2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing最新文献

筛选
英文 中文
A Multiple Watermarking Scheme for Color Images 彩色图像的多重水印方案
H. Liao
{"title":"A Multiple Watermarking Scheme for Color Images","authors":"H. Liao","doi":"10.1109/MUSIC.2012.30","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.30","url":null,"abstract":"This paper presents a multiple watermarking scheme for color images by using the concept of visual cryptography, wavelet tree, integer wavelet transform, and YCbCr color model. Experiment results show that all owners will have dual watermark authentication embedded in a protected color image, and the number of ownerships can be increased without re-computing. Applying the proposed four points distinguishing law, the owner's dual watermarks can be extracted more imperceptibly.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116159074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementation of Network Framework for Development and Integration of Network-Based Humanoid Robot System 基于网络的仿人机器人系统开发与集成的网络框架实现
Joo-Hyung Kim, Ho-Dong Lee, Gwi-Tae Park, J. Park
{"title":"Implementation of Network Framework for Development and Integration of Network-Based Humanoid Robot System","authors":"Joo-Hyung Kim, Ho-Dong Lee, Gwi-Tae Park, J. Park","doi":"10.1109/MUSIC.2012.51","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.51","url":null,"abstract":"In this paper, we describe practical implementation of a framework for development and integration of network-based humanoid robot system. The characteristics of the framework are dynamically to connect, execute and disconnect humanoid robot and service components related to the robot, and to provide simplification process about development of service components and their integration task. In addition, using an error-handling mechanism, the framework is able to recovery the components interrupted by the unexpected error. Also, the stability of the network framework is guaranteed through verification process of developed service components.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116386171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation Networks 卫星星座网络中基于源的共享树类组播路由
Yanpeng Ma, Jinshu Su, Chunqing Wu, Xiaofeng Wang, Wanrong Yu, Bao-kang Zhao, Xiaofeng Hu
{"title":"A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation Networks","authors":"Yanpeng Ma, Jinshu Su, Chunqing Wu, Xiaofeng Wang, Wanrong Yu, Bao-kang Zhao, Xiaofeng Hu","doi":"10.1109/MUSIC.2012.49","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.49","url":null,"abstract":"Satellites can broadcast datagram over a wide area, even to the areas that cannot be well served by the existing terrestrial infrastructures. Therefore, it is a hot research topic about how to multicast datagram over satellites. Low Earth Orbit (LEO) satellites have short round-trip delay and low power consumption, it will be an essential part of future multimedia communication application. In this paper, we proposed a multicast routing for LEO satellite constellation networks with high performance. The algorithm uses the group members' geographic information to route multicast packets, with less memory, computer power and signaling overhead. Through simulation we evaluate the delay and performance of our algorithm.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"4 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114127865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Adjustable Heuristic for Offset Assignment Problems in Embedded System Design 嵌入式系统设计中偏移分配问题的可调启发式算法
Tong-Chai Wang
{"title":"An Adjustable Heuristic for Offset Assignment Problems in Embedded System Design","authors":"Tong-Chai Wang","doi":"10.1109/MUSIC.2012.19","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.19","url":null,"abstract":"Offset assignment (OA) is a highly effective address code optimization technique for embedded processors with limited memory. Modify registers (MRs) concern the offset difference of address code for offset assignment (OA) problems. Address registers (ARs) concern the assignment of program variables for general offset assignment (GOA) problems. This paper proposes a novel MRs and ARs assignment technique for SOA and GOA problems based on specialized DSPs Address Generation Units (AGU) machines. A technique to reduce the number of distinct offset difference so as to reduce the modify register assignment instructions was proposed for SOA and during GOA such that the cost is further reduced. An adjustable ARs assignment technique was proposed to reduce the GOA cost and the number of distinct offset difference during GOA. Our experiments show the reduction of the number of distinct offset difference during GOA can also help to improve the GOA cost.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126980777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Electric Power Asset Localization Scheme Based on LLA and ZigBee 基于LLA和ZigBee的电力资产定位方案
Ruixue Li, Jianming Liu, Xiangzhen Li
{"title":"An Electric Power Asset Localization Scheme Based on LLA and ZigBee","authors":"Ruixue Li, Jianming Liu, Xiangzhen Li","doi":"10.1109/MUSIC.2012.48","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.48","url":null,"abstract":"Since the number of electric power assets is huge and most of them are expensive, it is a great challenge for power enterprises to know each change of assets when replaced or repaired. Moreover, power asset localization is a growing practice in application, so it is important to acquire the device's current location. Thus, this article proposed a new power asset localization scheme, employing ZigBee technology for networking and high-precision LLA algorithm for positioning. Experimental results show that the scheme achieves high accuracy flexibly and controls equipment status in real time, ensuring the assets' security.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133826283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location-Based Large-Scale Landmark Image Recognition Scheme for Mobile Devices 基于位置的移动设备大规模地标图像识别方案
Daehoon Kim, Eenjun Hwang, Seungmin Rho
