{"title":"Optimal Power Allocation for Cooperative Networks","authors":"Yuewu Dong, X. Wen, Wei Zheng, Yong Sun","doi":"10.1109/ICCSN.2010.38","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.38","url":null,"abstract":"In cellular network, the deployment of the relay station can bring spatial diversity to increase link capacity and improve communication performance. In this paper, we consider an optimal power allocation scheme for the source and the relay to minimize the bit error rate(BER) at the destination under the power and outage constraint in cooperative relay system. Simulation results show that the BER performance can achieve a significant gain by the proposed power allocation scheme. With different relay strategies such as AF and DF, different transmit power are allocated for the source and the relay to achieve the required BER performance in the downlink cooperation.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115959766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding Optimal LSB Substitution Using Ant Colony Optimization Algorithm","authors":"Ching-Sheng Hsu, Shu-Fen Tu","doi":"10.1109/ICCSN.2010.61","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.61","url":null,"abstract":"The Least Significant Bit (LSB) Substitution is a kind of information hiding method. The secret message is embedded into the last r bits of a cover image to get away from the notice of hackers. The security and stego-image quality are two main issues of the LSB substitution method. Therefore, some researchers propose an LSB substitution matrix to address these two issues. Finding an optimal LSB substitution matrix can be seen as a problem of combinatorial optimization. There are 2r! feasible solutions, hence the search space grows notably when r increases. Consequently, an efficient method to construct the matrix is necessary. In this paper, we apply the Ant Colony Optimization Algorithm to construct an optimal LSB substitution matrix. The experimental results show that ACO can find optimal LSB substitution matrix efficiently and improve the qualities of the stego-images.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126801355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method for Identification of MQAM Signals in Rayleigh Fading Channel","authors":"M. Huang, Bingbing Li, B. Lan, Yanling Li","doi":"10.1109/ICCSN.2010.31","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.31","url":null,"abstract":"This paper presents a method for the automatic classification of MQAM signals in Rayleigh fading channel. The advantage of our method is that, by designing a feature vector which is composed of higher order moments, we do not have to acquire a priori knowledge of signal parameters, what is more, it is a simple, very low complexity, robust method. Computer simulations are made and the results show that our method can reach much better classification accuracy than the existing methods.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128073175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ARIMA Based Network Anomaly Detection","authors":"A. H. Yaacob, I. Tan, S. Chien, Hongquan Tan","doi":"10.1109/ICCSN.2010.55","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.55","url":null,"abstract":"An early warning system on potential attacks from networks will enable network administrators or even automated network management software to take preventive measures. This is needed as we move towards maximizing the utilization of the network with new paradigms such as Web Services and Software As A Service. This paper introduces a novel approach through using Auto-Regressive Integrated Moving Average (ARIMA) technique to detect potential attacks that may occur in the network. The solution is able to provide feedback through its predictive capabilities and hence provide an early warning system. With the affirmative results, this technique can serve beyond the detection of Denial of Service (DoS) and with sufficient development; an automated defensive solution can be achieved.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130337450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VANET Security Framework for Trusted Grouping Using TPM Hardware","authors":"A. Wagan, B. M. Mughal, H. Hasbullah","doi":"10.1109/ICCSN.2010.115","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.115","url":null,"abstract":"Vehicular Ad hoc Network (VANET) is a network of vehicles on the roads, of which the success of its applications is highly dependent upon the underlying security mechanism. The default trial asymmetric PKI/ECDSA security mechanism is known for its high computational cost, thus lacking applicability in life-critical safety messaging. Alternative security schemes, such as symmetric methods provide faster communication at the expense of reduced security. Hence, hybrid and hardware based solutions were proposed by researchers to ease the issue. However, these solutions either do not support the existing VANET PKI standard or have larger message size. In this paper, we present a hardware based security framework that uses both standard asymmetric PKI and symmetric cryptography for faster and secure safety message exchange. The proposed framework is expected to improve security mechanism in VANET by developing trust relationship among the neighboring nodes, hence forming trusted groups. The trust is established via Trusted Platform Module (TPM) and group communication.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130985871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Imperceptible Frequency-Domain Watermarking Scheme without Resorting to the Original Image","authors":"Shu-Fen Tu, Ching-Sheng Hsu","doi":"10.1109/ICCSN.2010.28","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.28","url":null,"abstract":"The aim of this paper is to propose an imperceptible wavelet-based watermarking scheme. In our scheme, we use variation to define the degree of transparence of coefficients of LL band and further determine transparent coefficients of HL3 and LH3 bands. Then, the watermark is embedded into those coefficients. In addition, the modular operation is utilized during watermark embedding. In the experimental results, we simulate some common attacks on the watermarked image. It is shown that our scheme is robust against most attacks; moreover, the watermarked image is highly imperceptible.