2009 International Conference on Wireless Networks and Information Systems最新文献

筛选
英文 中文
Tree Topology Based Fault Diagnosis in Wireless Sensor Networks 基于树形拓扑的无线传感器网络故障诊断
2009 International Conference on Wireless Networks and Information Systems Pub Date : 2009-12-28 DOI: 10.1109/WNIS.2009.100
Xu Xiang-hua, Zhou Biao, Wan Jian
{"title":"Tree Topology Based Fault Diagnosis in Wireless Sensor Networks","authors":"Xu Xiang-hua, Zhou Biao, Wan Jian","doi":"10.1109/WNIS.2009.100","DOIUrl":"https://doi.org/10.1109/WNIS.2009.100","url":null,"abstract":"In order to improve the energy efficiency of the fault diagnosis in wireless sensor networks, we propose a tree topology based distributed fault diagnosis algorithm. The algorithm maintains high node fault detection rate and low fault alarm rate in wireless sensor networks under low node distribution density. First, the algorithm finds a good node with a multi-layer detection method, then, detects the status of other nodes by means of the status relation with the good node which is inferred by the parent-child relation in the tree topology, and up to achieves fault detection of the whole network. In ZigBee tree network, the simulation results show that the algorithm performs better in energy efficiency, and identify the faulty sensors with high accuracy and robustness.","PeriodicalId":280001,"journal":{"name":"2009 International Conference on Wireless Networks and Information Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114773397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Prediction of Network Flow Based on Wavelet Analysis and ARIMA Model 基于小波分析和ARIMA模型的网络流量预测
2009 International Conference on Wireless Networks and Information Systems Pub Date : 2009-12-28 DOI: 10.1109/WNIS.2009.20
Jingfei Li, Lei Shen, Yongan Tong
{"title":"Prediction of Network Flow Based on Wavelet Analysis and ARIMA Model","authors":"Jingfei Li, Lei Shen, Yongan Tong","doi":"10.1109/WNIS.2009.20","DOIUrl":"https://doi.org/10.1109/WNIS.2009.20","url":null,"abstract":"Internet traffic analysis, models simulation and prediction play a very important part in the network management and design.Combining wavelet techniques and time-series ARIMA model, the establishment of a network traffic prediction model in this paper. First, time series of wavelet decomposition of flow to gets detail coefficients and approximation coefficients, On the details coefficients, applying the stationary series model, on the approximation coefficients ,applying difference method, then using the stationary series ARIMA model to predict. At last,applying the actual network traffic to verify the model, The results show that the model has higher prediction accuracy.","PeriodicalId":280001,"journal":{"name":"2009 International Conference on Wireless Networks and Information Systems","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128258278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
File Transferring via BlueTooth Based on the Obex Protocol 基于Obex协议的蓝牙文件传输
2009 International Conference on Wireless Networks and Information Systems Pub Date : 2009-12-28 DOI: 10.1109/WNIS.2009.56
Xue ZhangCheng, Wu Shunxiang
{"title":"File Transferring via BlueTooth Based on the Obex Protocol","authors":"Xue ZhangCheng, Wu Shunxiang","doi":"10.1109/WNIS.2009.56","DOIUrl":"https://doi.org/10.1109/WNIS.2009.56","url":null,"abstract":"In this paper, any type of files could be transferred via Bluetooth between Windows Mobile-based devices which should have Obex support. The Microsoft supplies COM interfaces for developer to use the obex protocol, so the paper primarily uses the obex interface to implement the file transferring. The OBEX protocols enable synchronous and asynchronous device discovery for Windows Mobile-based devices. This article takes use of asynchronous device discovery, so that application uses fewer system resources than synchronous device discovery. In order to send the file, it needs the path of files stored in the device.","PeriodicalId":280001,"journal":{"name":"2009 International Conference on Wireless Networks and Information Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125353218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of Wireless Network Planning Based on WIMAX 基于WIMAX的无线网络规划研究
2009 International Conference on Wireless Networks and Information Systems Pub Date : 2009-12-28 DOI: 10.1109/WNIS.2009.80
Ping Fan
