2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications最新文献

筛选
英文 中文
A Novel Approach for Faulty Sensor Detection and Data Correction in Wireless Sensor Network 无线传感器网络中故障传感器检测与数据校正的新方法
A. Farruggia, S. Vitabile
{"title":"A Novel Approach for Faulty Sensor Detection and Data Correction in Wireless Sensor Network","authors":"A. Farruggia, S. Vitabile","doi":"10.1109/BWCCA.2013.15","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.15","url":null,"abstract":"The main Wireless Sensor Networks purpose is represented by areas of interest monitoring. Even if the Wireless sensor network is properly initialized, errors can occur during its monitoring tasks. The present work describes an approach for detecting faulty sensors in Wireless Sensor Network and for correcting their corrupted data. The approach is based on the assumption that exist a spatio-temporal cross-correlations among sensors. Two sequential mathematical tools are used. The first stage is a probabilistic tools, namely Markov Random Field, for a two-fold sensor classification (working or damaged). The last stage is represented by the Locally Weighted Regression model, a learning techniques modelling each sensor on the basis of its neighbours. If the sensor is working, the approach actives a learning phase and the sensor model is trained, while if the sensor is damaged, a correction phase starts and the related corrupted data are replaced with the data produced by the learned model. The effectiveness of the proposed approach has been proved using real data obtained from the Intel Berkeley Research Laboratory, over which different classes of faults were artificially superimposed. The proposed architecture achieves satisfactory results, since it successfully corrects faulty data produced by sensors.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125143272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Study on Method of New Digital Watermark Generation Using QR-Code 基于qr码的新型数字水印生成方法研究
Dae-Jea Cho
{"title":"Study on Method of New Digital Watermark Generation Using QR-Code","authors":"Dae-Jea Cho","doi":"10.1109/BWCCA.2013.102","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.102","url":null,"abstract":"In existing digital watermarking methods, images which have specific pattern images or sign images were used as digital watermarks. Additionally, binary data which were calculated with meaningless Pseudo noise sequences or chaotic functions were used as digital watermarks. However, this method has a limitation in watermark size to be inserted according to the size of original image. This paper suggested a method to generate QR-code which could take much information and use them as digital watermarks. QR-code not only can take much information in QR-code itself but also can include various information like web page when they are connected with links. Additionally, QR-code has a capability to soundly recover the saved data by correcting the errors even if the parts of the images are damaged. This paper used these strengths of QR-code. Suggested method in this paper can overcome the restricted storage limits because existing PN-sequences and Chaos sequences can be used instead and more information can be hidden in the original images, compared with existing method.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130390153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effect of Roadside APs in VANETs: A Comparison Study 路边ap对城市交通影响的比较研究
Makoto Ikeda, Taiki Honda, Evjola Spaho, M. Hiyama, L. Barolli
{"title":"Effect of Roadside APs in VANETs: A Comparison Study","authors":"Makoto Ikeda, Taiki Honda, Evjola Spaho, M. Hiyama, L. Barolli","doi":"10.1109/BWCCA.2013.57","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.57","url":null,"abstract":"In recent years, Vehicular Ad-hoc Networks (VANETs) have emerged as a unique type of MANETs. VANETs are an important component of the Intelligent Transportation Systems (ITS). They can been utilized to guarantee road safety, avoid potential accidents and create new forms of inter-vehicle communications. In this paper, we investigate the performance of OLSR protocol for video streaming application. The simulations are conducted in urban environment in two scenarios, where roadside Access Points (AP) are present and not present. We consider 802.11p standard and send multiple video streaming flows over UDP. We use throughput, delay and jitter as evaluation metrics. Based on simulation results, we noticed that transmission for streaming is improved when roadside AP are used.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128398353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Coverage Estimation in Floorplan Visual Sensor Networks 平面视觉传感器网络的覆盖估计
A. Attar, M. Izadi, Maedeh Movahedian, Shantia Yarahmadian
