{"title":"Fingertip-Writing Alphanumeric Character Recognition for Vision-Based Human Computer Interaction","authors":"Chien-Cheng Lee, Cheng-Yuan Shih, Bor-Shenn Jeng","doi":"10.1109/BWCCA.2010.127","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.127","url":null,"abstract":"This paper proposes a vision-based fingertip handwriting alphanumeric character recognition system to provide an alternative for human computer interaction. Traditional handwriting recognition systems are limited because they require a specific or expensive input device, such as pen, tablet, or touch panel. Recently, cameras have gradually become standard components in many computer-based products. Therefore, a fingertip and camera combination provides a flexible and convenient input device. This proposed system combines fingertip detection, trajectory feature extraction, and character recognition. First, fingertip moving trajectories are tracked and recoded. Then, the proposed cyclic chain code histograms are extracted from the trajectories as features. Finally, the proposed system adopts the sigmoid radial basis function neural networks with growing and pruning algorithm (SRBF-GAP) to recognize handwritten characters. Experimental results show that the proposed novel input system is feasible and effective. This study also presents possible applications for camera input devices.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126283621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Contextual Access Control Model","authors":"Boustia Narhimene, A. Mokhtari","doi":"10.1109/BWCCA.2010.71","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.71","url":null,"abstract":"The proposed access control model is based on description logic (DL) augmented with a default and an exception operators to capture context feature. Our model is inspired from OrBAC model and has an expressivity almost comparable to it, which means assigning authorization to a user according to its role in an organization in a given context. The most important difference of our model is the allow of composed context, the add of new context and the deduction of new authorization depending on context.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131705179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aniello Castiglione, A. D. Santis, Ugo Fiore, F. Palmieri
{"title":"An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats","authors":"Aniello Castiglione, A. D. Santis, Ugo Fiore, F. Palmieri","doi":"10.1109/BWCCA.2010.117","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.117","url":null,"abstract":"Due to the increasing threat of attacks and malicious activities, the use of firewall technology is an important milestone toward making networks of any complexity and size secure. Unfortunately, the inherent difficulties in designing and managing firewall policies within the modern highly distributed, dynamic and heterogeneous environments might greatly limit the effectiveness of firewall security. It is therefore desirable to automate as much as possible the firewall configuration process. Accordingly, this work presents a new more active and scalable fire walling architecture based on dynamic and adaptive policy management facilities, thus enabling the automatic generation of new rules and policies, to ensure a timely response in detecting unusual traffic activity and identify unknown potential attacks (0day). The proposed scheme, structured in a multi-stage modular fashion, can be easily applied in a distributed security environment, and does not depend on specific security solutions or hardware/software packages.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130408851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fuu-Cheng Jiang, Hsiang-Wei Wu, Der-Chen Huang, Chu-Hsing Lin
{"title":"Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques","authors":"Fuu-Cheng Jiang, Hsiang-Wei Wu, Der-Chen Huang, Chu-Hsing Lin","doi":"10.1109/BWCCA.2010.116","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.116","url":null,"abstract":"A wireless sensor network (WSN) is envisioned as a cluster of tiny power-constrained devices with functions of sensing and communications. Sensors closer to a sink node have a larger forwarding traffic burden and consume more energy than nodes further away from the sink. The whole lifetime of WSN is deteriorated because of such an uneven node power consumption patterns, leading to what is known as an energy hole problem (EHP). The EHP is an embedded risk and would compromise the lifetime security of WSN. From open literatures, most research works have focused on how to optimally increase the probability of sleeping states using various wake-up strategies to prolong the lifetime of WSN. In this article, we propose a novel power-saving scheme to alleviate the EHP based on the N-policy queuing theory. With little or no extra management cost, the proposed queue-based power-saving technique can be applied to prolong the lifetime of the WSN economically and effectively. A mathematical analysis on the optimal control parameter has been made. Numerical and network simulation results validate that the proposed approach indeed provides a feasibly cost-effective scheme for improving the lifetime security of WSN.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130486351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network-Adaptive Multipath Video Delivery over Wireless Multimedia Sensor Networks Based on Packet and Path Priority Scheduling","authors":"Amir Rastegar Lari, B. Akbari","doi":"10.1109/BWCCA.2010.95","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.95","url":null,"abstract":"in this paper we investigate multi-path transmission of video over Wireless Multimedia Sensor Networks (WMSNs). Our objective is to provide a transmission mechanism to improve the video quality perceived at the receiver while considering energy, bandwidth and delay constraints of the network. Our approach is based on packet and path priority scheduling in multipath video transmission over WMSN. Video packets are classified according to their types and more important packets are transmitted through paths with better conditions. Path conditions are evaluated by a score mechanism using variant parameters such as free buffer size, energy, hop count and packet loss. Since path conditions are changed over time, our proposed scheme updates path conditions and adapting packet scheduling accordingly. Simulation analysis of the proposed video transmission scheme shows its efficiency in increasing perceived video quality at the receiver.