2012 Computing, Communications and Applications Conference最新文献

筛选
英文 中文
An integrated vehicular-wireless evaluation of WAVE/DSRC connected vehicle probe data service WAVE/DSRC连接车辆探测数据服务的车载无线综合评估
2012 Computing, Communications and Applications Conference Pub Date : 2012-02-21 DOI: 10.1109/COMCOMAP.2012.6154865
Adelin Miloslavov, M. Veeraraghavan
{"title":"An integrated vehicular-wireless evaluation of WAVE/DSRC connected vehicle probe data service","authors":"Adelin Miloslavov, M. Veeraraghavan","doi":"10.1109/COMCOMAP.2012.6154865","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154865","url":null,"abstract":"This paper describes an evaluation of a standardized Probe Data Service (PDS) defined for collecting vehicular probe data via Wireless Access in Vehicular Environments (WAVE) networks operating in the Dedicated Short Range Communications (DSRC) band. Our evaluation is performed by simulating the security and networking functions that support PDS. Our key findings are that in the current design of the service, in which vehicular on-board units are programmed to transmit their collected probe data immediately upon entering the coverage area of a road-side unit (RSU), wireless communication losses can be significant. The use of VDTLS, a security mechanism to transport probe data messages, offered unexpected advantages by forcing vehicles to move closer to RSUs before message transmissions if the VDTLS handshake fails or a session disconnects. An increase in the number and frequency of transmissions, and a decrease in the size of the transmitted messages, resulted in a reduction in failed wireless transmissions.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127174468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automatic creation of models for network intrusion detection 自动创建网络入侵检测模型
2012 Computing, Communications and Applications Conference Pub Date : 2012-02-21 DOI: 10.1109/COMCOMAP.2012.6154805
M. Maatta, T. Raty
{"title":"Automatic creation of models for network intrusion detection","authors":"M. Maatta, T. Raty","doi":"10.1109/COMCOMAP.2012.6154805","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154805","url":null,"abstract":"This paper proposes a tool which can create models for network intrusion detection. The created models are stored in Extensible Mark-up Language (XML) notation that describe packet level details, such as protocol header information, and in Message Sequence Chart (MSC) notation which is used for describing scenario information of network activities, for example describing a port scan with vulnerability exploitation attempt. The proposed tool will utilize Snort rules in the model creation process where a Snort rule is transformed into XML and MSC models. Besides Snort rules, the proposed tool is able to utilize network traffic traces stored in a packet capture format (Pcap). These traces may contain diverse set of different network activities that are relevant in gaining unauthorized access to computer systems or networks. Using these traces the proposed tool can create XML and MSC models that depict the malicious activities. The experimental utilization of the proposed tool will indicate that the XML and MSC models can be created fast and automatically using two separate sources and this will reduce the amount manual work required in the modelling process.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123570503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Android-based mobile payment service protected by 3-factor authentication and virtual private ad hoc networking 基于android的移动支付服务,受3因素认证和虚拟专用自组织网络保护
2012 Computing, Communications and Applications Conference Pub Date : 2012-02-21 DOI: 10.1109/COMCOMAP.2012.6154013
J. Hu, Chien-Cheng Sueng, Weichuan Liao, Chian C. Ho
{"title":"Android-based mobile payment service protected by 3-factor authentication and virtual private ad hoc networking","authors":"J. Hu, Chien-Cheng Sueng, Weichuan Liao, Chian C. Ho","doi":"10.1109/COMCOMAP.2012.6154013","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154013","url":null,"abstract":"This work develops a pair of mobile payment devices, a counter reader and a paying client, on Android-based smartphone platforms for emerging mobile payment or electronic wallet services. These two devices featuring 3-factor authentication and virtual private Ad Hoc networking can make an easier and securer transaction than traditional credit cards or electronic payment cards. 3-factor authentication feature combines PIN code authentication, USIM card authentication, and facial biometric authentication. Especially, this work proposes and implements a simple but practical method, Fast Semi-3D Face Vertical Pose Recovery, to cope with the vertical pose variation issue bothering face recognition systems so far. Experimental results show the proposed method can significantly raise the recognition accuracy and enlarge the operating angle range of face recognition system under various vertical pose conditions. Besides, virtual private Ad Hoc networking feature based on OpenSSL and i-Jetty open-source libraries is also integrated seamlessly.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Android-based patrol robot featuring automatic license plate recognition 基于安卓系统的巡逻机器人,具有自动车牌识别功能
