2010 International Conference on Broadband, Wireless Computing, Communication and Applications最新文献

筛选
英文 中文
Fingertip-Writing Alphanumeric Character Recognition for Vision-Based Human Computer Interaction 基于视觉人机交互的手指尖书写字母数字字符识别
Chien-Cheng Lee, Cheng-Yuan Shih, Bor-Shenn Jeng
{"title":"Fingertip-Writing Alphanumeric Character Recognition for Vision-Based Human Computer Interaction","authors":"Chien-Cheng Lee, Cheng-Yuan Shih, Bor-Shenn Jeng","doi":"10.1109/BWCCA.2010.127","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.127","url":null,"abstract":"This paper proposes a vision-based fingertip handwriting alphanumeric character recognition system to provide an alternative for human computer interaction. Traditional handwriting recognition systems are limited because they require a specific or expensive input device, such as pen, tablet, or touch panel. Recently, cameras have gradually become standard components in many computer-based products. Therefore, a fingertip and camera combination provides a flexible and convenient input device. This proposed system combines fingertip detection, trajectory feature extraction, and character recognition. First, fingertip moving trajectories are tracked and recoded. Then, the proposed cyclic chain code histograms are extracted from the trajectories as features. Finally, the proposed system adopts the sigmoid radial basis function neural networks with growing and pruning algorithm (SRBF-GAP) to recognize handwritten characters. Experimental results show that the proposed novel input system is feasible and effective. This study also presents possible applications for camera input devices.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126283621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Contextual Access Control Model 上下文访问控制模型
Boustia Narhimene, A. Mokhtari
{"title":"A Contextual Access Control Model","authors":"Boustia Narhimene, A. Mokhtari","doi":"10.1109/BWCCA.2010.71","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.71","url":null,"abstract":"The proposed access control model is based on description logic (DL) augmented with a default and an exception operators to capture context feature. Our model is inspired from OrBAC model and has an expressivity almost comparable to it, which means assigning authorization to a user according to its role in an organization in a given context. The most important difference of our model is the allow of composed context, the add of new context and the deduction of new authorization depending on context.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131705179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats 动态自适应遏制新出现的安全威胁的增强防火墙方案
Aniello Castiglione, A. D. Santis, Ugo Fiore, F. Palmieri
{"title":"An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats","authors":"Aniello Castiglione, A. D. Santis, Ugo Fiore, F. Palmieri","doi":"10.1109/BWCCA.2010.117","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.117","url":null,"abstract":"Due to the increasing threat of attacks and malicious activities, the use of firewall technology is an important milestone toward making networks of any complexity and size secure. Unfortunately, the inherent difficulties in designing and managing firewall policies within the modern highly distributed, dynamic and heterogeneous environments might greatly limit the effectiveness of firewall security. It is therefore desirable to automate as much as possible the firewall configuration process. Accordingly, this work presents a new more active and scalable fire walling architecture based on dynamic and adaptive policy management facilities, thus enabling the automatic generation of new rules and policies, to ensure a timely response in detecting unusual traffic activity and identify unknown potential attacks (0day). The proposed scheme, structured in a multi-stage modular fashion, can be easily applied in a distributed security environment, and does not depend on specific security solutions or hardware/software packages.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130408851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques 利用队列技术提高无线传感器网络的生命周期安全性
Fuu-Cheng Jiang, Hsiang-Wei Wu, Der-Chen Huang, Chu-Hsing Lin