{"title":"Research of Wireless Network Planning Based on WIMAX","authors":"Ping Fan","doi":"10.1109/WNIS.2009.80","DOIUrl":"https://doi.org/10.1109/WNIS.2009.80","url":null,"abstract":"The Planning methods and tools for WiMAX wireless networks have drawn more and more attentions. This paper firstly introduced the planning flows of WiMAX Wireless Network and some key points in the process including propagation model calibration and link budget. Procedures and methods of frequency planning as well as system-grade simulation were discussed in detailed plan. And then the method for optimizing WiMAX wireless network was described in detail. Finally, discussing the integrations with other networks in the future, so that Providing a Practical network Planning and building method for a communication operator.","PeriodicalId":280001,"journal":{"name":"2009 International Conference on Wireless Networks and Information Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122566586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reconstruction of Automation Graph-Database Associated Component Based on SVG Web Service 基于SVG Web Service的自动化图库关联组件重构
2009 International Conference on Wireless Networks and Information Systems Pub Date : 2009-12-28 DOI: 10.1109/WNIS.2009.24
Liu Li, Qu Zhijian
{"title":"Reconstruction of Automation Graph-Database Associated Component Based on SVG Web Service","authors":"Liu Li, Qu Zhijian","doi":"10.1109/WNIS.2009.24","DOIUrl":"https://doi.org/10.1109/WNIS.2009.24","url":null,"abstract":"For a problem that sophisticated, application extensions and integration difficulty in automatic monitoring system of traditional client-server, a reconstruction design of system components based on SVG and Web Service is presented. The Batik-Xfire association is built, which is not only able to use database connection pool to access real-time data through the Web service interface, but also embed SVG in the browser to refresh and display Human-Machined interface. Finally, an example about remote real-time data function is given, and then a test experiment is completed, which shows that this component is of availability.","PeriodicalId":280001,"journal":{"name":"2009 International Conference on Wireless Networks and Information Systems","volume":" 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132125354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection Quantitative Analysis with Support Vector Regression and Particle Swarm Optimization Algorithm 基于支持向量回归和粒子群优化算法的入侵检测定量分析
2009 International Conference on Wireless Networks and Information Systems Pub Date : 2009-12-28 DOI: 10.1109/WNIS.2009.79
WenJie Tian, Jicheng Liu
{"title":"Intrusion Detection Quantitative Analysis with Support Vector Regression and Particle Swarm Optimization Algorithm","authors":"WenJie Tian, Jicheng Liu","doi":"10.1109/WNIS.2009.79","DOIUrl":"https://doi.org/10.1109/WNIS.2009.79","url":null,"abstract":"Because the network intrusion behaviors are characterized with uncertainty, complexity and diversity, a new method based on support vector regression (SVR) and particle swarm optimization algorithm (PSOA) is presented and used for pattern analysis of intrusion detection in this paper. The novel structure model has higher accuracy and faster convergence speed. We construct the network structure, and give the algorithm flow. We discussed and analyzed the impact factor of intrusion behaviors. With the ability of strong self-learning and faster convergence, this intrusion detection method can detect various intrusion behaviors rapidly and effectively by learning the typical intrusion characteristic information. We use rough set to reduce dimension. We apply this technique on KDD99 data set and get satisfactory results. The experimental result shows that this intrusion detection method is feasible and effective.","PeriodicalId":280001,"journal":{"name":"2009 International Conference on Wireless Networks and Information Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131916708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Programmable Graph Architectures (PGAs) for Matrix Multiplications and Transposes
2009 International Conference on Wireless Networks and Information Systems Pub Date : 2009-12-28 DOI: 10.1109/WNIS.2009.95
K. Tang, A. Oruç
{"title":"Programmable Graph Architectures (PGAs) for Matrix Multiplications and Transposes","authors":"K. Tang, A. Oruç","doi":"10.1109/WNIS.2009.95","DOIUrl":"https://doi.org/10.1109/WNIS.2009.95","url":null,"abstract":"Configurable Computing (CC) that combines the computational benefits of custom ASICs and flexibility and reconfigurability of general-purpose microprocessor has opened a new and exciting era for designing mobile software services. In particular, the increased computational density of programmable logic devices has the potential to lead to real-time mobile software and services that require fast matrix computations without having to perform row/column inner product operations at all. In this paper, we introduce a direct mapping between matrix groups and Cayley graphs to propose a novel architecture for matrix operations on