{"title":"Modeling the Impact of Clustering with Random Event Arrival on the Lifetime of WSN","authors":"M. F. Rahman, Farhad Mehdipour, H. Furukawa","doi":"10.1145/3033288.3033331","DOIUrl":"https://doi.org/10.1145/3033288.3033331","url":null,"abstract":"Energy efficiency and network lifetime are the most critical issues for Wireless Sensor Networks (WSNs). Clustering is one of the well-known techniques to reduce the energy consumption of the network and improving its lifetime as well. However, clustering itself is time and energy-consuming. Besides, some other ultimate factors such as radio propagation models; network traffic probability are also influencing factors of energy consumption. To ensure the energy efficient network operation, it is essential to taken into account the mentioned factors. Since the number of events occurred inside the network are directly related to the node's energy consumption. For this reason based on the random event arrival; it is crucial to determine an appropriate clustering frequency so that the network lifetime is maximized. We rely on the Poisson distribution, where we can assume random event arrival inside the network. Again formulate clustering problem and sketch a guideline on acquiring an optimal number of clustering in favor of height network lifetime.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122912869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Real Time Endoscopic Image Analysis Algorithm","authors":"Kadushnikov Radi, Studenok Sergey, M. Vyacheslav","doi":"10.1145/3033288.3033350","DOIUrl":"https://doi.org/10.1145/3033288.3033350","url":null,"abstract":"New algorithm for the real time processing of narrow--band endoscopic images with a highly productive distributed intellectual analytic decision--making system for multiscale endoscopic diagnostics is presented. The algorithm uses scale--invariant feature transform detector, computing skeletons of gastric mucosa pit-patterns, \"Bag of visual words\" (\"Bag of features\") method, and K--means method for key points. Resulting algorithm is completely automated, performs real time analysis, and does not require preliminary selection of interest area. Image classification accuracy exceeds 78%. The use of neural network recognition improves image classification accuracy up to 93%.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133249181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Text Mining Based on Refined Feature Selection to Predict Sentimental Review","authors":"Ching-Hsue Cheng","doi":"10.1145/3033288.3033307","DOIUrl":"https://doi.org/10.1145/3033288.3033307","url":null,"abstract":"This paper proposed an additional feature set and reduced the data dimension by SVD and PCA in order to increase accuracy and decrease executing time in text mining. The contribution of this study has: (i) proposed a preprocessing algorithm for sentiment classification, (ii) refined a feature set by adding adjective and adverb feature for sentiment classification, and (iii) utilized SVD then PCA to reduce data dimension for manager identified the sentimental labels. The experimental results show that the proposed model can obtain the better accuracy and the additional features make the better performance. Moreover, the dimension reduction can reduce the executing time effectively.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134470751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Ng, C. Kang, A. Mahmood, S. Wong, K. Y. Phan, S. Saw, J. T. Lim
{"title":"EaaS: Available yet Hidden Infrastructure inside MSE","authors":"P. Ng, C. Kang, A. Mahmood, S. Wong, K. Y. Phan, S. Saw, J. T. Lim","doi":"10.1145/3033288.3033303","DOIUrl":"https://doi.org/10.1145/3033288.3033303","url":null,"abstract":"Information technology infrastructure investment is a central issue for Malaysia medium size enterprises facing scarcity resource during economic turbulence. In this paper, we propose a cost-effective resource pooling capacity building the solution that optimizes on demand service. Further, we examine the suitability of legacy theories for a commodity of IT infrastructure and disruptive technology. Our argument opens up a helicopter angle of the strategic investment correlation between the proposed consolidated infrastructure features and important organizational variables for economic sustainable. The research was conducted via survey questionnaire with data compiled from 100 respondents in Peninsular Malaysia and is to test-retest the reliability of the previous 122 respondents for information consistency. The findings of the research ascertain that un-optimized and un-reusabilities of existing desktop are two significant determinants of infrastructure investment. Our findings further show that inefficient utilization gap is a distal determinant of investment, exerting its influence indirectly from the over investment and over budget. The analysis lead us to propose an organic rapid elasticity infrastructure service that will grow or shrink with the business performance. We discuss the contribution of the research findings for Exostructure as a Service framework while concluding the urgent need to revitalize the computing requirements.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"25 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133362234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of Several Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks","authors":"S. Yoo","doi":"10.1145/3033288.3033293","DOIUrl":"https://doi.org/10.1145/3033288.3033293","url":null,"abstract":"Wireless sensor networks are being applied in different fields. One of those fields is the body sensor networks. Body sensor networks is a kind of wireless sensor network with higher flexibility and sensitivity because the sensors are put on or in user's body. As healthcare applications includes confidential information, security becomes one of the most important aspects to consider. As a contribution to this field, Kumar et al. proposed an efficient-strong authentication protocol for healthcare application using wireless medical sensor networks in 2012. Later, Khan and Kumari presented their research work where they identified vulnerabilities in Kumar et al.'s work and proposed their own authentication scheme based on the two-factor user authentication concept. Additionally, Shin et al. also proposed a secure authentication mechanism. However, this paper finds that previous works are flawed with a number of security pitfalls. This paper cryptanalyzes the aforementioned works and shows how those works are vulnerable to data leakage, man in the middle attack, password guessing attack, replay attack, and manages insecure keys.