2010 Second International Conference on Communication Software and Networks最新文献

筛选
英文 中文
Implementation of Embedded Mobile Database Based on Mobile Agent 基于移动代理的嵌入式移动数据库的实现
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.80
Yan Yu, Jian-Hua Wang
{"title":"Implementation of Embedded Mobile Database Based on Mobile Agent","authors":"Yan Yu, Jian-Hua Wang","doi":"10.1109/ICCSN.2010.80","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.80","url":null,"abstract":"Theorists agree that embedded mobile database are an interesting new topic in the field of theory, and leading analysts concur. In our research, we confirm the implementation of embedded mobile database based on mobile agent, which embodies the confusing principles of mobile database. In order to achieve this aim, we use virtual modalities (HURLER) to validate that the acclaimed concurrent algorithm for the embedded mobile database based on mobile agent.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"72 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116657871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Low-Complexity Channel Estimation Method for IEEE802.11a and HIPERLAN/2 WLANs IEEE802.11a和HIPERLAN/2无线局域网的低复杂度信道估计方法
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.101
Feng Shi, Dengpeng Hu, E. Zhang
{"title":"A Low-Complexity Channel Estimation Method for IEEE802.11a and HIPERLAN/2 WLANs","authors":"Feng Shi, Dengpeng Hu, E. Zhang","doi":"10.1109/ICCSN.2010.101","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.101","url":null,"abstract":"In this paper, we propose a new channel estimation method for IEEE802.11a and HIPERLAN/2 wireless LANs. Based on the frequency coherence of the channel for wireless LANs, the absent frequency channel responds at virtual subcarriers and DC subcarrier are reconstructed by linear interpolation firstly, then channel estimation with time domain truncation is fulfilled. Simulation results show that the proposed method achieves a slightly better performance than the conventional iterative method and LS method while keeping less complexity.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125108108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Dynamic Multi-radio Multi-channel MAC Protocol for Wireless Sensor Networks 用于无线传感器网络的动态多无线电多通道MAC协议
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.19
Zhiwu Liu, Wei Wu
{"title":"A Dynamic Multi-radio Multi-channel MAC Protocol for Wireless Sensor Networks","authors":"Zhiwu Liu, Wei Wu","doi":"10.1109/ICCSN.2010.19","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.19","url":null,"abstract":"For improving throughput and energy efficiency in wireless sensor networks, multi-channel media access control has been proposed. Existing multi-channel MAC protocols are mainly focus on channel assignment and media access, it means that a senor node is bound with one channel, which makes the whole network inflexible and cannot be adapted to the variations of environment. In this paper, we proposed a Dynamic Multi-radio Multi-channel media Access control (DMMA) for wireless sensor networks, it can chose the channel dynamically according to the changing of spectrum environment, and make the network more robust to the interferences from external surroundings, meanwhile, take into account the energy efficiency, DMMA use a sleeping-based mechanism to reduce energy consumption. We also invent an ARM9 based four radios wireless sensor node to evaluate our solution on a real sensor network. Through our experiments, DMMA can avoid the impact of interference effectively, and also it achieves good fairness for multiple channel access.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125231266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Face Recognition-Based Convergence Communicator with Internet Telephony 基于人脸识别的网络电话融合通信器
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.119
Jungyu Lee, Jiho Kim, Sukhwan Song, Kyung-tae Kim, Ohyoung Song
{"title":"Face Recognition-Based Convergence Communicator with Internet Telephony","authors":"Jungyu Lee, Jiho Kim, Sukhwan Song, Kyung-tae Kim, Ohyoung Song","doi":"10.1109/ICCSN.2010.119","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.119","url":null,"abstract":"Nowadays convergence of digital appliances meet both economic and practical demands of users. And current UI of the appliances not only provides interesting to users but also enhances convenience and accessibility. In this paper, we propose FRETEL (Face Recognition-Based Convergence Communicator with Internet Telephony) that is a new digital home appliance that satisfies these requirements properly. Therefore, we have designed simple and interesting UI using touch screen and face recognition. And convergence with Internet telephone that is spread rapidly today improves usefulness.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122853969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Implementation of Brain Tumor Detection Using Soft Computing 基于软计算的脑肿瘤检测的改进实现
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.10
T. Logeswari, M. Karnan
{"title":"An Improved Implementation of Brain Tumor Detection Using Soft Computing","authors":"T. Logeswari, M. Karnan","doi":"10.1109/ICCSN.2010.10","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.10","url":null,"abstract":"Ant Colony Optimization (ACO) metaheuristic is a recent population-based approach inspired by the observation of real ants colony and based upon their collective foraging behavior. In ACO, solutions of the problem are constructed within a stochastic iterative process, by adding solution components to partial solutions. Each individual ant constructs a part of the solution using an artificial pheromone, which reflects its experience accumulated while solving the problem, and heuristic information dependent on the problem. In this paper, the proposed technique ACO hybrid with Fuzzy and Hybrid Self Organizing Hybrid with Fuzzy describe segmentation consists of two steps. In the first step, the MRI brain image is Segmented using HSOM Hybrid with Fuzzy and the second step ACO Hybrid with Fuzzy method to extract the suspicious region Both techniques are compared and performance evaluation is evaluated.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132734070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Framework for Alternate Execution of Workflows Under Threat 威胁下工作流的替代执行框架
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.79
S. Safdar, M. Hassan, M. Qureshi, R. Akbar