{"title":"Coverage Estimation in Floorplan Visual Sensor Networks","authors":"A. Attar, M. Izadi, Maedeh Movahedian, Shantia Yarahmadian","doi":"10.1109/BWCCA.2013.32","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.32","url":null,"abstract":"The issue of Coverage in visual sensor networks (VSNs) has attracted considerable attention due to sensors unique directional sensing characteristic. It answers the question that how well the target field is monitored by a network of sensors with video/image capturing capability. In floor plan scenario the network is to monitor a plane parallel to the sensors' deployment plane. Coverage probability estimation based on both the sensors and the network related parameters is a fundamental issue in this field. For a large scale application in which the sensors' deployment is done by dropping sensors from an airplane, random sensors' placement and orientation according to their respective distribution is a practical assumption. Although some studies exist on the coverage problem of floor plan VSNs, none of them has derived a closed form solution for the coverage estimation, which is the main contribution of this paper. The Simulation results validated the proposed mathematical.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130594316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interferometric Coherence Optimization: A Comparative Study 干涉相干优化:一种比较研究
S. Tahraoui, M. Ouarzeddine, B. Souissi
{"title":"Interferometric Coherence Optimization: A Comparative Study","authors":"S. Tahraoui, M. Ouarzeddine, B. Souissi","doi":"10.1109/BWCCA.2013.75","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.75","url":null,"abstract":"The Interferometric coherence measures the degree of similarity or the correlation between the radar signals corresponding to complex SAR images viewed from close angles. The strong dependence of the interferometric coherence to the polarization state can consider that there is a combination of polarization to achieve maximum interferometric coherence. The methods developed in this field are based on the combination of information derived from polarimetric channels of the interferometric couple and define new projection vectors that maximize the highest possible value of coherence. In this paper we investigated two interferometric coherence optimization methods. The first one is based on the selection of the best pair of projection vectors that maximizes the coherence. The corresponding algorithm leads to an eigenvectors / eigenvalues problem, where each vector represents a scattering mechanism used for view. The second method used an identical projection vector for the two images representing a unique scattering mechanism. To evaluate this work, we used a couple of interferometric airborne polarimetric data acquired on the Tapajos in Brazil, in the P band. Results compared to classical coherence reveals that both methods give better results than single acquisition, however, the first one is the best.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125525558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance Evaluation of AODV Routing Protocol in VANETs Considering Multi-flows Traffic 考虑多流流量的vanet中AODV路由协议性能评价
Evjola Spaho, Makoto Ikeda, L. Barolli, F. Xhafa, Vladi Koliçi, Jiro Iwashige
{"title":"Performance Evaluation of AODV Routing Protocol in VANETs Considering Multi-flows Traffic","authors":"Evjola Spaho, Makoto Ikeda, L. Barolli, F. Xhafa, Vladi Koliçi, Jiro Iwashige","doi":"10.1109/BWCCA.2013.141","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.141","url":null,"abstract":"In this paper, we investigate the performance of AODV routing protocol in a Manhattan grid scenario when sending triple flow. We considered two different scenarios with three TCP flows (TCP1xTCP2xTCP3) and one UDP flow and two TCP flows (UDPxTCP1xTCP2) and data rates of 0.1 Mbps and 1 Mbps. For the simulations, we used SUMO to generate the vehicle movement and NS3 to analyze the network performance. We considered IEEE 802.11p standard and TwoRayGroundPropagationLossModel. We evaluate the network performance considering throughput and cwnd metrics. The simulation results show that TCP flows during the beginning phases of transmission performs good because of the slow-start mechanism. For TCP1xTCP2xTCP3 scenario and small data rates, there are some oshillations, but all TCP flows send data to destination almost all the simulation time. For UDPxTCP1xTCP2 scenario and small data rates, TCP flows after detecting congestion they send only few packets and UDP have priority. For UDPxTCP1xTCP2 scenario and big data rates, TCP and UDP have competing data flows going over the same intermediate nodes and UDP is more aggressive than TCP.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115766483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Power Control Mechanism Based on Priority Grouping for Small Cell Networks 基于优先级分组的小蜂窝网络功率控制机制
A. Alexiou, Dimitrios Bilios, C. Bouras
{"title":"A Power Control Mechanism Based on Priority Grouping for Small Cell Networks","authors":"A. Alexiou, Dimitrios Bilios, C. Bouras","doi":"10.1109/BWCCA.2013.36","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.36","url":null,"abstract":"Future mobile networks following Long Term Evolution (LTE) will be characterized by demanding services, in terms of bandwidth and delay, already dominant in wired networks, such as cloud-computing, High Definition of anything (HDOA) and highly-interactive online games. Small Cell technology is one of the key-technologies aiming to address the need for ultra-high performance in future mobile networks. This paper is focused on efficient power control in Small Cell Networks (SCNs). In particular, we propose a power control mechanism for efficient power allocation in SCNs. The proposed mechanism efficiently controls systems' interference while on the other hand guarantees home user QoS. We introduce the methodology of Priority Grouping, in which home users in the topology is assigned to one of the available groups with different priorities in terms of power requirements and requested traffic load. The mechanism dynamically updates the Home evolved Node B power setting based on the topology of the macro and home users in real time. Additionally, depending on the examined traffic scenario the mechanism can provide better protection (in terms of interference) either on macro users or on home users.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115153167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Design of State Acquisition Function Using Range Image Sensor for 3D Symbiotic Space 基于距离图像传感器的三维共生空间状态采集功能设计
