2010 Second International Conference on Communication Software and Networks最新文献

筛选
英文 中文
Optimal Power Allocation for Cooperative Networks 合作网络的最优功率分配
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.38
Yuewu Dong, X. Wen, Wei Zheng, Yong Sun
{"title":"Optimal Power Allocation for Cooperative Networks","authors":"Yuewu Dong, X. Wen, Wei Zheng, Yong Sun","doi":"10.1109/ICCSN.2010.38","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.38","url":null,"abstract":"In cellular network, the deployment of the relay station can bring spatial diversity to increase link capacity and improve communication performance. In this paper, we consider an optimal power allocation scheme for the source and the relay to minimize the bit error rate(BER) at the destination under the power and outage constraint in cooperative relay system. Simulation results show that the BER performance can achieve a significant gain by the proposed power allocation scheme. With different relay strategies such as AF and DF, different transmit power are allocated for the source and the relay to achieve the required BER performance in the downlink cooperation.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115959766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding Optimal LSB Substitution Using Ant Colony Optimization Algorithm 利用蚁群优化算法寻找最优LSB替代
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.61
Ching-Sheng Hsu, Shu-Fen Tu
{"title":"Finding Optimal LSB Substitution Using Ant Colony Optimization Algorithm","authors":"Ching-Sheng Hsu, Shu-Fen Tu","doi":"10.1109/ICCSN.2010.61","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.61","url":null,"abstract":"The Least Significant Bit (LSB) Substitution is a kind of information hiding method. The secret message is embedded into the last r bits of a cover image to get away from the notice of hackers. The security and stego-image quality are two main issues of the LSB substitution method. Therefore, some researchers propose an LSB substitution matrix to address these two issues. Finding an optimal LSB substitution matrix can be seen as a problem of combinatorial optimization. There are 2r! feasible solutions, hence the search space grows notably when r increases. Consequently, an efficient method to construct the matrix is necessary. In this paper, we apply the Ant Colony Optimization Algorithm to construct an optimal LSB substitution matrix. The experimental results show that ACO can find optimal LSB substitution matrix efficiently and improve the qualities of the stego-images.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126801355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
A New Method for Identification of MQAM Signals in Rayleigh Fading Channel 瑞利衰落信道中MQAM信号识别的新方法
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.31
M. Huang, Bingbing Li, B. Lan, Yanling Li
{"title":"A New Method for Identification of MQAM Signals in Rayleigh Fading Channel","authors":"M. Huang, Bingbing Li, B. Lan, Yanling Li","doi":"10.1109/ICCSN.2010.31","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.31","url":null,"abstract":"This paper presents a method for the automatic classification of MQAM signals in Rayleigh fading channel. The advantage of our method is that, by designing a feature vector which is composed of higher order moments, we do not have to acquire a priori knowledge of signal parameters, what is more, it is a simple, very low complexity, robust method. Computer simulations are made and the results show that our method can reach much better classification accuracy than the existing methods.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128073175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ARIMA Based Network Anomaly Detection 基于ARIMA的网络异常检测
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.55
A. H. Yaacob, I. Tan, S. Chien, Hongquan Tan
{"title":"ARIMA Based Network Anomaly Detection","authors":"A. H. Yaacob, I. Tan, S. Chien, Hongquan Tan","doi":"10.1109/ICCSN.2010.55","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.55","url":null,"abstract":"An early warning system on potential attacks from networks will enable network administrators or even automated network management software to take preventive measures. This is needed as we move towards maximizing the utilization of the network with new paradigms such as Web Services and Software As A Service. This paper introduces a novel approach through using Auto-Regressive Integrated Moving Average (ARIMA) technique to detect potential attacks that may occur in the network. The solution is able to provide feedback through its predictive capabilities and hence provide an early warning system. With the affirmative results, this technique can serve beyond the detection of Denial of Service (DoS) and with sufficient development; an automated defensive solution can be achieved.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130337450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
VANET Security Framework for Trusted Grouping Using TPM Hardware 基于TPM硬件的可信分组VANET安全框架
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.115
A. Wagan, B. M. Mughal, H. Hasbullah
{"title":"VANET Security Framework for Trusted Grouping Using TPM Hardware","authors":"A. Wagan, B. M. Mughal, H. Hasbullah","doi":"10.1109/ICCSN.2010.115","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.115","url":null,"abstract":"Vehicular Ad hoc Network (VANET) is a network of vehicles on the roads, of which the success of its applications is highly dependent upon the underlying security mechanism. The default trial asymmetric PKI/ECDSA security mechanism is known for its high computational cost, thus lacking applicability in life-critical safety messaging. Alternative security schemes, such as symmetric methods provide faster communication at the expense of reduced security. Hence, hybrid and hardware based solutions were proposed by researchers to ease the issue. However, these solutions either do not support the existing VANET PKI standard or have larger message size. In this paper, we present a hardware based security framework that uses both standard asymmetric PKI and symmetric cryptography for faster and secure safety message exchange. The proposed framework is expected to improve security mechanism in VANET by developing trust relationship among the neighboring nodes, hence forming trusted groups. The trust is established via Trusted Platform Module (TPM) and group communication.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130985871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
An Imperceptible Frequency-Domain Watermarking Scheme without Resorting to the Original Image 一种不依赖原始图像的不可感知频域水印方案
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.28
Shu-Fen Tu, Ching-Sheng Hsu
