Raffaele Pizzolante, B. Carpentieri, Arcangelo Castiglione
{"title":"A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images","authors":"Raffaele Pizzolante, B. Carpentieri, Arcangelo Castiglione","doi":"10.1109/BWCCA.2013.68","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.68","url":null,"abstract":"Digital images play an important role in a wide range of medical applications. Several widespread technologies for digital imaging, such as Computed Tomography (CT), Magnetic Resonance (MR), etc., produce three-dimensional images. Data compression, is thus essential to reduce the volume of such images, permitting their efficient storing along with the improvement of the relative transmission time through Internet or any other ad-hoc systems, like Picture Archiving and Communication System (PACS), Tele-radiology, etc.. Since these images are often stored in system particularly vulnerable from the point of view of security, especially because they contain sensitive data, it is necessary to provide such images with a mechanism which ensures at least security against message forgery. In fact, an attack can be made by altering a medical image, and consequently, may alter the relative diagnosis. The purpose of this work is twofold, first we propose a low complexity approach for the compression of 3-D medical images, then, in order to limit the above defined potential attack, we proposed en efficient method to insert within each image an invisible digital watermark, during the compression process. In this way, we define a hybrid approach that handles simultaneously and efficiently both the compression that the security of three-dimensional images. We validate the proposed approach by showing test results.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"5 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115732279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of a Cache-less P2P Web Proxy","authors":"M. Nishimine, Kazunori Ueda","doi":"10.1109/BWCCA.2013.86","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.86","url":null,"abstract":"In recent years, large-volume Web applications have become common, such as video streaming or sharing. However, these applications generate high volumes of Internet traffic, which is a very important issue. Therefore, P2P Web proxy technologies have been developed to distribute this increased Web traffic. However, current P2P Web proxy technologies (or systems) have problems because they consume high bandwidth during the uploading and storage of the transferred content. This study proposes a method that can solve these problems by eliminating the contents cache used by P2P Web proxies.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"769 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115753671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Surveillance Architecture of Evolutional Agent System on Repository-Based Agent Framework","authors":"Takahiro Uchiya, Tetsuo Kinoshita","doi":"10.1109/BWCCA.2013.108","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.108","url":null,"abstract":"Evolutional Agent System (EAS) is proposed as an agent system which actively maintains and improves the functions and performances. EAS can solve the problems of conventional Agent System. Therefore, we propose and implement the Surveillance Architecture in order to realize the EAS. In this paper, we describe the problems of conventional AS, modifications of the agent framework and implemented agent.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125713793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Admir Barolli, Tetsuya Oda, L. Barolli, Evjola Spaho, F. Xhafa, M. Takizawa
{"title":"Effects of Selection Operators for Mesh Router Placement in Wireless Mesh Networks Considering Weibull Distribution of Mesh Clients","authors":"Admir Barolli, Tetsuya Oda, L. Barolli, Evjola Spaho, F. Xhafa, M. Takizawa","doi":"10.1109/BWCCA.2013.20","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.20","url":null,"abstract":"In this paper, we evaluate the performance of WMN-GA system for node placement problem in WMNs. For evaluation, we consider Weibull Distribution of mesh clients and different selection operators. The population size is considered 64 and the number of generation 200. For evaluation, we consider the giant component and the number of covered users metrics. The simulation results show that for small and medium grid sizes and big density of mesh clients WMN-GA performs better for Linear Ranking. For big grid sizes and low density of mesh clients WMN-GA performs better for Exponential Ranking.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126997813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiro Iwashige, L. Barolli, Saki Kameyama, Motohiko Iwaida
{"title":"Diffracted Fields in Buildings and Wedges: A Comparison Study","authors":"Jiro Iwashige, L. Barolli, Saki Kameyama, Motohiko Iwaida","doi":"10.1109/BWCCA.2013.144","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.144","url":null,"abstract":"In order to have an effective utilization of the radio wave resources, it is important to estimate propagation path in the urban area. In our previous works, we have shown that the shape and material of wedges do not affect the diffracted fields except the diffracted fields close to wedge surfaces. In this paper, we compare the diffracted fields of the wedges whose inner angles are 0 and a building for examining the fields close to wedge surface. The numerical calculations were carried out for two wedges, a conducting and a concrete buildings. We discuss diffracted fields by two wedges and a building for the case when a horizontal or vertical polarized wave is perpendicularly or obliquely incident to the edges.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134549250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tetsuya Oda, Shinji Sakamoto, Evjola Spaho, Admir Barolli, F. Xhafa
