2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology最新文献

筛选
英文 中文
Active e-mail system SMTP protocol monitoring algorithm 激活电子邮件系统的SMTP协议监控算法
2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology Pub Date : 2009-12-04 DOI: 10.1109/ICBNMT.2009.5348490
R. Sureswaran, H. A. Bazar, O. Abouabdalla, Ahmad M. Manasrah, Homam el-Taj
{"title":"Active e-mail system SMTP protocol monitoring algorithm","authors":"R. Sureswaran, H. A. Bazar, O. Abouabdalla, Ahmad M. Manasrah, Homam el-Taj","doi":"10.1109/ICBNMT.2009.5348490","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348490","url":null,"abstract":"E-mail system is one of the most ubiquitous Internet-based applications today. It enables users to send and receive E-mail messages among each other within and from outside of the local area network. E-mail system is used every day in almost all organizations as a communication tool between managers, employees, customers, and partners for better information flow and conduct business which requires communication with people outside the organization, or from different geographical locations. The E-mail system offers a fast, reliable and easy solution for such communication. SMTP (Simple Mail Transfer Protocol) is a transportation protocol used to transfer E-mail messages over the Internet. All E-mail servers use the SMTP to send E-mails from one E-mail server to another. SMTP is also used to send E-mail messages from E-mail clients to E-mail servers. In this paper, the SMTP E-mail system protocol will be briefly explained. New Active monitoring algorithm architecture is also proposed to improve the current E-mail system protocol functions and detect the SMTP protocol failure during the process of sending E-mail messages.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116728585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Research on the implementation of secure UPnP architecture 安全UPnP体系结构的实现研究
2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology Pub Date : 2009-12-04 DOI: 10.1109/ICBNMT.2009.5348530
Hu Jia, Zhang Qi
{"title":"Research on the implementation of secure UPnP architecture","authors":"Hu Jia, Zhang Qi","doi":"10.1109/ICBNMT.2009.5348530","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348530","url":null,"abstract":"Universal Plug and Play, or UPnP in short, is a “plug and play” methodology used in network environment. It's designed to share resources, connect network devices and offer control over services. It implements zero-configuration. Developer can save the cost of network setup and concentrate on the offering services only and do not need to concern the under layer protocol. As the wide spreading of UPnP protocol, building a secure UPnP system is becoming more important. The paper introduces a secure UPnP architecture based on the UPnP network and implements the protocols and algorithms of the secure architecture. It is different from create a secure communication channel point to point based on the UPnP devices. We adopted the decentralized mechanisms for key management, analysed the limits of our protocol and proposed the corresponding measures. Finally, we compared with two important protocols using decentralized key management mechanisms, stated their limits and solutions of our scheme.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113965000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study and analysis of network delay by simulation 网络时延的仿真研究与分析
2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology Pub Date : 2009-12-04 DOI: 10.1109/ICBNMT.2009.5347852
G. Lijuan, Jiang Taijie, Gao Xiaoling
{"title":"Study and analysis of network delay by simulation","authors":"G. Lijuan, Jiang Taijie, Gao Xiaoling","doi":"10.1109/ICBNMT.2009.5347852","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347852","url":null,"abstract":"Presently, It is paid much attention to network performance, as a main criterion, delay is becoming more and more important. A network model for a certain network is built by simulation software. It analyses the relations among delay, throughput, user number and bandwidth. Then it points out the direction to decrease the network delay by simulation and it can optimize the network performance with the simulation model in the future.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121501242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Half-step fotward switch in EPFTS EPFTS的前半步开关
2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology Pub Date : 2009-12-04 DOI: 10.1109/ICBNMT.2009.5347825
Xu Deng-yuan, Zhang Ben-niu
{"title":"Half-step fotward switch in EPFTS","authors":"Xu Deng-yuan, Zhang Ben-niu","doi":"10.1109/ICBNMT.2009.5347825","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347825","url":null,"abstract":"Most of works, such as looking-up table, queuing and scheduling, are dealt with in traditional switch in serial, which makes the handling capacity in traditional switch become the bottle affecting the switch performance. A novel switch technique called Half-step Forward Switch (HFS) is proposed in this paper to optimize the switch process. HFS makes looking-up table and scheduling be dealt with in parallel, which can relieve the works in switch and can reduce delay and delay jitter in switch node. Simulation results shows that HFS switch can reduce by 6.7% in average delay and reduce by 8.1% in delay jitter compared to conventional switch.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122400096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and realization of 3D character animation engine 三维人物动画引擎的设计与实现
2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology Pub Date : 2009-12-04 DOI: 10.1109/ICBNMT.2009.5347860
Gao Ying, Lu Xuqing, Wang Xiu-liang, Fei Yi, Guo Shuxia
{"title":"Design and realization of 3D character animation engine","authors":"Gao Ying, Lu Xuqing, Wang Xiu-liang, Fei Yi, Guo Shuxia","doi":"10.1109/ICBNMT.2009.5347860","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347860","url":null,"abstract":"Character animation which is used to show human figure has been extensively applied in VR (Visual Reality) field. Because too much initial work is being repeated, it usually costs more than needed to make character animation, and the technical difficulty is also at a high level. Large game corporations incline to keep the core technologies of character animation as commercial secrets, thus block its development. In this paper, the main framework of a “3D character animation engine” is designed. Great emphasis is put on the principle of different types of character animation and their realization methods. The 3D character animation engine provides consistent APIs for key-frame animation, mixed animation and morph animation. It enable users make character animation through programming in a fast and easy way.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122522872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and implementation of wireless sensor network node in environment monitoring 无线传感器网络节点在环境监测中的设计与实现
