International Conference on Network, Communication and Computing最新文献

筛选
英文 中文
Modeling the Impact of Clustering with Random Event Arrival on the Lifetime of WSN 随机事件到达聚类对WSN生存期影响的建模
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033331
M. F. Rahman, Farhad Mehdipour, H. Furukawa
{"title":"Modeling the Impact of Clustering with Random Event Arrival on the Lifetime of WSN","authors":"M. F. Rahman, Farhad Mehdipour, H. Furukawa","doi":"10.1145/3033288.3033331","DOIUrl":"https://doi.org/10.1145/3033288.3033331","url":null,"abstract":"Energy efficiency and network lifetime are the most critical issues for Wireless Sensor Networks (WSNs). Clustering is one of the well-known techniques to reduce the energy consumption of the network and improving its lifetime as well. However, clustering itself is time and energy-consuming. Besides, some other ultimate factors such as radio propagation models; network traffic probability are also influencing factors of energy consumption. To ensure the energy efficient network operation, it is essential to taken into account the mentioned factors. Since the number of events occurred inside the network are directly related to the node's energy consumption. For this reason based on the random event arrival; it is crucial to determine an appropriate clustering frequency so that the network lifetime is maximized. We rely on the Poisson distribution, where we can assume random event arrival inside the network. Again formulate clustering problem and sketch a guideline on acquiring an optimal number of clustering in favor of height network lifetime.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122912869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Real Time Endoscopic Image Analysis Algorithm 实时内镜图像分析算法
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033350
Kadushnikov Radi, Studenok Sergey, M. Vyacheslav
{"title":"The Real Time Endoscopic Image Analysis Algorithm","authors":"Kadushnikov Radi, Studenok Sergey, M. Vyacheslav","doi":"10.1145/3033288.3033350","DOIUrl":"https://doi.org/10.1145/3033288.3033350","url":null,"abstract":"New algorithm for the real time processing of narrow--band endoscopic images with a highly productive distributed intellectual analytic decision--making system for multiscale endoscopic diagnostics is presented. The algorithm uses scale--invariant feature transform detector, computing skeletons of gastric mucosa pit-patterns, \"Bag of visual words\" (\"Bag of features\") method, and K--means method for key points. Resulting algorithm is completely automated, performs real time analysis, and does not require preliminary selection of interest area. Image classification accuracy exceeds 78%. The use of neural network recognition improves image classification accuracy up to 93%.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133249181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Text Mining Based on Refined Feature Selection to Predict Sentimental Review 基于精细特征选择的文本挖掘预测情感评论
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033307
Ching-Hsue Cheng
{"title":"A Text Mining Based on Refined Feature Selection to Predict Sentimental Review","authors":"Ching-Hsue Cheng","doi":"10.1145/3033288.3033307","DOIUrl":"https://doi.org/10.1145/3033288.3033307","url":null,"abstract":"This paper proposed an additional feature set and reduced the data dimension by SVD and PCA in order to increase accuracy and decrease executing time in text mining. The contribution of this study has: (i) proposed a preprocessing algorithm for sentiment classification, (ii) refined a feature set by adding adjective and adverb feature for sentiment classification, and (iii) utilized SVD then PCA to reduce data dimension for manager identified the sentimental labels. The experimental results show that the proposed model can obtain the better accuracy and the additional features make the better performance. Moreover, the dimension reduction can reduce the executing time effectively.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134470751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EaaS: Available yet Hidden Infrastructure inside MSE EaaS: MSE内部可用但隐藏的基础设施
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033303
P. Ng, C. Kang, A. Mahmood, S. Wong, K. Y. Phan, S. Saw, J. T. Lim
{"title":"EaaS: Available yet Hidden Infrastructure inside MSE","authors":"P. Ng, C. Kang, A. Mahmood, S. Wong, K. Y. Phan, S. Saw, J. T. Lim","doi":"10.1145/3033288.3033303","DOIUrl":"https://doi.org/10.1145/3033288.3033303","url":null,"abstract":"Information technology infrastructure investment is a central issue for Malaysia medium size enterprises facing scarcity resource during economic turbulence. In this paper, we propose a cost-effective resource pooling capacity building the solution that optimizes on demand service. Further, we examine the suitability of legacy theories for a commodity of IT infrastructure and disruptive technology. Our argument opens up a helicopter angle of the strategic investment correlation between the proposed consolidated