2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications最新文献

筛选
英文 中文
Known-Key Attack-Resilient Cluster Key Management 已知密钥攻击弹性集群密钥管理
Gowun Jeong, H. Yang, Sang-Soo Yeo, Yongho Seo
{"title":"Known-Key Attack-Resilient Cluster Key Management","authors":"Gowun Jeong, H. Yang, Sang-Soo Yeo, Yongho Seo","doi":"10.1109/BWCCA.2013.48","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.48","url":null,"abstract":"To improve the security of unicasting or multicasting within a cluster, a novel key reference scheme of a cluster-shared key chain for all the cluster members is proposed. Even though a cluster shares all the keys of a key chain, every member uniquely makes use of a different key out of the key chain as a one-time encrypting key and such a key is privately known by only its desirable receiver(s). We discuss its resource overheads in memory, communication and computation as well as resiliency against known-key attacks.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115749995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Simulation of a Robot with Emotions Implemented with Fuzzy Logic 基于模糊逻辑实现的机器人情感仿真
Ya-Ting Hsu, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang, W. Chu
{"title":"The Simulation of a Robot with Emotions Implemented with Fuzzy Logic","authors":"Ya-Ting Hsu, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang, W. Chu","doi":"10.1109/BWCCA.2013.67","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.67","url":null,"abstract":"With advancements in computer technologies, robots can be designed to act in more human ways. If behaviors of human beings are better understood, a robot enabled with human emotions may someday be created. To achieve this goal, in this study, we design and simulate a robot, named Shiau_Lu, empowered with six universal human emotions, including happiness, anger, fear, sadness, disgust, and surprise. When we input a sentence to Shiau_Lu, it recognizes the sentence by invoking the Google speech recognition method on the Android system, and reacts in a proper manner by outputting a sentence to reveal its emotion. Each input sentence affects strength of the six corresponding emotional variables. After the fuzzy inference process, the most significant emotion of those six will be inferred and determined. The remaining five are called hidden emotions. Besides, the most appropriate output sentence as a response is chosen from its database. With the new state of the six emotional variables, when the robot encounters another sentence, the above processes repeat and another output sentence is then chosen and replied. Artificial intelligence and psychological theories of human behaviors are applied to the robot to simulate how emotions are influenced by the outside world. In fact, the robot may help autistic children to interact more with the world around them and relate themselves well to the outside world.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"12 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127281145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of Dayas Formations on Landsat TM Imagery Using Morphological Profiles 利用形态剖面对Landsat TM影像上的大岩石层进行分类
A. Kemmouche, Nassim Atmani
{"title":"Classification of Dayas Formations on Landsat TM Imagery Using Morphological Profiles","authors":"A. Kemmouche, Nassim Atmani","doi":"10.1109/BWCCA.2013.82","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.82","url":null,"abstract":"The semi-arid southern piedmont plain in the Algerian Saharan region is characterized by dayas, i.e. small semi-circular depressions colonized by vegetation. These dayas show specific morphological variations and vegetation characteristics. A correlation was noted between their morphology, vegetation cover and stage of development. Thus, it is of interest to develop an approach for combining the vegetation and shape criteria within a feature vector of each pixel to map the dayas. Vegetation and geometrical properties concerning these day a structures, as determined from remote sensing data, were used in this work to perform chronological classification of all dayas in this region. The differential morphological profile and pattern recognition parameters are used for extraction and classification of the dayas formation on Land sat Thematic Mapper imagery. Each class corresponds to a specific morphological and vegetation evolution stage.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129604633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of Lecture Videos Delivery System using HTML5 Video Element 基于HTML5视频元素的讲座视频发布系统的开发
Hiroki Mori, Hisaharu Tanaka, Y. Hori, M. Otani, Kenzi Watanabe