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121335489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Forensics System with Intrusion Tolerance Based on Hierarchical Coloured Petri-nets","authors":"Hsing-Chung Chen, Jai-Zong Sun, Z. Wu","doi":"10.1109/BWCCA.2010.151","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.151","url":null,"abstract":"In this paper, we propose a dynamic forensics system (DFS) with intrusion tolerance by using Hierarchical Fuzzy Coloured Petri-Nets (HFCPNs), which is utilized to analyze the risk level of the traffic packets received from real server. We improve the intrusion tolerance mechanism [6] by using the HFCPNs. When the server is under some threats of intrusion, the malicious packets can be detected by the DFS, and will redirect them to shadow server. By way of using the Coloured Petri Nets and depending on the operator’s experience of fuzzy control, we support more detail design for DFS which can detect more malicious threats than [6]. Therefore, the design of transition will be more flexible for preventing various malicious threats in the DFS.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116479176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Based on Mobile RFID Device to Design a Secure Mutual Authentication Scheme for Market Application","authors":"Chin-Ling Chen, J. Jan, Chih-Feng Chien","doi":"10.1109/BWCCA.2010.108","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.108","url":null,"abstract":"In recent years, as RFID reader equipments have been widely deployed in handled devices, the security problems between mobile reader and RFID server are important obviously. In this paper, under the assumption of that the communication channel between RFID server and RFID reader is not secure, we propose a novel scheme conforming EPC C1G2 standards which is with low implementation cost. Benefit from reducing the manpower of market management, the market members can use the mobile reader to query products information and make a secure transaction through cash register efficiently. Moreover, in order to achieve the mutual authentication, our proposed scheme integrates the fingerprint biometrics, related cryptology and hash function mechanism to ensure the security of the transmission messages. The proposed scheme is also beneficial to M-commerce and can resist known attacks.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129510137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable Message Broadcast Schemes in Distributed Agreement Protocols","authors":"A. Aikebaier, T. Enokido, M. Takizawa","doi":"10.1109/BWCCA.2010.77","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.77","url":null,"abstract":"Nowadays information systems are being shifted to distributed architectures. The peer-to-peer (P2P) model as a fully distributed system, is composed of peer processes (peers). Here, peers have to efficiently and flexibly make an agreement on one common value which satisfies an agreement condition. In the agreement protocol, each peer has to deliver values to all the peers in a group. We take advantage of the multipoint relaying (MPR) mechanism to efficiently broadcast messages. Here, if a peer which forwards messages to other peers is faulty, the peers cannot receive messages. In this paper, we newly discuss a trustworthiness-based broadcast (TBB) algorithm where only the trustworthy peers forward messages. That is, untrustworthy peers, i.e. peers prone to faults and malicious behaviors do not forward messages. Here, the transmission fault implied by faulty peers can be reduced. We evaluate the TBB algorithm in terms of the number of messages compared with the pure flooding and MPR algorithms.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129704896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Increase in Propulsion of Flexible Linear Actuator","authors":"K. Ohyama, Y. Hyakutake, H. Kino","doi":"10.1109/BWCCA.2010.162","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.162","url":null,"abstract":"Linear motors have limitations for applications because linear motors are developed to apply for operations of rectilinear motion. Then, The Flexible Linear Actuator (FLA) has been proposed to enlarge the application field by giving it flexibility. The electric propulsion was small because the prototype of FLA was small, and it was difficult to compare the analytical and experimental electric propulsions. Therefore, the operating principle has not been verified. In this paper, the new experimental model is constructed to increase the electric propulsion and make the measurements easy. And, the experimental results are compared with the results calculated with the finite element method software (ANSYS) to verify the operating principle of FLA.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129734696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Genetic Algorithms for QoS Routing in Mobile Ad Hoc Networks: A Survey","authors":"Admir Barolli, M. Takizawa, F. Xhafa, L. Barolli","doi":"10.1109/BWCCA.2010.78","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.78","url":null,"abstract":"Much work has been done on routing in Ad-Hoc networks, but the proposed routing solutions only deal with the best effort data traffic. Connections with Quality of Service (QoS) requirements, such as voice channels with delay and bandwidth constraints, are not supported. The QoS routing has been receiving increasingly intensive attention, but searching for the shortest path with many metrics is an NP-complete problem. For this reason, approximated solutions and heuristic algorithms should be developed for multi-path constraints QoS routing. Also, the routing methods should be adaptive, flexible, and intelligent. In this paper, we survey the research work on application of Genetic Algorithms (GAs) for QoS routing in Ad-Hoc Networks. We present different approaches and give a comparison study between GA-based routing algorithms: GAMAN and GLBR. The performance evaluation via simulations shows that the GAMAN algorithm has better behaviour than GAMAN1 and GLBR algorithms and is a promising algorithm for QoS routing in Ad-Hoc networks. Finally, we discuss some improvements of GAMAN and investigated some future work.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132229776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}