{"title":"Mesh Router Node Placement in Wireless Mesh Networks Considering Different Initial Router Placement Methods","authors":"Tetsuya Oda, Shinji Sakamoto, Evjola Spaho, Admir Barolli, F. Xhafa","doi":"10.1109/BWCCA.2013.19","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.19","url":null,"abstract":"In this paper, we deal with connectivity and coverage problems of Wireless Mesh Networks (WMNs). Because these problems are known to be NP-Hard, we propose and implement a system based on GA. We call the proposed system: WMN-GA. We evaluate the performance of WMN-GA considering Giant Component and Covered Mesh Clients metrics. We evaluate and compare the performance of different initial router node placement methods in a wireless mesh network considering different distributions of mesh clients. Our WMN-GA System have a good behavior and can find the best initial router node placement methods for every distribution of mesh clients.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Foreground Extraction Algorithm Using Depth Information for Image Segmentation","authors":"Sang-Wook Lee, H. Yang, Yongho Seo","doi":"10.1109/BWCCA.2013.101","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.101","url":null,"abstract":"Image segmentation is one of the most important topics in the field of computer vision. So lots of approaches for image segmentation have been proposed, and interactive methods based on energy minimization such as Grab Cut, etc have shown successful results. It, however, is not easy to automate the full process for segmentation because almost all of interactive methods require considerable user interaction. So if additional information is provided to users in order to guide them effectively, we can reduce interaction with them. In this paper we propose an efficient foreground extraction algorithm, which makes use of depth information from RGB-D sensors like Microsoft Kinect and offers users guidance for foreground extraction. Our approach can be applied as a pre-processing for interactive and energy-minimization-based segmentation approaches. Our proposed method is able to segment the foreground from images and give hints to reduce interaction with users. In our method, we make use of the characteristics of depth information captured by RGB-D sensors and describe them using information from structure tensor. And in our experiments we show that for real world images the proposed method separates foreground from background sufficiently well.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121752048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Software Security Requirement Quality Improvement Procedure to Increase E-Commerce Security","authors":"Sen-Tarng Lai, Fang-Yie Leu, W. Chu","doi":"10.1109/BWCCA.2013.64","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.64","url":null,"abstract":"In the digital and network age, e-commerce is an important business transaction system. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. In order to avoid system security flaws and defects caused user significant loss, how to increase security of e-commerce has become a topic worthy of further exploration. The paper investigates critical e-commerce software security requirement (SSR), based on SSR discusses quality impact factors of e-commerce security and proposes a SSR Quality Measurement (SSRQM) model. Combining improvement operation with SSRQM model, the paper establishes a SSR Quality Improvement Procedure (SSRQIP). Applying SSRQIP, the problem and defect of SSR quality can be identified. And assist in timely to adjust and revise the defects of SSR quality, enhance the e-commerce security effectively.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130110115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Sula, Evjola Spaho, Keita Matsuo, L. Barolli, Rozeta Miho, F. Xhafa
{"title":"An IoT-Based System for Supporting Children with Autism Spectrum Disorder","authors":"A. Sula, Evjola Spaho, Keita Matsuo, L. Barolli, Rozeta Miho, F. Xhafa","doi":"10.1109/BWCCA.2013.51","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.51","url":null,"abstract":"In this paper, we implement and evaluate the performance of a new system based on Internet of Things (IoT) and P2P technology for supporting learning and improving the quality of life for children with Autism Spectrum Disorder (ASD). Many children with autism are highly interested and motivated by smart devices such as computers and touch screen tablets. These types of assistive technology devices get children with autism to interact, make choices, respond, and tell parents what they are interested, need, think, and maybe even feel. Our proposed system uses JXTA-Overlay platform and Smart Box device to monitor the children and create P2P communication between children, caregivers and therapists. Various visual systems, such as objects, photographs, realistic drawings, line drawings, and written words, can be used with assorted modes of technology, as long as the child can readily comprehend the visual representation. Vocabulary skills, mathematics skills and other life skills can be taught through our proposed system. We evaluated the effect of our system during study sessions of children diagnosed with ASD. The experimental results show that our system teaches new skills to children with ASD and the Smart Box increases the concentration of children during studying.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130270653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Accuracy Enhancement of GPS Track in Google Map","authors":"Jen-Yung Lin, Bo-Kai Yang, Tuan-Anh Do, Hsing-Chung Chen","doi":"10.1109/BWCCA.2013.90","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.90","url":null,"abstract":"In the past decades, the GPS (Global Positioning System) tracking systems play an import role in the position-aware applications. For the cost issue, most of these systems uses the Google MAP to display the track. However, the Google MAP API does not provide the accuracy location information of each street. Therefore, the display track from the original Longitude and latitude GPS information does not match the road track in the Google MAP preciously. In this article, we discuss the impact of the sampling period of GPS and propose a track modified algorithm to correct the track. We implement a tracking system to demonstrate the effect of the modification. The results show the proposed algorithm can enhance the accuracy of GPS track in Google MAP while the report interval is 10 seconds.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122631957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}