Second International Conference on Future Generation Communication Technologies (FGCT 2013)最新文献

筛选
英文 中文
Exploiting simultaneous usage of different wireless interfaces for security and mobility 利用同时使用不同的无线接口来实现安全性和移动性
S. Dolev, Idan Heimlich Shtacher, Bracha Shapira, Y. Elovici, Guy Messalem, D. Mimran, M. Kopeetsky
{"title":"Exploiting simultaneous usage of different wireless interfaces for security and mobility","authors":"S. Dolev, Idan Heimlich Shtacher, Bracha Shapira, Y. Elovici, Guy Messalem, D. Mimran, M. Kopeetsky","doi":"10.1109/FGCT.2013.6767181","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767181","url":null,"abstract":"Today, most wireless devices are equipped with at least two interfaces-3G and Wi-Fi, yet only one of the interfaces can be operational at a time. We propose a new network communication scheme we call the Multi Channel Communication (MCC) which uses these two interfaces simultaneously and exploits new powerful network capabilities of such a configuration. We present a full android phone implementation and network architecture that demonstrates the new capabilities. The implementation includes two components; one located on the client side, providing full control over the routing of each packet from the device and the second located on the server side and responsible for combining the received data via the different interfaces. The new network configuration, proposed and analyzed in this paper, provides users with advanced services, such as: (a) a flexible connection service for providing physical mobility of a user within a session, (b) new security capabilities that maintain secure point to point connection and resistance against Men in the Middle Attacks (MIMA), and (c) enhancement of the user experience in network applications. The multi-interface model, introduced and discussed in this paper, may be applied to other wireless (or wire) interfaces in addition to Wi-Fi and 3G.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126673782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analytical modelling of communication network with unreliable servers and finite buffers 具有不可靠服务器和有限缓冲区的通信网络的分析建模
E. Kalimulina
{"title":"Analytical modelling of communication network with unreliable servers and finite buffers","authors":"E. Kalimulina","doi":"10.1109/FGCT.2013.6767207","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767207","url":null,"abstract":"In this paper we model a communication network as an open queuing network with Mt/Mt/n/m nodes. It is assumed that the mean time between events in the input flow and mean service time are exponentially distributed with rate parameters depending on time t. Each server in a system can fail and be recovered, the parameters of service, failures and recovery also depend on the number of node j and the number of customers in a system. Servers in the network nodes are completely recovered after failures. The recovery time is distributed according to an exponential law. The main characteristics of the performance and reliability of the system are analysed in this paper. We derive the probability that the application received at time t, will be served and the availability of a system.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133604062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using new communication technologies and social media interaction to improve the motivation of users to exercise 利用新的通信技术和社交媒体互动,提高用户锻炼的动机
F. Mulas, Paolo Pilloni, Matteo Manca, Ludovico Boratto, S. Carta
{"title":"Using new communication technologies and social media interaction to improve the motivation of users to exercise","authors":"F. Mulas, Paolo Pilloni, Matteo Manca, Ludovico Boratto, S. Carta","doi":"10.1109/FGCT.2013.6767189","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767189","url":null,"abstract":"The number of communication technologies and devices from which users can access information has rapidly increased. Moreover, users now have the chance to interact through social media channels, in order to share what they like and what they are experiencing in their everyday life. Both these aspects influence the design and development of Human-Computer Interaction applications that aim at motivating users to exercise more. In fact, the possibility to manage the exercising activity from different types of devices and the possibility to interact with other users, can increase the motivation of a user to exercise more. This paper presents a persuasive web application for sport and health, designed to motivate people in their exercising activity. The innovative aspect of our application is the possibility to use on a web browser some features previously available only through a mobile application. Moreover, it allows a richer interaction with the Facebook social network. Preliminary results show how different types of devices and new communication networks can be integrated, in order to improve the user experience and motivate users to a more active lifestyle.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133965081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient spectrum optimization and mobility in cognitive radio based inter-vehicle communcation system 基于认知无线电的车际通信系统的高效频谱优化和移动性
F. Riaz, Z. Jalil, Sehrab Bashir, M. Imran, N. Ratyal, M. Sajid