T. Kawamura, Toru Abe, T. Suganuma
{"title":"A Design of State Acquisition Function Using Range Image Sensor for 3D Symbiotic Space","authors":"T. Kawamura, Toru Abe, T. Suganuma","doi":"10.1109/BWCCA.2013.110","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.110","url":null,"abstract":"We are aiming for realization of a 3D symbiotic space system that supports effective interaction among users in a real space and avatars in a virtual space by fusing both spaces sensuously. As described in this paper, we explain the improved design of a state acquisition function for the 3D symbiotic space system, which acquires the states of real space users to synchronize the states of virtual space avatars with them. Specifically, we propose a method to acquire the detailed behavior of real space users using a range image sensor. Through quantitative and qualitative experiments, we demonstrate the effectiveness of our proposed method for improving sensations for a 3D symbiotic space system.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123511659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management 使用无线传感器网络进行应急管理的云上安全医疗架构
A. Lounis, Abdelkrim Hadjidj, A. Bouabdallah, Y. Challal
{"title":"Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management","authors":"A. Lounis, Abdelkrim Hadjidj, A. Bouabdallah, Y. Challal","doi":"10.1109/BWCCA.2013.142","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.142","url":null,"abstract":"Recently introduced, Attribute-based encryption (ABE) is a promising cryptographic method proposed by Sahai and Waters. This technique provides means for designing scalable and fine-grained access control. In ABE, data are encrypted with an access structure which is the logical expression of the access policy (eg: the data can be accessed by physician in cardiology division or by nurses). The cyphertext (encrypted data) can be decrypted by any user if his secret key has attributes that satisfy the access policy. The power of ABE is that we do not need to rely on the storage server for avoiding unauthorized data access since the access policy is embedded in the cyphertext itself. This makes ABE good solution to provide a fine-grained access control for medical applications, where data is outsourced on untrusted servers like the case of the Cloud. However, for emergency management, integrating ABE creates particular challenges for providing temporary access victims medical data when this is needed. In this paper we present our architecture for secure emergency management in healthcare area. We address the challenge of ABE integrating for providing temporary access victims medical data in emergency situation. In addition, we use wireless sensor network (WSN) technology to provide early emergency detection.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123283485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A Study on the Integration of ISO 27001 & 27011 and the New Personal Information Protection Act in the Telecom Enterprises in Taiwan ISO 27001 &amp的整合研究27011与台湾电信企业个人资讯保护法之新规
I. Lin, Che-Min Lin, Chenglong Sun
{"title":"A Study on the Integration of ISO 27001 & 27011 and the New Personal Information Protection Act in the Telecom Enterprises in Taiwan","authors":"I. Lin, Che-Min Lin, Chenglong Sun","doi":"10.1109/BWCCA.2013.69","DOIUrl":"https://doi.org/10.1109/BWCCA.2013.69","url":null,"abstract":"Due to the flourishing development of mobile communications, Internet businesses, and mobile broadband, handheld mobile communications equipment is commonplace and the number of mobile phone users and fixed-line broadband users is growing rapidly every day. As the telecom industry stores massive amounts of users' personal Information, operators need to uphold users' trust in them, so users can enjoy the telecommunication services worry-free! Personal information security is of major concern in society today and also a social responsibility of enterprises. In response to the new Personal Information Protection Act in Taiwan, how carriers with imported information security management system can integrate the new Personal Information Protection Act to achieve their custodial responsibility must be discussed. Through the key management elements of ISO27001 & ISO27011 that correspond to the norms set to the appropriate security maintenance measures in Article 12 of the new Personal Information Protection Act Enforcement Rules in Taiwan, how carriers can strengthen management and educational training in compliance with the Act also requires discussion in Taiwan.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128559869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信