configurable devices that can facilitate real-time mobile software and services requiring fast matrix operations such as various video manipulations. This new family of architectures is based on Cayley Graphs, hence the name Programmable Graph Architecture (PGA). The basic idea of the PGA is to transform the original matrix operation into a spatial graph routing problem. Our previous work of using Cayley Graphs as an interconnection network model has provided the backbone of this new approach for carrying out matrix operations on programmable graph architectures. A step-by-step algorithm and an example will be used to illustrate our approach.","PeriodicalId":280001,"journal":{"name":"2009 International Conference on Wireless Networks and Information Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125276421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Call Admission Control Scheme Based on Reinforcement Learning for Multimedia Wireless Networks 一种改进的基于强化学习的多媒体无线网络呼叫接纳控制方案
2009 International Conference on Wireless Networks and Information Systems Pub Date : 2009-12-28 DOI: 10.1109/WNIS.2009.91
Yueyun Chen, Cuixia Jia
{"title":"An Improved Call Admission Control Scheme Based on Reinforcement Learning for Multimedia Wireless Networks","authors":"Yueyun Chen, Cuixia Jia","doi":"10.1109/WNIS.2009.91","DOIUrl":"https://doi.org/10.1109/WNIS.2009.91","url":null,"abstract":"This paper presents an improved call admission control scheme to optimize the network operators’ revenue while guarantying the quality of service (QoS) to the mobile terminals. The problem of call admission control (CAC) is modeled as a Semi-Markov decision process (SMDP), and the SMDP is solved by a reinforcement learning (RL) algorithm known as Q-learning. In the Q-learning algorithm, the reward functions for the acceptance and the rejection of new calls for each class of service not only depend on used bandwidth, new call arrival rate, average service time and price, but also the ratio of new call load and the handoff call load and the requested bandwidth of each class of traffic. The CAC scheme would be well performed through the reward functions. Simulations results show that the CAC scheme can obtain high revenue while greatly reducing handoff call dropping probability when the traffic loads are heavy.","PeriodicalId":280001,"journal":{"name":"2009 International Conference on Wireless Networks and Information Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125423996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improvement Suggestions to the AODV Routing Protocol AODV路由协议改进建议
2009 International Conference on Wireless Networks and Information Systems Pub Date : 2009-12-28 DOI: 10.1109/WNIS.2009.13
L. Ding, L. Wan
{"title":"Improvement Suggestions to the AODV Routing Protocol","authors":"L. Ding, L. Wan","doi":"10.1109/WNIS.2009.13","DOIUrl":"https://doi.org/10.1109/WNIS.2009.13","url":null,"abstract":"This paper first analyzes the mathematical model of mobile Ad Hoc networks by considering a weighted value of the ratio between sustainable energy and the total consumed energy of nodes in order to find a balance point between them. And it proposes a solution to the problem of energy efficient and load balance. Finally it presents some improvement suggestions to the AODV protocol.","PeriodicalId":280001,"journal":{"name":"2009 International Conference on Wireless Networks and Information Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116740658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
LI Delay Impact on ICIC in Type 1 Relay LI延迟对Type 1中继ICIC的影响
2009 International Conference on Wireless Networks and Information Systems Pub Date : 2009-12-28 DOI: 10.1109/WNIS.2009.88
Dengkun Xiao, Jian Huang, Tongwei Qu, Xiaoyong Wang
{"title":"LI Delay Impact on ICIC in Type 1 Relay","authors":"Dengkun Xiao, Jian Huang, Tongwei Qu, Xiaoyong Wang","doi":"10.1109/WNIS.2009.88","DOIUrl":"https://doi.org/10.1109/WNIS.2009.88","url":null,"abstract":"3GPP LTE specification is stable now in release 8. To meet much higher requirements than release 8, 3GPP has initiated the LTE-A (LTE-Advanced) study item. In LTE-A, some new features are introduced in, such as relay, CoMP (Coordinated multiple point transmission and reception) and CA (carrier aggregation) . Relay is used to improve cell coverage and to increase cell-edge throughput. It is considered as an effective approach for ICIC (inter-cell interference coordination) in LTE-A due to inherent joint scheduling/processing at the coordinated cells.","PeriodicalId":280001,"journal":{"name":"2009 International Conference on Wireless Networks and Information Systems","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115815332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信