{"title":"Efficient spectrum optimization and mobility in cognitive radio based inter-vehicle communcation system","authors":"F. Riaz, Z. Jalil, Sehrab Bashir, M. Imran, N. Ratyal, M. Sajid","doi":"10.1109/FGCT.2013.6767195","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767195","url":null,"abstract":"An efficient spectrum optimization and spectrum mobility schemes have been proposed to enhance the potentials of cognitive radio based inter vehicle communication (IVC) system. At vehicular speed performing spectrum optimization and then spectrum mobility is a challenging chore. Spectrum mobility is very frequent in IVC due to extreme mobile nature of vehicles and unpredictable RF channel. A proficient white space optimization technique is a basic requirement to perform in time spectrum decision and so in time spectrum mobility. Genetic Algorithm (GA) is considered as one of the best optimization techniques for white space optimization. But at vehicular speed simple genetic algorithm (GA) has been botched to perform white space optimization in real time. To anticipate this problem we have already proposed Memory enabled genetic algorithm (MEGA) in our previous work. In this research work we have further improved the convergence time of MEGA by manipulating the generation gap and mutation operator. Simulation results have proven that enhanced memory enabled genetic algorithm (EMEGA) is 0.522 ms faster than MEGA. In the next phase of research an efficient spectrum mobility scheme using human emotion (fear) has been proposed. Simulation results reveal that using our proposed spectrum decision and spectrum mobility schemes a more efficient cognitive radio based vehicular networks can be tailored.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123428684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Supporting communications in the IoTs using the location/ID split protocol: A security analysis 支持使用位置/ID分离协议的物联网通信:安全分析
A. Raheem, A. Lasebae, Mahdi Aiash, J. Loo
{"title":"Supporting communications in the IoTs using the location/ID split protocol: A security analysis","authors":"A. Raheem, A. Lasebae, Mahdi Aiash, J. Loo","doi":"10.1109/FGCT.2013.6767216","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767216","url":null,"abstract":"Communication on the `Internet of Things' is based on a machine-to-machine pattern, where devices will be globallyaddressed and identified. However, as the number of connected devices increases, the burden on the network infrastructure increases as well. One major challenge will be the size of the routing tables and the efficiency of the current routing protocols in the Internet backbone. To address this problem, an IETF working group, along with the research group at Cisco, are working on a Locator/ID Separation Protocol as a routing architecture that provides new semantics for IP addressing, in order to simplify routing operations and improve scalability in the future of the Internet such as the Internet of Things. However, the Locator/ID Separation Protocol is still at an early stage of implementation and the protocol's security, in particular, is still in its infancy. Therefore, this paper will investigate the security issues that could occur from deploying the Locator/ID Separation Protocol in the Internet of Things. The investigation discovers a number of vulnerabilities that should be considered before moving to the implementation stage.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127767641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A comparison of sanctioning approaches for security breaches 针对安全漏洞的制裁方法的比较
M. Naldi, M. Flamini, G. D'Acquisto
{"title":"A comparison of sanctioning approaches for security breaches","authors":"M. Naldi, M. Flamini, G. D'Acquisto","doi":"10.1109/FGCT.2013.6767202","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767202","url":null,"abstract":"Though data breaches causing heavy monetary losses to customers could be reduced by investing more in security, service providers holding customers' personal data often do not feel enough pressure to heighten their security level. A sanctioning approach, holding the service provider liable for monetary losses resulting from data breaches, may provide the spur to increase security investments. In this paper, we review and compare two approaches to determine sanctions for the service providers, where the sanction is proportional respectively to the expected damage suffered by the customer and to the product of that damage and the service providers' revenues. The comparison is conducted by examining the game modelling the interaction between the customer and the service provider. In a typical scenario, the approach based on the service provider's revenues leads to larger security investments (for any degree of exposure of the customer) and to a stronger reduction of the data breach probability.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121429905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records 采用S/MIME和OpenPGP电子邮件消息协议保护电子病历的适用性
M. S. Nabi, M. L. M. Kiah, A. Zaidan, B. Zaidan
{"title":"Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records","authors":"M. S. Nabi, M. L. M. Kiah, A. Zaidan, B. Zaidan","doi":"10.1109/FGCT.2013.6767179","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767179","url":null,"abstract":"Security of Electronic medical records is one of the everyday concerns to the decision makers, governmental agencies, researchers and medical centres. Several funding agencies spend thousands or millions dollars to initiate new project aims to preserve the privacy of the patients and maintain the confidentiality of the EMR, the results of these projects developed several EMR security solutions. However, there are several (well-designed and standardized) security solutions developed for other applications such OpenPGP and S/MIME protocols that were originally developed for Email. OpenPGP and S/MIME protocols employ different architecture and algorithms to secure the email transmission. In this paper, a systematic review and analysis of both protocols OpenPGP and S/MIME is done. The result of analysis depicted that, the adoption of both protocols is applicable. In addition some suggestions are proposed to integrate different medical centres in order to achieve secure message exchange.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123520075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Power saving and throughput analysis of a novel MAC algorithm in WSN 一种新的无线传感器网络MAC算法的省电和吞吐量分析