{"title":"Location-Based Large-Scale Landmark Image Recognition Scheme for Mobile Devices","authors":"Daehoon Kim, Eenjun Hwang, Seungmin Rho","doi":"10.1109/MUSIC.2012.16","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.16","url":null,"abstract":"In this paper, we propose a location-based large-scale landmark image recognition scheme for mobile devices such as smart phones. To achieve this goal, we collected landmark images all around the world, which were available on the web. For each landmark, we detected interest points and constructed their feature descriptors using SURF. Next, we performed a statistical analysis on the local features to select representative points among them. Intuitively, the representative points of an object are the interest points that best characterize the object. Similar representative points are merged for filtering and fast matching purposes. These points are indexed using an R-tree based on GPS information. Our scheme is based on client-server architecture. When the user takes a picture of a landmark using a mobile device, the client module on the mobile device extracts the local features from the image and sends them to the server, along with location and other sensor data. For the query, the server searches its index using the location data first to find nearby landmarks and then compares their local features. Matched landmark images are sent back to the client. We implemented a prototype system and performed various experiments. Through experiments, we showed that our scheme achieves reasonable performance.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128720624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Data Overhead Impact of Multipath Routing for Multicast in Wireless Mesh Networks 无线Mesh网络中多径路由对组播数据开销的影响
Yi Zheng, U. T. Nguyen, Hoang Lan Nguyen
{"title":"Data Overhead Impact of Multipath Routing for Multicast in Wireless Mesh Networks","authors":"Yi Zheng, U. T. Nguyen, Hoang Lan Nguyen","doi":"10.1109/MUSIC.2012.34","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.34","url":null,"abstract":"Multipath routing has been proved effective in mobile ad-hoc networks (MANETs) for coping with link failures resulting from node mobility. In wireless mesh networks (WMNs) where routers are generally static, the traffic carried by the backup paths may adversely impact other flows and the multicast group itself, because these paths increase the number of transmissions and thus the level of interference and congestion in the network. This impact, however, has not been examined, especially for multicast routing. We present simulation results that quantify the impact of data overhead of multicast multipath routing compared with single-path routing.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115650128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Proxy-Based Mobile Computing Infrastructure 基于代理的移动计算基础设施
Azade Khalaj, H. Lutfiyya, M. Perry
{"title":"A Proxy-Based Mobile Computing Infrastructure","authors":"Azade Khalaj, H. Lutfiyya, M. Perry","doi":"10.1109/MUSIC.2012.12","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.12","url":null,"abstract":"Proxies can be used as gateways between remote resources and mobile devices to deal with the challenges resulted from disconnections and the limited resources of mobile devices. This paper describes a proxy-based infrastructure that provides proxy services to support mobile device applications. Proxy services can be thought of as a library of functions where the functions execute on a proxy and serve as a bridge between client application on the mobile device and remote services. The infrastructure allows for a dynamic association of a proxy with a mobile device that takes into account the proximity between the mobile device and proxy and the mobility of the client mobile device. Furthermore, proxies are chosen dynamically and the services provided by a proxy are dynamically changing based on the requirements of the clients for a better resource utilization. Several experiments are carried out to evaluate the effectiveness of the proposed infrastructure. The results suggest that the services offered by the proxy can be used for quick recovery after disconnections with only the minimal addition of overhead.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121219564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Quality-Optimized Authentication of Scalable Media Streams with Flexible Transcoding over Wireless Networks 无线网络上具有灵活转码的可扩展媒体流的质量优化认证
Xiaowei Yi, Mingyu Li, Gang Zheng, C. Zheng
{"title":"Quality-Optimized Authentication of Scalable Media Streams with Flexible Transcoding over Wireless Networks","authors":"Xiaowei Yi, Mingyu Li, Gang Zheng, C. Zheng","doi":"10.1109/MUSIC.2012.33","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.33","url":null,"abstract":"Media authentication is becoming an increasingly important issue in wireless transmission. Authenticated media content is required to be transcoded at intermediate to accommodate heterogeneous applications. In this paper, an efficient stream authentication approach is proposed for scalable lossy media streams. At first, we describe a joint coding and stream authentication (JCSA) media transmission framework for flexible and secure transcoding. After that, we propose a generalized quality-optimized stream authentication (QOSA) model to achieve optimal end-to-end quality and minimize the authentication overhead. Furthermore, an implementation on the consultative committee for space data systems image data compression (CCSDS IDC) coder is realized by using graph-based and error-correction coding based (ECC-based) authentication. Experimental results demonstrate that the proposed scheme is able to provide high packet-loss robustness at the cost of a very low overhead.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments 泛在计算环境中业务流程的上下文感知RBAC模型建模
Sigrid Schefer-Wenzl, Mark Strembeck
{"title":"Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments","authors":"Sigrid Schefer-Wenzl, Mark Strembeck","doi":"10.1109/MUSIC.2012.29","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.29","url":null,"abstract":"With ubiquitous computing technologies, business processes become more mobile and distributed and are executed in varying contexts. Context-aware access control mechanisms are an important prerequisite to protect sensitive data and services in secure ubiquitous computing environments. In an IT-supported workflow, process-related context constraints are a means to consider context information in access control decisions. A context constraint specifies that certain conditions must be fulfilled to permit the execution of a particular task. However, standard process modeling languages do not support the notion of context constraints in business processes. In this paper, we integrate context constraints with process-related role-based access control (RBAC) models and thereby support context-dependent task execution.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131572524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信