{"title":"Development of Lecture Videos Delivery System using HTML5 Video Element","authors":"Hiroki Mori, Hisaharu Tanaka, Y. Hori, M. Otani, Kenzi Watanabe","doi":"10.1109/BWCCA.2013.96","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.96","url":null,"abstract":"In recent years, teaching using information technology has been widespread. In Saga University, lecture videos for review is provided. However, many kinds of video formats exists. Therefore, administrator is required great care to convert to suitable video formats. In addition, we think there is a need to support smartphones, which are currently popular. In this study, we have developed lecture videos delivery system using HTML5 video element. By using video element, this system doesn't depend on the environment and support smartphones. So you can watch lecture videos wherever you are. In addition, this system can convert from some major video formats to mp4 and webm formats, which is suitable for HTML5, automatically. In short, the administrator can complete the preparation just to upload lecture videos. To provide lecture videos smoothly, not user, but administrator can easily use.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129093774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Differentiating the Starting Time of Processes in Energy-Efficient Redundant Execution Algorithm 节能冗余执行算法中进程启动时间的区分
T. Enokido, A. Aikebaier, M. Takizawa
{"title":"Differentiating the Starting Time of Processes in Energy-Efficient Redundant Execution Algorithm","authors":"T. Enokido, A. Aikebaier, M. Takizawa","doi":"10.1109/BWCCA.2013.59","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.59","url":null,"abstract":"Application processes have to be not only efficiently and reliably but also energy-efficiently performed in presence of server faults in distributed applications. In the improved redundant power consumption laxity-based (IRPCLB) algorithm proposed in our previous studies, a request of a process is sent to multiple servers. Then, replicas of a process are redundantly performed on more than one server. Here, the reliability and availability of the cluster can increase. However, the larger amount of electric power is consumed than non-redundant execution. Once a replica of a process terminates on a server, meaningless replicas on the other servers are forced to terminate in order to reduce the total power consumption. In this paper, we newly discuss an extended IRPCLB (EIRPCLB) algorithm to furthermore reduce the total power consumption of a server cluster by differentiating the starting time of each replica. Here, a process request is not broadcast and is rather serially sent to each server every delta time units. We evaluate the EIRPCLB algorithm in terms of total power consumption of a cluster, the average response time and number of servers to perform each process, and the operating ratio of a cluster compared with the IRPCLB algorithm. We show how to decide on the inter-request time delta for each request given the requirements on maximum response time and maximum number of active servers.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131925061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proposal of Data Triage Methods for Disaster Information Network System Based on Delay Tolerant Networking 基于容延迟网络的灾害信息网络系统数据分类方法的提出
Noriki Uchida, Noritaka Kawamura, Kazuo Takahata, Y. Shibata, N. Shiratori
{"title":"Proposal of Data Triage Methods for Disaster Information Network System Based on Delay Tolerant Networking","authors":"Noriki Uchida, Noritaka Kawamura, Kazuo Takahata, Y. Shibata, N. Shiratori","doi":"10.1109/BWCCA.2013.12","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.12","url":null,"abstract":"After the East Japan Great Earthquake in 2011, a robust network communication has been one of significant subjects for the study of Disaster Information System. Then, DTN (Delay Tolerant Network) has been focused for the effective methods for such inoperable network circumstances. However, when DTN is applied for the local areas, there are some problems such as message delivery rate and latency because there are fewer roads, cars, and pedestrians than in urban areas. Therefore, we propose the Enhanced Media Coordinate System for DTN to the architecture in order to provide the Data Triage, Node Selection based on its Territory, and Dynamic FEC (Forward Error Correction). In this paper, the proposed Data Triage Methods that provide the data priority by the user policy and the application type is especially explained, and the results of the computational simulation by the GIS map of a Japanese coastal town is reported. Then, the results are discussed for the future studies of DTN for Disaster Information Network System in local areas.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"422 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132518976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Parallel Greedy Randomized Adaptive Search Procedure with Delay and Delay Variation for RP Selection in PIM-SM Multicast Routing PIM-SM组播路由中RP选择的并行贪婪随机自适应搜索算法
Youssef Baddi, Mohamed Dâfir Ech-Cherif El Kettani