Fawaz Alassery, Walid K. M. Ahmed, M. Sarraf, V. Lawrence
{"title":"Power saving and throughput analysis of a novel MAC algorithm in WSN","authors":"Fawaz Alassery, Walid K. M. Ahmed, M. Sarraf, V. Lawrence","doi":"10.1109/FGCT.2013.6767190","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767190","url":null,"abstract":"Recent research activities focus on low power and low cost sensor networks. Wireless Sensor Networks (WSNs) contain hundreds of autonomous sensor nodes which perform a required sensing or monitoring for harsh environments. In designing WSNs, limited power is considered to be the main constraint since frequently recharging a battery for a WSN node is not-feasible. Therefore, efficient utilization of power in WSNs has been addressed and investigated heavily in the literature. In this paper we analyze the performance of a novel power saving algorithm which avoids the rather high computational complexity of existing coding/decoding schemes to qualify the sanity of a packet. In addition, our proposed algorithm reduces the delay incurred in order to buffer and decode a received packet due to its ability to make a fast decision on the sanity of the received packet with low false alarm and miss probabilities which result in low throughput penalty, yet achieves a significant power saving advantage with low-complexity HW. We present simulation performance results on the amount of anticipated power saving versus the incurred throughput penalty and compare with various coding schemes commonly used in WSN's.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124971457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Web-based virtual classroom system model based on asynchronous and synchronous learning 基于异步和同步学习的基于web的虚拟课堂系统模型
H. Ketmaneechairat, Dussadee Seewungkum, M. Caspar
{"title":"Web-based virtual classroom system model based on asynchronous and synchronous learning","authors":"H. Ketmaneechairat, Dussadee Seewungkum, M. Caspar","doi":"10.1109/FGCT.2013.6767197","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767197","url":null,"abstract":"In this paper, the web-based virtual classroom system model based on asynchronous and synchronous learning is proposed. The system model is provided tools for lecturers and learners to enhanced features for collaboration and interaction among participants in a web-based virtual classroom. The web-based virtual classroom system model is defined by combination of both asynchronous and synchronous learning functions. The asynchronous learning function consists of contents, upload and download documents, webboard, e-mail and video on demand (VoD). The synchronous learning function is composed of chat room, video conference room, whiteboard room, presentation room and people list. The results show that lecturers and learners are participated in a web-based virtual classroom. A proposed model is better support for personal participation and cognitive participation. This model can improve the convenience and flexibility of scheduling and learning time.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132872740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adoption of cloud computing in manufacturing industry supply chains, a hype or a myth? 云计算在制造业供应链中的应用,是炒作还是神话?
S. Ali
{"title":"Adoption of cloud computing in manufacturing industry supply chains, a hype or a myth?","authors":"S. Ali","doi":"10.1109/FGCT.2013.6767183","DOIUrl":"https://doi.org/10.1109/FGCT.2013.6767183","url":null,"abstract":"Cloud computing technology which is next-generation architecture has created hype in IT and business world promising to deliver wide range of benefits. Gartner estimated that cloud market will surpass $148.8 billion by 2014. Despite the fact cloud computing technology remains for many an unfamiliar concept. Therefore, if cloud computing technology is to achieve its potential then there is need to have a clear understanding of various factors associated with its adoption by business. Cloud computing technology has already started impacting businesses and penetrated many areas from banks, automobile sector, education, logistics, wholesale, retail and health care. It is also emerging as a major enablers for the manufacturing industry that can transform the traditional business model, help it with product innovation with business strategy and create effective factory networks with collaboration. Adoption of cloud computing technology in supply chains of manufacturing industry will also improve performance in the form of better information visibility, cost reduction, and improved agility. For IS researchers, this study will outline factors associated with adaption of cloud computing technology in supply chains of manufacturing industry so that they will be in a position to advise the industry in the years to come. The paper will start by general introduction with an overview about cloud computing. Then, it will summarize the literature work that has been done so far with advantages of cloud computing technology. In next section, the theoretical framework will be described. Finally, the paper will close with a conclusion.","PeriodicalId":200083,"journal":{"name":"Second International Conference on Future Generation Communication Technologies (FGCT 2013)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131420837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信