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"2022 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128072046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TCAM-Based Packet Classification Using Multi-stage Scheme","authors":"Hsin-Tsung Lin, Pi-Chung Wang","doi":"10.1145/3033288.3033302","DOIUrl":"https://doi.org/10.1145/3033288.3033302","url":null,"abstract":"As the number of network services increases, the scale and complexity of network also arise. Software-Defined Networking (SDN) is a new network architecture during the past few years. OpenFlow is a celebrated protocol for SDN. It has two characteristics we mostly concerned. First, it provides many match fields to fulfill different network strategies. Second, rule table partition is allowable. However, these two characteristics may result in considerable memory space and prolonged lookup time.\u0000 In this paper, we propose a TCAM-based packet classification method to mitigate the problem mentioned above. Our method includes multiple stages, where only some fields are compared in a stage. We also propose a refinement to further reduce memory accesses. Our scheme achieves different levels of improvements for different classifier as the experimental results show.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131465667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cheng-Chi Lee, Chung-Lun Cheng, Yan-Ming Lai, Chun-Ta Li
{"title":"Cryptanalysis of Dimitriou's Key Evolving RFID Systems","authors":"Cheng-Chi Lee, Chung-Lun Cheng, Yan-Ming Lai, Chun-Ta Li","doi":"10.1145/3033288.3033292","DOIUrl":"https://doi.org/10.1145/3033288.3033292","url":null,"abstract":"In the last decade, the technology of Radio Frequency Identification (RFID) has boomed in the wireless communication environment. Applications of RFID have matured and reached far into various fields such as smart building, healthcare, supply chain management, etc. However, along with the rapid advancement of RFID systems have come many security issues, among which stands the transfer of ownership. Generally speaking, RFID tags can be reused multiple times, and the identity of the owner of a tag can vary in different scenarios. Recently, Tassos Dimitriou published a study that presented several key evolving schemes and discussed the issue of how the ownership of RFID tags could be properly transferred with some security requirements met. Unfortunately, Dimitriou's systems have some security vulnerabilities. In this paper, the authors shall point out some weak-nesses of Dimitriou's RFID systems including the mutual authentication part of the basic authentication scheme, the backward privacy problem of the key update scheme, as well as backward privacy for controlled delegation and authorization recovery.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126610873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Approach for Automatic Number Plate Recognition for Low Resolution Images","authors":"T. Kumar, Suraj Gupta, D. S. Kushwaha","doi":"10.1145/3033288.3033332","DOIUrl":"https://doi.org/10.1145/3033288.3033332","url":null,"abstract":"Apart from the developed countries, many developing countries are facing the wrath of internal and external security. Inadequate resources force these countries to adopt the usage of Automatic Number Plate Recognition (ANPR) system to ramp up security to a certain extent. These countries use CCTV cameras for manual surveillance. The proposed ANPR system is designed to work with these CCTV cameras. Fundamental components of the image are for image enhancement, character segmentation and character recognition. Novel techniques for each of these components are the main contributions of this work. The proposed approach has been tested on both low and high resolution images. In low resolution images, the average accuracy in character recognition achieved by the proposed approach is 96.2% and the average accuracy in character segmentation is 100% whereas the other existing techniques are unable to recognize the number plates. In good quality images, the proposed approach achieves 100% accuracy in character segmentation and 95.3% average accuracy in character recognition. The approach achieves 4.5% improvement over other existing approaches in character segmentation for good quality images.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122241759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sea-Land Segmentation Based on Template Matching","authors":"Shanlan Nie, Haopeng Zhang, Zhi-guo Jiang","doi":"10.1145/3033288.3033309","DOIUrl":"https://doi.org/10.1145/3033288.3033309","url":null,"abstract":"In this paper, a novel sea-land segmentation method based on template matching is proposed. Firstly, we use OTSU to get coastline curve from harbor image. Subsequently, the curvature integral of the coastline curve is calculated as our matching signature, and matched parts between the two curves are found by using normalized cross-correlation. Finally, affine transformation is estimated and applied, thus completing the sea-land segmentation in harbor image. In order to research the limit capacity of template matching over the image resolution and relative angle between template image and harbor image, experiments on Google Map dataset had been made, and the boundary condition on resolution and angle was analyzed based on the experimental results.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114139545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jian Xie, Lin Gong, Zijian Zhang, Yan Yan, Sheng Tang
{"title":"Innovation Oriented Hyper Model and Evolution of Knowledge Network","authors":"Jian Xie, Lin Gong, Zijian Zhang, Yan Yan, Sheng Tang","doi":"10.1145/3033288.3033343","DOIUrl":"https://doi.org/10.1145/3033288.3033343","url":null,"abstract":"Aiming at the topological characteristics and unclear innovation of knowledge network, a hyper model for knowledge was established. Based on the model, the keyword network and its evolution model were constructed with a newly-raised concept called innovation degree which measures the innovation in specific knowledge field. After that, specific model was constructed and its evolution was analyzed through papers from the field of artificial intelligence, which verified that the topological structure presented small-world nature and the innovation degree were effective in identifying the direction of knowledge innovation in relevant fields.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115607505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}