{"title":"Parallel Greedy Randomized Adaptive Search Procedure with Delay and Delay Variation for RP Selection in PIM-SM Multicast Routing","authors":"Youssef Baddi, Mohamed Dâfir Ech-Cherif El Kettani","doi":"10.1109/BWCCA.2013.84","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.84","url":null,"abstract":"Multicast IP is a Green Technology, it's a bandwidth-conserving technology that reduces traffic by simultaneously delivering a single stream of information to multicast group members. Internet research community has proposed many Different multicast routing protocols to support efficient multimedia application, PIM-SM protocol remains the most used multicast routing protocol, they propose using a Shared Rendezvous Point Tree SRPT to forward multicast packets. The prime problem concerning SRPT construction is to determine an optimal multicast router in the network as a root, this problem is called Rendezvous point RP selection. This selection influences the form of the multicast routing tree, and therefore influences performances of the multicast session and multicast routing scheme. Determination of a best position of the Rendezvous Point is an NP complete problem, first proposed by Wall, which needs to be solved with a heuristic algorithm. In this paper we propose a new RP selection algorithm based on Parallel Greedy Randomized Adaptive Search Procedure. 2DV-PGRASP-RP selects RP by considering cost, delay and delay variation functions and can be easily integrated to bootstrap RP protocol used by PIM-SM. Simulation results show that good performance is achieved in multicast cost.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134074837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ACK with Interference Detection Technique for ZigBee Network under Wi-Fi Interference Wi-Fi干扰下ZigBee网络ACK干扰检测技术
Zhipeng Wang, Tianyu Du, Yong Tang, D. Makrakis, H. Mouftah
{"title":"ACK with Interference Detection Technique for ZigBee Network under Wi-Fi Interference","authors":"Zhipeng Wang, Tianyu Du, Yong Tang, D. Makrakis, H. Mouftah","doi":"10.1109/BWCCA.2013.29","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.29","url":null,"abstract":"Recent studies have shown that the low-power ZigBee based wireless sensor networks (WSN) are vulnerable to the interference of Wi-Fi wireless local area networks (WLAN). From our experimental studies on this coexistence issue, it is found that there are a large number of acknowledgement (ACK) packet losses in the ZigBee packet transmission process, which, in turn, generates large number of unnecessary packet retransmissions, wasting precious channel bandwidth and energy. To address this issue, in this paper, a novel technique named ACK with Interference Detection (ACK-ID) that can effectively reduce the ACK losses and consequently reduce ZigBee packet retransmissions is proposed and implemented in the Crossbow MICAz motes of our testbed. The experimental performance evaluation results show that the proposed ACK-ID can significantly improve the performance of ZigBee packet transmission in terms of ACK delivery rate and packet retransmission rate while operating under interference from the collocated WLAN.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131036600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Effect of Buildings in VANETs Communication: Performance of OLSR Protocol for Video Streaming Application 建筑在VANETs通信中的影响:OLSR协议在视频流应用中的性能
Taiki Honda, Makoto Ikeda, Evjola Spaho, M. Hiyama, L. Barolli
{"title":"Effect of Buildings in VANETs Communication: Performance of OLSR Protocol for Video Streaming Application","authors":"Taiki Honda, Makoto Ikeda, Evjola Spaho, M. Hiyama, L. Barolli","doi":"10.1109/BWCCA.2013.143","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.143","url":null,"abstract":"In recent years, Vehicular Ad-hoc Networks (VANETs) have emerged as a unique type of MANETs. VANETs are an important component of the Intelligent Transportation Systems (ITS). They can be utilized to guarantee road safety, avoid potential accidents and create new forms of inter-vehicle communications. In this paper, we investigate the performance of OLSR protocol for video streaming application. The simulations are conducted in urban environment in two scenarios with and without buildings. We consider 802.11p standard and send multiple video streaming flows over UDP. We use throughput, delay and jitter as evaluation metrics. Based on simulation results, we found that OLSR can create links when buildings are not considered, but when buildings are considered some islands are created in the network and there are a lot of disconnections.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"32 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132395574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dynamic Data Forwarding in Wireless Sensor Networks 无线传感器网络中的动态数据转发
S. M. Iddalagi, S. Mahabaleshwar
{"title":"Dynamic Data Forwarding in Wireless Sensor Networks","authors":"S. M. Iddalagi, S. Mahabaleshwar","doi":"10.1109/BWCCA.2013.87","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.87","url":null,"abstract":"Routing is one of the challenging issue to be considered in wireless sensor networks which should balance the energy in the network, increase the packet delivery ratio and maintains the route reliability by adding the self healing (automatic route maintenance) features. The paper presents a dynamic data forwarding scheme that maximizes the lifetime of a sensor network by predicting the mobility of the sensor nodes. Proposed scheme operates in the following two phases: cluster formation and data forwarding. OMNeT++ simulator is used to test the performance effectiveness of the proposed scheme. Simulation results show the significant increase in network lifetime, packet delivery ratio, latency and throughput.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115520093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信