{"title":"Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques","authors":"Fuu-Cheng Jiang, Hsiang-Wei Wu, Der-Chen Huang, Chu-Hsing Lin","doi":"10.1109/BWCCA.2010.116","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.116","url":null,"abstract":"A wireless sensor network (WSN) is envisioned as a cluster of tiny power-constrained devices with functions of sensing and communications. Sensors closer to a sink node have a larger forwarding traffic burden and consume more energy than nodes further away from the sink. The whole lifetime of WSN is deteriorated because of such an uneven node power consumption patterns, leading to what is known as an energy hole problem (EHP). The EHP is an embedded risk and would compromise the lifetime security of WSN. From open literatures, most research works have focused on how to optimally increase the probability of sleeping states using various wake-up strategies to prolong the lifetime of WSN. In this article, we propose a novel power-saving scheme to alleviate the EHP based on the N-policy queuing theory. With little or no extra management cost, the proposed queue-based power-saving technique can be applied to prolong the lifetime of the WSN economically and effectively. A mathematical analysis on the optimal control parameter has been made. Numerical and network simulation results validate that the proposed approach indeed provides a feasibly cost-effective scheme for improving the lifetime security of WSN.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130486351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Network-Adaptive Multipath Video Delivery over Wireless Multimedia Sensor Networks Based on Packet and Path Priority Scheduling 基于分组和路径优先级调度的无线多媒体传感器网络自适应多路径视频传输
Amir Rastegar Lari, B. Akbari
{"title":"Network-Adaptive Multipath Video Delivery over Wireless Multimedia Sensor Networks Based on Packet and Path Priority Scheduling","authors":"Amir Rastegar Lari, B. Akbari","doi":"10.1109/BWCCA.2010.95","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.95","url":null,"abstract":"in this paper we investigate multi-path transmission of video over Wireless Multimedia Sensor Networks (WMSNs). Our objective is to provide a transmission mechanism to improve the video quality perceived at the receiver while considering energy, bandwidth and delay constraints of the network. Our approach is based on packet and path priority scheduling in multipath video transmission over WMSN. Video packets are classified according to their types and more important packets are transmitted through paths with better conditions. Path conditions are evaluated by a score mechanism using variant parameters such as free buffer size, energy, hop count and packet loss. Since path conditions are changed over time, our proposed scheme updates path conditions and adapting packet scheduling accordingly. Simulation analysis of the proposed video transmission scheme shows its efficiency in increasing perceived video quality at the receiver.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121335489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Dynamic Forensics System with Intrusion Tolerance Based on Hierarchical Coloured Petri-nets 基于分层彩色petri网的入侵容忍动态取证系统
Hsing-Chung Chen, Jai-Zong Sun, Z. Wu
{"title":"Dynamic Forensics System with Intrusion Tolerance Based on Hierarchical Coloured Petri-nets","authors":"Hsing-Chung Chen, Jai-Zong Sun, Z. Wu","doi":"10.1109/BWCCA.2010.151","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.151","url":null,"abstract":"In this paper, we propose a dynamic forensics system (DFS) with intrusion tolerance by using Hierarchical Fuzzy Coloured Petri-Nets (HFCPNs), which is utilized to analyze the risk level of the traffic packets received from real server. We improve the intrusion tolerance mechanism [6] by using the HFCPNs. When the server is under some threats of intrusion, the malicious packets can be detected by the DFS, and will redirect them to shadow server. By way of using the Coloured Petri Nets and depending on the operator’s experience of fuzzy control, we support more detail design for DFS which can detect more malicious threats than [6]. Therefore, the design of transition will be more flexible for preventing various malicious threats in the DFS.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116479176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Based on Mobile RFID Device to Design a Secure Mutual Authentication Scheme for Market Application 基于移动RFID设备的安全互认证方案设计
Chin-Ling Chen, J. Jan, Chih-Feng Chien
{"title":"Based on Mobile RFID Device to Design a Secure Mutual Authentication Scheme for Market Application","authors":"Chin-Ling Chen, J. Jan, Chih-Feng Chien","doi":"10.1109/BWCCA.2010.108","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.108","url":null,"abstract":"In recent years, as RFID reader equipments have been widely deployed in handled devices, the security problems between mobile reader and RFID server are important obviously. In this paper, under the assumption of that the communication channel between RFID server and RFID reader is not secure, we propose a novel scheme conforming EPC C1G2 standards which is with low implementation cost. Benefit from reducing the manpower of market management, the market members can use the mobile reader to query products information and make a secure transaction through cash register efficiently. Moreover, in order to achieve the mutual authentication, our proposed scheme integrates the fingerprint biometrics, related cryptology and hash function mechanism to ensure the security of the transmission messages. The proposed scheme is also beneficial to M-commerce and can resist known attacks.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129510137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Reliable Message Broadcast Schemes in Distributed Agreement Protocols 分布式协议协议中的可靠消息广播方案
