109/BWCCA.2010.128","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.128","url":null,"abstract":"In this paper, a potential-based genetic algorithm is proposed for formation control of robot swarm. The proposed algorithm consists of a global path planner and a motion planner. The global path planning algorithm searches a path, which the center of robot swarm should follow, within a Voronoi diagram of the free space. The motion planning is a genetic algorithm based on artificial potential models. The potential functions are used as a repulsion to keep robots away from obstacles and as an attraction/repulsion to keep robot swarm within a certain distance. With Voronoi diagram and potential models, the algorithm plans safe paths efficiently and the formation of robot swarm is also maintained.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application Techniques of Particle Swarm Optimization","authors":"Z. Meng","doi":"10.1109/BWCCA.2010.138","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.138","url":null,"abstract":"Particle swarm optimizer (PSO) is a powerful tool for designing antennas, solving inverse scattering problems, and so on. The algorithm is controlled with several parameters. Unless the parameters are selected appropriately, the search efficiency of PSO drops significantly. There are, however, no clear rules for the selection, and users have considerable difficulty to use PSO efficiently. This paper proposes a guideline for the selection to make the algorithm easy-to-use and keeping high performance.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126155934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Teleoperation of a Robot Arm System Using Pneumatic Artificial Rubber Muscles: Teleoperation over the Internet Using UDP and a Web Camera","authors":"Tomonori Kato, T. Higashi, K. Shimizu","doi":"10.1109/BWCCA.2010.160","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.160","url":null,"abstract":"Teleoperation of pneumatic robots is desired in the fields of rescue, surgery, and rehabilitation therapy. In the present study, teleoperation control of a four-DOF robot arm system incorporating pneumatic artificial rubber muscles is proposed. In the experiment of the present study, the distance between the master and the slave systems is approximately 30km. Signals and images from the master controller side are sent over the Internet using user data gram protocol (UDP). The effectiveness of the proposed system is confirmed by the experimental results.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126200519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Rathnayaka, V. Potdar, Atif Sharif, Saeed Sarencheh, Samitha Kuruppu
{"title":"Wireless Sensor Networks: Challenges Ahead","authors":"A. Rathnayaka, V. Potdar, Atif Sharif, Saeed Sarencheh, Samitha Kuruppu","doi":"10.1109/BWCCA.2010.179","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.179","url":null,"abstract":"The aim of this paper is to analyze the different Wireless Sensor Network (WSN) transport protocols by identifying various experimental parameters in order to undertake a comparative evaluation. To build the groundwork, we first discuss the generic design for a transport protocol based on three key concepts, congestion control, reliability support and priority support. The basis of this design was developed by assessing several aspects of numerous transport protocols. However they all using different set of parameters and settings and hence it is difficult to benchmark one against the other. In this paper, we discuss the simulation settings like packet size, number of exploited sensors and their distribution in the field, buffer size, coverage area and power levels.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126294566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Studies on Various Types of Animal Mimicking Robots","authors":"Y. Kawamura","doi":"10.1109/BWCCA.2010.167","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.167","url":null,"abstract":"We have studied various types of animal mimicking robots, such as a fish robot, birds robot and an insect robot, since 2000. In the studies of the fish and the bird robots, optimization of the complex motions of swimming in the water and the flapping in the air were optimized in order to generate the maximum propulsion forces. In the studies of the robot of insect type, aerodynamic studies using a wind tunnel were performed. We also developed an advanced wind tunnel experimental method, by which small flapping robots of insect type can fly statically at a fixed point in the wind tunnel. It enables us to measure or observe various aerodynamic characteristics of the flapping micro air vehicles.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128526136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}