infrastructure features and important organizational variables for economic sustainable. The research was conducted via survey questionnaire with data compiled from 100 respondents in Peninsular Malaysia and is to test-retest the reliability of the previous 122 respondents for information consistency. The findings of the research ascertain that un-optimized and un-reusabilities of existing desktop are two significant determinants of infrastructure investment. Our findings further show that inefficient utilization gap is a distal determinant of investment, exerting its influence indirectly from the over investment and over budget. The analysis lead us to propose an organic rapid elasticity infrastructure service that will grow or shrink with the business performance. We discuss the contribution of the research findings for Exostructure as a Service framework while concluding the urgent need to revitalize the computing requirements.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"25 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133362234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Cryptanalysis of Several Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks 基于无线医疗传感器网络的几种医疗应用认证方案的密码分析
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033293
S. Yoo
{"title":"Cryptanalysis of Several Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks","authors":"S. Yoo","doi":"10.1145/3033288.3033293","DOIUrl":"https://doi.org/10.1145/3033288.3033293","url":null,"abstract":"Wireless sensor networks are being applied in different fields. One of those fields is the body sensor networks. Body sensor networks is a kind of wireless sensor network with higher flexibility and sensitivity because the sensors are put on or in user's body. As healthcare applications includes confidential information, security becomes one of the most important aspects to consider. As a contribution to this field, Kumar et al. proposed an efficient-strong authentication protocol for healthcare application using wireless medical sensor networks in 2012. Later, Khan and Kumari presented their research work where they identified vulnerabilities in Kumar et al.'s work and proposed their own authentication scheme based on the two-factor user authentication concept. Additionally, Shin et al. also proposed a secure authentication mechanism. However, this paper finds that previous works are flawed with a number of security pitfalls. This paper cryptanalyzes the aforementioned works and shows how those works are vulnerable to data leakage, man in the middle attack, password guessing attack, replay attack, and manages insecure keys.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"2022 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128072046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TCAM-Based Packet Classification Using Multi-stage Scheme 基于tcam的多阶段分组分类
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033302
Hsin-Tsung Lin, Pi-Chung Wang
{"title":"TCAM-Based Packet Classification Using Multi-stage Scheme","authors":"Hsin-Tsung Lin, Pi-Chung Wang","doi":"10.1145/3033288.3033302","DOIUrl":"https://doi.org/10.1145/3033288.3033302","url":null,"abstract":"As the number of network services increases, the scale and complexity of network also arise. Software-Defined Networking (SDN) is a new network architecture during the past few years. OpenFlow is a celebrated protocol for SDN. It has two characteristics we mostly concerned. First, it provides many match fields to fulfill different network strategies. Second, rule table partition is allowable. However, these two characteristics may result in considerable memory space and prolonged lookup time.\u0000 In this paper, we propose a TCAM-based packet classification method to mitigate the problem mentioned above. Our method includes multiple stages, where only some fields are compared in a stage. We also propose a refinement to further reduce memory accesses. Our scheme achieves different levels of improvements for different classifier as the experimental results show.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131465667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptanalysis of Dimitriou's Key Evolving RFID Systems Dimitriou密钥演化RFID系统的密码分析
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033292
Cheng-Chi Lee, Chung-Lun Cheng, Yan-Ming Lai, Chun-Ta Li