{"title":"Framework for Alternate Execution of Workflows Under Threat","authors":"S. Safdar, M. Hassan, M. Qureshi, R. Akbar","doi":"10.1109/ICCSN.2010.79","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.79","url":null,"abstract":"The main objective of the research is to propose an execution framework for workflow systems under threat. When the threat (intrusion) is detected, the workflow system needs to be stopped immediately to avoid any possible loss of enterprise data. The system becomes active again, once it is completely recovered from the threat. This proposed framework overcomes the problem of discontinuity of services as a result of threat detection by enabling the execution of the workflow on an alternate path, keeping the security and integrity of the asset information intact. Hence the system remains available all the time in a secured fashion making it possible for the end user to access the services and data even in the vulnerable state. To achieve the specified goals, the special authentication mechanism has been adopted to authorize the users after threat is detected. Then the data is hibernated that is transferred to the designed dimensions and the connectivity and access to the hibernated data is provided by the chameleon agent. These three core components enable the workflow to execute in a secured and robust manner during system’s unsafe state.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"522 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133698929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Web Cache Consistency Maintenance Through Agents 通过代理维护Web缓存一致性
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.84
A. Kannammal, Rema Padmanabhan, N. Iyengar
{"title":"Web Cache Consistency Maintenance Through Agents","authors":"A. Kannammal, Rema Padmanabhan, N. Iyengar","doi":"10.1109/ICCSN.2010.84","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.84","url":null,"abstract":"This paper proposes the utilization of mobile agents to increase the performance in maintaining the consistency of web caches. Most popular browsers like Internet Explorer and Netscape are providing options to cache the frequently used web pages in the client sites itself in order to provide faster access to the clients and to reduce the network overhead due to the reduction in number of messages transferred. In this environment, the difficulty is in maintaining the web caches in a consistent state by updating the web pages that are cached. This paper addresses this issue by exploiting the potential benefits of agent technology over this domain and analyzes its usage in increasing the performance. The performance is optimized in terms of reduction in the network load and reduction in the response time to the clients.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133896737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On Super-Psudorandomness of MISTY-Type Tweakable Blockciphers 论mist型可调分组密码的超伪随机性
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.49
Fengtong Wen
{"title":"On Super-Psudorandomness of MISTY-Type Tweakable Blockciphers","authors":"Fengtong Wen","doi":"10.1109/ICCSN.2010.49","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.49","url":null,"abstract":"An open problem about tweakable blockcipher proposed by Liskov et al. is how to construct tweakable blockciphers without using pre-existing blockcipher. In this paper, on the basis of MISTY-Type transformation, we perform a systematic study of the open problem. We analyze the approach of including a tweak by XORing the tweak value into one place in the dataflow of the MISTY-Type structure. We mainly discuss the super-pseudo randomness of the structure. We conclude that the 5 round MISTY-Type tweakable blockciphers are not CCA-secure and there exists CCA-secure 6 round MISTY-Type tweakable blockciphers. Finally, we give the concrete cryptanalysis for the CCA-secure 6 round MISTY-Type tweakable blockciphers.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134201697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Redundant Audio Watermarking Technique Using Discrete Wavelet Transformation 基于离散小波变换的冗余音频水印技术
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.57
K. Datta, I. Sengupta
{"title":"A Redundant Audio Watermarking Technique Using Discrete Wavelet Transformation","authors":"K. Datta, I. Sengupta","doi":"10.1109/ICCSN.2010.57","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.57","url":null,"abstract":"A frame based audio watermarking scheme using Discrete Wavelet Transformation (DWT) is presented in this paper. The algorithm embeds the copyright information into the consecutive levels of approximate coefficients of the DWT transformed audio signal. To increase the robustness of the proposed scheme, the information bits are embedded multiple times at the different levels. Embedding of redundant bits results in degradation of SNR and PSNR values; however, experimental results show that the degradation are within acceptable range. Extraction of the watermarked audio signal is carried out by considering the majority of the watermark bits extracted from different levels. The proposed scheme demonstrates results which tend to resist infiltration against many signal processing manipulations, like MP3 compression, re-sampling, quantization and noise addition.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123110500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Fast Virus Signature Matching Based on the High Performance Computing of GPU 基于GPU高性能计算的病毒特征码快速匹配
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.72
Yang Cheng
{"title":"Fast Virus Signature Matching Based on the High Performance Computing of GPU","authors":"Yang Cheng","doi":"10.1109/ICCSN.2010.72","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.72","url":null,"abstract":"For the virus signature matching time of traditional the eigenvalue is too long, which can’t meet the need of the information security, a method of fast virus signature matching on the GPU is compelled. The system uses the GPU as a fast filter to quickly identify possible virus signatures for thousands of data objects in parallel. The performance of their library suggests that the GPU is now a viable platform for cost-effective, high-performance network security processing. And it shows that the computing speed of the eigenvalue based on GPU is obviously higher than the eigenvalue based on CPU by the experiment.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121174476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信