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115745473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross Layer Power Efficient Cooperative Diversity Scheme for Wireless Hybrid Ad Hoc Networks","authors":"Yingji Zhong","doi":"10.1109/ICCSN.2010.70","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.70","url":null,"abstract":"The multi-scenario topology of the wireless hybrid Ad Hoc networks is studied and a novel Cross Layer Power Efficient Cooperative Diversity Scheme (CL-PECDS) is proposed in this paper. The comparison and the predominance of the proposed scheme are demonstrated. With the help of the simulations, the relative energy consumption and the end-to-end blocking probability are all improved. The addressing ratio of success in the condition of the unchanged parameters and external information can be increased and the network can tolerate more hops to support reliable transportation by the proposed scheme.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124275196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Multiple Sink Nodes Deployment in Wireless Sensor Networks Based on Gene Expression Programming","authors":"Shucheng Dai, Changjie Tang, Shaojie Qiao, Kaikuo Xu, Hongjun Li, Jun Zhu","doi":"10.1109/ICCSN.2010.33","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.33","url":null,"abstract":"In wireless sensor networks (WSN) data transmission is usually performed by sensors in manner of multi-hop forwarding towards a central static control center (sink). A lot of cheap, low-powered and energy-limited sensors are deployed in the monitored area and some of these nodes closer to the sink node use up their energy more quickly than other nodes because they relay more packets. Although most of the sensor nodes have enough energy left to work, the energy consumption imbalance leads to connectivity holes and coverage holes, and finally the whole network failure. The main contributions of this paper include: (a) a new scheme based on multiple sink nodes is proposed to prolong the network lifetime and to reduce the response time. It is effective, especially in the target tracking applications, (b) the deployment strategy with given number of multiple sink nodes is explored in the grid sensor network, (c) Gene Expression Programming based Multiple Sink Nodes deployment algorithm (GEP-MSN) is proposed to optimally deploy multiple sink nodes over the monitored region, (d) a data transmission cost model (TCM) is introduced to measure the cost for optimizing during the transmission phase, (e) extensive simulations are conducted to show that the scheme can greatly extend the network lifetime by around 16.6% and 36.3% on average compared with two naive methods based on random distributed sink nodes.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121292744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Client's Perspective: Realization as a New Generation Process for Software Project Development and Management","authors":"R. Akbar, M. Hassan, S. Safdar, M. Qureshi","doi":"10.1109/ICCSN.2010.96","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.96","url":null,"abstract":"IT industry despite the wide use of most modern tools and technologies has been unable to achieve targeted success. Awry situations in projects have become routine matter. Besides technical other factors influencing software development activities also need to be considered. Software development and consultancy organizations must realize the importance of such technical and non-technical factors like client’s perspective, organizational environment, company policies and social infrastructure. Identification and managing such issues are more cumbersome than routine practical tasks. This paper focuses on one of the most important and critical cum technical factor client’s perspective. Elements comprising client’s perspective are identified and the spider web model is proposed to practice it. Real projects based evaluation is made. The results elaborate the client based practices. Client based practices would be an advent of new generation of processes to overcome IT industry dilemma.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123314179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Channel Estimation Method for OFDM Systems Based on Adaptive-Asymmetric Filter in the Transform Domain","authors":"Shih-Lun Feng, Zhang Eryang, Wang Chen","doi":"10.1109/ICCSN.2010.100","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.100","url":null,"abstract":"A new channel estimation method is proposed for orthogonal frequency division multiplexing (OFDM) mobile systems based on comb-type pilot. The proposed method utilizes adaptive-asymmetric filter in the transform domain. Asymmetric filter is proposed to reduce more noise for channel estimation based on the characteristic of transform-domain signal, and adaptive adjustment of the cutoff frequency is utilized to eliminate the error floor of channel estimation at high signal-to-noise ratios. Signal-to-noise ratio estimation is implemented in the transform domain. We investigate the performance of the proposed method by measuring symbol error rate with 16QAM as the modulation. Simulation results show that the proposed method outperforms the conventional transform-domain interpolation and the frequency-domain low-pass interpolation.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122649956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}