2012 Computing, Communications and Applications Conference Pub Date : 2012-02-21 DOI: 10.1109/COMCOMAP.2012.6154014
Hsin-Fu Chen, Chang-Yun Chiang, Shih-Jui Yang, C. C. Ho
{"title":"Android-based patrol robot featuring automatic license plate recognition","authors":"Hsin-Fu Chen, Chang-Yun Chiang, Shih-Jui Yang, C. C. Ho","doi":"10.1109/COMCOMAP.2012.6154014","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154014","url":null,"abstract":"This work develops an Android-based robot featuring automatic license plate recognition and automatic license plate patrolling. The automatic license plate recognition feature combines 4 self-developed novel methods, Wiener-deconvolution vertical edge enhancement, AdaBoost plus vertical-edge license plate detection, vertical edge projection histogram segmentation stain removal, and customized optical character recognition. Besides, the automatic license plate patrolling feature also integrates 3 novel methods, HL2-band rough license plate detection, orientated license plate approaching, and Ad-Hoc-based remote motion control. Implementation results show the license plate detection rate and recognition rate of the Android-based robot are over 99% and over 98%, respectively, under various scene conditions. Especially, the execution time of license plate recognition, including license plate detection, is only about 0.7 second per frame on the Android-based robot.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128794700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A simple one-constant feedback quasi-orthogonal Space-Time Block Code transmission scheme 一个简单的单常数反馈准正交空时分组码传输方案
2012 Computing, Communications and Applications Conference Pub Date : 2012-02-21 DOI: 10.1109/COMCOMAP.2012.6154771
Chi-Min Li, Yu-Ching Chen
{"title":"A simple one-constant feedback quasi-orthogonal Space-Time Block Code transmission scheme","authors":"Chi-Min Li, Yu-Ching Chen","doi":"10.1109/COMCOMAP.2012.6154771","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154771","url":null,"abstract":"In the conventional Space-Time Block Code (STBC) scheme, system can't achieve the full diversity and full rate for more than two transmitting antennas. Thereafter, a Quasi-Orthogonal STBC (QOSTBC) has been provided to improve the diversity and full rate behavior for the STBC with more than two transmitting antennas. However, QOSTBC has the drawback of heavy computational burden for the receiver. This paper proposes a simple QOSTBC transmission scheme with the low computational complexity. Besides, we will demonstrate that the proposed method has almost the same Bit Error Rate (BER) performance compared with the Rotated QOSTBC (RQOSTBC) decoder.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123839481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proactive and reactive collaboration schemes for multi-domain networks monitoring 多域网络监控的主动和被动协作方案
2012 Computing, Communications and Applications Conference Pub Date : 2012-02-21 DOI: 10.1109/COMCOMAP.2012.6154768
A. Belghith, S. B. H. Said, Bernard A. Cousin, S. Lahoud
{"title":"Proactive and reactive collaboration schemes for multi-domain networks monitoring","authors":"A. Belghith, S. B. H. Said, Bernard A. Cousin, S. Lahoud","doi":"10.1109/COMCOMAP.2012.6154768","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154768","url":null,"abstract":"The monitoring of the quality of service in a multi-domain network supervises the multi-domain service performance. A multi-domain service is a service that crosses several domains which can be managed by different providers. Since each domain can be managed with its own policies and may require confidentiality of its topology and its monitoring processes, we propose that the monitoring architecture has to be configurable. In this paper, we propose two collaboration schemes that are based on the reactive and the proactive modes. Both of collaboration schemes allow the multi-domain monitoring architecture to select the measurement points that will participate in the multi-domain monitoring and to configure the selected measurement points. In this paper, we present our proposed collaboration schemes and then we evaluate their performance through extensive simulations using Network Simulator (NS-2).","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123571624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Weight Computing in Competitive K-Means Algorithm 竞争k -均值算法的权值计算