2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology Pub Date : 2009-12-04 DOI: 10.1109/ICBNMT.2009.5348542
Zhang Lin, Sun Hui, Sun Qiang, Guo Changjian, Huang Xueyou, Xun Xiaowei
{"title":"Design and implementation of wireless sensor network node in environment monitoring","authors":"Zhang Lin, Sun Hui, Sun Qiang, Guo Changjian, Huang Xueyou, Xun Xiaowei","doi":"10.1109/ICBNMT.2009.5348542","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348542","url":null,"abstract":"In terms of the demands on environment monitoring, by taking monitoring the area polluted and weather environment as application background, temperature and humidity etc as inspecting parameters, tiny wireless sensor network nodes are designed, the node took the MSP430 ultra low power MCU as the core, and used 2.4G CC2420 RF chip, the solution and implementation of hardware structure of the node were introduced. An experiment for the wireless sensor network nodes communication is made, the experiments results of testing nodes indicate that nodes can gather and process data effectively and communicate successfully between nodes, the technical feasibility of the design are verified by practical testing.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130330018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comprehensive-factors-based scheduling algorithm for P2P media streaming 基于综合因素的P2P流媒体调度算法
2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology Pub Date : 2009-12-04 DOI: 10.1109/ICBNMT.2009.5348394
Zheng Quan, Wang Peng, L. Jun, Z. Le, Wang Song
{"title":"Comprehensive-factors-based scheduling algorithm for P2P media streaming","authors":"Zheng Quan, Wang Peng, L. Jun, Z. Le, Wang Song","doi":"10.1109/ICBNMT.2009.5348394","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348394","url":null,"abstract":"A comprehensive-factors-based (CFB) scheduling algorithm is proposed for Peer-to-Peer media streaming. In CFB, considering the number of chunks' suppliers and urgency, a priority is defined for each data chunk and the neighbours' bandwidth is effectively evaluated. A peer requests chunks from neighbors according to priorities as well as bandwidth. Simulation results show that the proposed CFB scheduling algorithm for Peer-to-Peer media streaming outperforms conventional scheduling algorithms in peer average throughput, continuity index and start delay.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123168852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An interface language of value-added service creation based on capability-injection 一种基于能力注入的增值服务创建接口语言
2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology Pub Date : 2009-12-04 DOI: 10.1109/ICBNMT.2009.5347799
Pang Yuanyuan, Li Jinglin
{"title":"An interface language of value-added service creation based on capability-injection","authors":"Pang Yuanyuan, Li Jinglin","doi":"10.1109/ICBNMT.2009.5347799","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347799","url":null,"abstract":"Resource-Oriented Architecture is a new Web service modeling method. Based on Capability-Injection (CI) pattern, ROA could be extended for telecommunication value-added service description and creation. With the CI based ROA requirements analysis, a Pub/Sub based capability injection method is proposed in this paper. The Pub/Sub capability utilization will transform the value-added service control logic from interface control to resource statement monitoring. Therefore, the CI interface can be described as uniformed Pub/Sub method. Finally, a new extended language named RSML-QL is introduced to support the Pub/Sub capability. RSML-QL provides method guarantee for service building based on CI model.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134098540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A context-aware autonomic packet marking mechanism 上下文感知的自主数据包标记机制
2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology Pub Date : 2009-12-04 DOI: 10.1109/ICBNMT.2009.5347819
G. Xiang-yang, Li Yan, Cheng Jieyao, W. Wendong
{"title":"A context-aware autonomic packet marking mechanism","authors":"G. Xiang-yang, Li Yan, Cheng Jieyao, W. Wendong","doi":"10.1109/ICBNMT.2009.5347819","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5347819","url":null,"abstract":"Autonomic network is an important research field in network architectures. Since autonomic attributes such as context-aware, self-configuration, self-optimizing and self-management are introduced, autonomic network is capable of adapting to the heterogeneous and complex network environments. In this paper, context-aware and autonomic mechanisms are introduced into the DiffServ QoS framework and a novel context-aware autonomic packet marking mechanism (CAPM) is proposed. CAPM is capable of collecting various QoS related contexts, and adaptively adjusting network behavior to provide QoS guarantee according to users' QoS requirements and network conditions. Simulation results show that CAPM provides better performance than traditional packet marker, and improves user's quality of experience.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134454465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A wireless video transmission system using RCPT/FEC 一种采用RCPT/FEC的无线视频传输系统
2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology Pub Date : 2009-12-04 DOI: 10.1109/ICBNMT.2009.5348467
Duan Da-gao, Han Zhongming, Li Wenzheng
{"title":"A wireless video transmission system using RCPT/FEC","authors":"Duan Da-gao, Han Zhongming, Li Wenzheng","doi":"10.1109/ICBNMT.2009.5348467","DOIUrl":"https://doi.org/10.1109/ICBNMT.2009.5348467","url":null,"abstract":"The real-time delivery of video data over wireless is a big challenge due to the unreliable and dynamic characteristics of wireless networks, limited bandwidth and high QoS requirements for multimedia applications. According to features of wireless channels, this paper proposes a robust scheme using Rate Compatible Punctured Turbo (RCPT) codes and Forward Error Correction (FEC) parity codes for video stream distribution in wireless access environments. In the scheme, the rate of video data is adjusted based on statistics of Packet Loss Ratio (PLR) and Bit Error Ratio (BER). The RTCP feedback information to the sending end which carries bit error ratio, network packet loss ratio and transmission delay, is used to adjust the RCPT codes and FEC parity encoding. At the same time the packet video data is packed into the different size. The experiment shows that this scheme can provide more satisfied video playback quality in 3G wireless networks with different bit error ratio and packet loss ratio, and also can improve overall network utilization efficiency.","PeriodicalId":267128,"journal":{"name":"2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132129221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信