{"title":"Cryptanalysis of Dimitriou's Key Evolving RFID Systems","authors":"Cheng-Chi Lee, Chung-Lun Cheng, Yan-Ming Lai, Chun-Ta Li","doi":"10.1145/3033288.3033292","DOIUrl":"https://doi.org/10.1145/3033288.3033292","url":null,"abstract":"In the last decade, the technology of Radio Frequency Identification (RFID) has boomed in the wireless communication environment. Applications of RFID have matured and reached far into various fields such as smart building, healthcare, supply chain management, etc. However, along with the rapid advancement of RFID systems have come many security issues, among which stands the transfer of ownership. Generally speaking, RFID tags can be reused multiple times, and the identity of the owner of a tag can vary in different scenarios. Recently, Tassos Dimitriou published a study that presented several key evolving schemes and discussed the issue of how the ownership of RFID tags could be properly transferred with some security requirements met. Unfortunately, Dimitriou's systems have some security vulnerabilities. In this paper, the authors shall point out some weak-nesses of Dimitriou's RFID systems including the mutual authentication part of the basic authentication scheme, the backward privacy problem of the key update scheme, as well as backward privacy for controlled delegation and authorization recovery.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126610873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Efficient Approach for Automatic Number Plate Recognition for Low Resolution Images 低分辨率车牌自动识别的一种有效方法
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033332
T. Kumar, Suraj Gupta, D. S. Kushwaha
{"title":"An Efficient Approach for Automatic Number Plate Recognition for Low Resolution Images","authors":"T. Kumar, Suraj Gupta, D. S. Kushwaha","doi":"10.1145/3033288.3033332","DOIUrl":"https://doi.org/10.1145/3033288.3033332","url":null,"abstract":"Apart from the developed countries, many developing countries are facing the wrath of internal and external security. Inadequate resources force these countries to adopt the usage of Automatic Number Plate Recognition (ANPR) system to ramp up security to a certain extent. These countries use CCTV cameras for manual surveillance. The proposed ANPR system is designed to work with these CCTV cameras. Fundamental components of the image are for image enhancement, character segmentation and character recognition. Novel techniques for each of these components are the main contributions of this work. The proposed approach has been tested on both low and high resolution images. In low resolution images, the average accuracy in character recognition achieved by the proposed approach is 96.2% and the average accuracy in character segmentation is 100% whereas the other existing techniques are unable to recognize the number plates. In good quality images, the proposed approach achieves 100% accuracy in character segmentation and 95.3% average accuracy in character recognition. The approach achieves 4.5% improvement over other existing approaches in character segmentation for good quality images.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122241759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Sea-Land Segmentation Based on Template Matching 基于模板匹配的海陆分割
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033309
Shanlan Nie, Haopeng Zhang, Zhi-guo Jiang
{"title":"Sea-Land Segmentation Based on Template Matching","authors":"Shanlan Nie, Haopeng Zhang, Zhi-guo Jiang","doi":"10.1145/3033288.3033309","DOIUrl":"https://doi.org/10.1145/3033288.3033309","url":null,"abstract":"In this paper, a novel sea-land segmentation method based on template matching is proposed. Firstly, we use OTSU to get coastline curve from harbor image. Subsequently, the curvature integral of the coastline curve is calculated as our matching signature, and matched parts between the two curves are found by using normalized cross-correlation. Finally, affine transformation is estimated and applied, thus completing the sea-land segmentation in harbor image. In order to research the limit capacity of template matching over the image resolution and relative angle between template image and harbor image, experiments on Google Map dataset had been made, and the boundary condition on resolution and angle was analyzed based on the experimental results.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114139545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Innovation Oriented Hyper Model and Evolution of Knowledge Network 面向创新的超模型与知识网络演化
International Conference on Network, Communication and Computing Pub Date : 2016-12-17 DOI: 10.1145/3033288.3033343
Jian Xie, Lin Gong, Zijian Zhang, Yan Yan, Sheng Tang
{"title":"Innovation Oriented Hyper Model and Evolution of Knowledge Network","authors":"Jian Xie, Lin Gong, Zijian Zhang, Yan Yan, Sheng Tang","doi":"10.1145/3033288.3033343","DOIUrl":"https://doi.org/10.1145/3033288.3033343","url":null,"abstract":"Aiming at the topological characteristics and unclear innovation of knowledge network, a hyper model for knowledge was established. Based on the model, the keyword network and its evolution model were constructed with a newly-raised concept called innovation degree which measures the innovation in specific knowledge field. After that, specific model was constructed and its evolution was analyzed through papers from the field of artificial intelligence, which verified that the topological structure presented small-world nature and the innovation degree were effective in identifying the direction of knowledge innovation in relevant fields.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115607505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信