2012 Computing, Communications and Applications Conference Pub Date : 2012-02-21 DOI: 10.1109/COMCOMAP.2012.6154887
Tingting Cui, Fangshi Li
{"title":"Weight Computing in Competitive K-Means Algorithm","authors":"Tingting Cui, Fangshi Li","doi":"10.1109/COMCOMAP.2012.6154887","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154887","url":null,"abstract":"This paper presents Weight Computing in Competitive K-Means Algorithm which is derived from Improved K-means method and subspace clustering. By adding weights to the objective function, the contributions from each feature of each clustering could simultaneously minimize the separations within clusters and maximize the separation between clusters. The experiments described in this paper confirm good performance of the proposed algorithm.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"73 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124332158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and development of a clinical decision support system for diagnosing appendicitis 阑尾炎诊断临床决策支持系统的设计与开发
2012 Computing, Communications and Applications Conference Pub Date : 2012-02-21 DOI: 10.1109/COMCOMAP.2012.6154864
E. Sivasankar, R. Rajesh
{"title":"Design and development of a clinical decision support system for diagnosing appendicitis","authors":"E. Sivasankar, R. Rajesh","doi":"10.1109/COMCOMAP.2012.6154864","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154864","url":null,"abstract":"This paper presents a Genetic Algorithm based feature selection approach for clinical decision support system, which is designed to assist physicians with decision making tasks, as to discriminate healthy people from those with appendicitis disease. We have compared the performance of Genetic Algorithm with two feature ranking algorithms namely Information Gain and Chi-Square algorithm. The genetic algorithm that we propose is wrapper based scheme where the fitness of an individual is determined based on the ability of the selected features to classify the training dataset. To measure the performance of the feature selection algorithms, two different types of standard classification algorithms were implemented namely Bayesian Classifier and K-Nearest Neighbor (K-NN) Classifier. We determine which feature selection algorithm is best suited for clinical datasets under consideration. Experiments show that Genetic Algorithm would be the best choice for feature selection in appendicitis clinical dataset.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124069317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Development of a Visible Light Communications system for optical wireless local area networks 光无线局域网可见光通信系统的研制
2012 Computing, Communications and Applications Conference Pub Date : 2012-02-21 DOI: 10.1109/COMCOMAP.2012.6154870
P. Haigh, T. T. Son, E. Bentley, Z. Ghassemlooy, H. Le Minh, L. Chao
{"title":"Development of a Visible Light Communications system for optical wireless local area networks","authors":"P. Haigh, T. T. Son, E. Bentley, Z. Ghassemlooy, H. Le Minh, L. Chao","doi":"10.1109/COMCOMAP.2012.6154870","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154870","url":null,"abstract":"This paper presents the development of a Visible Light Communications (VLC) system for a local area network (LAN). The link is analyzed for all development stages and compared with a typical Ethernet system. The VLC system uses a Philips Luxeon Rebel as the transmitter and a Centronic OSD15-5T as the receiver coupled with a blue filter to achieve the required 10 Mb/s bit rates. The distance in which the optical link was measured was up to 1 m, and the link was successful (BER 10-6) for distances up to 0.7 m. To achieve higher distances and therefore to make the system practical in the home or office environment, the number of LEDs used can be scaled.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131610227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Boolean complex logic 布尔复逻辑
2012 Computing, Communications and Applications Conference Pub Date : 2012-02-21 DOI: 10.1109/COMCOMAP.2012.6154874
K. Suzuki, K. Sugimoto, H. Suzuki
{"title":"Boolean complex logic","authors":"K. Suzuki, K. Sugimoto, H. Suzuki","doi":"10.1109/COMCOMAP.2012.6154874","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154874","url":null,"abstract":"This article, by describing atoms and logic formulae with complex functions, defines a new multivalued logic such that the set of logic formulae forms a Boolean algebra in contrast to popular multivalued logics such as fuzzy logics, which we call a Boolean complex logic. This article shows also some intuitively understandable examples demonstrating that the proposed logic can process deductive inferences syntactically by evaluating ranges of truth values.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133496956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信