A. Aikebaier, T. Enokido, M. Takizawa
{"title":"Reliable Message Broadcast Schemes in Distributed Agreement Protocols","authors":"A. Aikebaier, T. Enokido, M. Takizawa","doi":"10.1109/BWCCA.2010.77","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.77","url":null,"abstract":"Nowadays information systems are being shifted to distributed architectures. The peer-to-peer (P2P) model as a fully distributed system, is composed of peer processes (peers). Here, peers have to efficiently and flexibly make an agreement on one common value which satisfies an agreement condition. In the agreement protocol, each peer has to deliver values to all the peers in a group. We take advantage of the multipoint relaying (MPR) mechanism to efficiently broadcast messages. Here, if a peer which forwards messages to other peers is faulty, the peers cannot receive messages. In this paper, we newly discuss a trustworthiness-based broadcast (TBB) algorithm where only the trustworthy peers forward messages. That is, untrustworthy peers, i.e. peers prone to faults and malicious behaviors do not forward messages. Here, the transmission fault implied by faulty peers can be reduced. We evaluate the TBB algorithm in terms of the number of messages compared with the pure flooding and MPR algorithms.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129704896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Study on Increase in Propulsion of Flexible Linear Actuator 柔性直线执行器推进力增大研究
K. Ohyama, Y. Hyakutake, H. Kino
{"title":"Study on Increase in Propulsion of Flexible Linear Actuator","authors":"K. Ohyama, Y. Hyakutake, H. Kino","doi":"10.1109/BWCCA.2010.162","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.162","url":null,"abstract":"Linear motors have limitations for applications because linear motors are developed to apply for operations of rectilinear motion. Then, The Flexible Linear Actuator (FLA) has been proposed to enlarge the application field by giving it flexibility. The electric propulsion was small because the prototype of FLA was small, and it was difficult to compare the analytical and experimental electric propulsions. Therefore, the operating principle has not been verified. In this paper, the new experimental model is constructed to increase the electric propulsion and make the measurements easy. And, the experimental results are compared with the results calculated with the finite element method software (ANSYS) to verify the operating principle of FLA.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129734696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Genetic Algorithms for QoS Routing in Mobile Ad Hoc Networks: A Survey 遗传算法在移动自组网QoS路由中的应用综述
Admir Barolli, M. Takizawa, F. Xhafa, L. Barolli
{"title":"Application of Genetic Algorithms for QoS Routing in Mobile Ad Hoc Networks: A Survey","authors":"Admir Barolli, M. Takizawa, F. Xhafa, L. Barolli","doi":"10.1109/BWCCA.2010.78","DOIUrl":"https://doi.org/10.1109/BWCCA.2010.78","url":null,"abstract":"Much work has been done on routing in Ad-Hoc networks, but the proposed routing solutions only deal with the best effort data traffic. Connections with Quality of Service (QoS) requirements, such as voice channels with delay and bandwidth constraints, are not supported. The QoS routing has been receiving increasingly intensive attention, but searching for the shortest path with many metrics is an NP-complete problem. For this reason, approximated solutions and heuristic algorithms should be developed for multi-path constraints QoS routing. Also, the routing methods should be adaptive, flexible, and intelligent. In this paper, we survey the research work on application of Genetic Algorithms (GAs) for QoS routing in Ad-Hoc Networks. We present different approaches and give a comparison study between GA-based routing algorithms: GAMAN and GLBR. The performance evaluation via simulations shows that the GAMAN algorithm has better behaviour than GAMAN1 and GLBR algorithms and is a promising algorithm for QoS routing in Ad-Hoc networks. Finally, we discuss some improvements of GAMAN and investigated some future work.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132229776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信