{"title":"An Imperceptible Frequency-Domain Watermarking Scheme without Resorting to the Original Image","authors":"Shu-Fen Tu, Ching-Sheng Hsu","doi":"10.1109/ICCSN.2010.28","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.28","url":null,"abstract":"The aim of this paper is to propose an imperceptible wavelet-based watermarking scheme. In our scheme, we use variation to define the degree of transparence of coefficients of LL band and further determine transparent coefficients of HL3 and LH3 bands. Then, the watermark is embedded into those coefficients. In addition, the modular operation is utilized during watermark embedding. In the experimental results, we simulate some common attacks on the watermarked image. It is shown that our scheme is robust against most attacks; moreover, the watermarked image is highly imperceptible.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115745473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cross Layer Power Efficient Cooperative Diversity Scheme for Wireless Hybrid Ad Hoc Networks 无线混合Ad Hoc网络的跨层高效协同分集方案
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.70
Yingji Zhong
{"title":"Cross Layer Power Efficient Cooperative Diversity Scheme for Wireless Hybrid Ad Hoc Networks","authors":"Yingji Zhong","doi":"10.1109/ICCSN.2010.70","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.70","url":null,"abstract":"The multi-scenario topology of the wireless hybrid Ad Hoc networks is studied and a novel Cross Layer Power Efficient Cooperative Diversity Scheme (CL-PECDS) is proposed in this paper. The comparison and the predominance of the proposed scheme are demonstrated. With the help of the simulations, the relative energy consumption and the end-to-end blocking probability are all improved. The addressing ratio of success in the condition of the unchanged parameters and external information can be increased and the network can tolerate more hops to support reliable transportation by the proposed scheme.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124275196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimal Multiple Sink Nodes Deployment in Wireless Sensor Networks Based on Gene Expression Programming 基于基因表达式编程的无线传感器网络多汇聚节点最优部署
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.33
Shucheng Dai, Changjie Tang, Shaojie Qiao, Kaikuo Xu, Hongjun Li, Jun Zhu
{"title":"Optimal Multiple Sink Nodes Deployment in Wireless Sensor Networks Based on Gene Expression Programming","authors":"Shucheng Dai, Changjie Tang, Shaojie Qiao, Kaikuo Xu, Hongjun Li, Jun Zhu","doi":"10.1109/ICCSN.2010.33","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.33","url":null,"abstract":"In wireless sensor networks (WSN) data transmission is usually performed by sensors in manner of multi-hop forwarding towards a central static control center (sink). A lot of cheap, low-powered and energy-limited sensors are deployed in the monitored area and some of these nodes closer to the sink node use up their energy more quickly than other nodes because they relay more packets. Although most of the sensor nodes have enough energy left to work, the energy consumption imbalance leads to connectivity holes and coverage holes, and finally the whole network failure. The main contributions of this paper include: (a) a new scheme based on multiple sink nodes is proposed to prolong the network lifetime and to reduce the response time. It is effective, especially in the target tracking applications, (b) the deployment strategy with given number of multiple sink nodes is explored in the grid sensor network, (c) Gene Expression Programming based Multiple Sink Nodes deployment algorithm (GEP-MSN) is proposed to optimally deploy multiple sink nodes over the monitored region, (d) a data transmission cost model (TCM) is introduced to measure the cost for optimizing during the transmission phase, (e) extensive simulations are conducted to show that the scheme can greatly extend the network lifetime by around 16.6% and 36.3% on average compared with two naive methods based on random distributed sink nodes.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121292744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Client's Perspective: Realization as a New Generation Process for Software Project Development and Management 客户视角:实现作为软件项目开发与管理的新一代过程
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.96
R. Akbar, M. Hassan, S. Safdar, M. Qureshi
{"title":"Client's Perspective: Realization as a New Generation Process for Software Project Development and Management","authors":"R. Akbar, M. Hassan, S. Safdar, M. Qureshi","doi":"10.1109/ICCSN.2010.96","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.96","url":null,"abstract":"IT industry despite the wide use of most modern tools and technologies has been unable to achieve targeted success. Awry situations in projects have become routine matter. Besides technical other factors influencing software development activities also need to be considered. Software development and consultancy organizations must realize the importance of such technical and non-technical factors like client’s perspective, organizational environment, company policies and social infrastructure. Identification and managing such issues are more cumbersome than routine practical tasks. This paper focuses on one of the most important and critical cum technical factor client’s perspective. Elements comprising client’s perspective are identified and the spider web model is proposed to practice it. Real projects based evaluation is made. The results elaborate the client based practices. Client based practices would be an advent of new generation of processes to overcome IT industry dilemma.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123314179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A New Channel Estimation Method for OFDM Systems Based on Adaptive-Asymmetric Filter in the Transform Domain 基于变换域自适应非对称滤波的OFDM系统信道估计新方法
2010 Second International Conference on Communication Software and Networks Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.100
Shih-Lun Feng, Zhang Eryang, Wang Chen
{"title":"A New Channel Estimation Method for OFDM Systems Based on Adaptive-Asymmetric Filter in the Transform Domain","authors":"Shih-Lun Feng, Zhang Eryang, Wang Chen","doi":"10.1109/ICCSN.2010.100","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.100","url":null,"abstract":"A new channel estimation method is proposed for orthogonal frequency division multiplexing (OFDM) mobile systems based on comb-type pilot. The proposed method utilizes adaptive-asymmetric filter in the transform domain. Asymmetric filter is proposed to reduce more noise for channel estimation based on the characteristic of transform-domain signal, and adaptive adjustment of the cutoff frequency is utilized to eliminate the error floor of channel estimation at high signal-to-noise ratios. Signal-to-noise ratio estimation is implemented in the transform domain. We investigate the performance of the proposed method by measuring symbol error rate with 16QAM as the modulation. Simulation results show that the proposed method outperforms the conventional transform-domain interpolation and the frequency-domain low-pass interpolation.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122649956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信