{"title":"An integrated vehicular-wireless evaluation of WAVE/DSRC connected vehicle probe data service","authors":"Adelin Miloslavov, M. Veeraraghavan","doi":"10.1109/COMCOMAP.2012.6154865","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154865","url":null,"abstract":"This paper describes an evaluation of a standardized Probe Data Service (PDS) defined for collecting vehicular probe data via Wireless Access in Vehicular Environments (WAVE) networks operating in the Dedicated Short Range Communications (DSRC) band. Our evaluation is performed by simulating the security and networking functions that support PDS. Our key findings are that in the current design of the service, in which vehicular on-board units are programmed to transmit their collected probe data immediately upon entering the coverage area of a road-side unit (RSU), wireless communication losses can be significant. The use of VDTLS, a security mechanism to transport probe data messages, offered unexpected advantages by forcing vehicles to move closer to RSUs before message transmissions if the VDTLS handshake fails or a session disconnects. An increase in the number and frequency of transmissions, and a decrease in the size of the transmitted messages, resulted in a reduction in failed wireless transmissions.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127174468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic creation of models for network intrusion detection","authors":"M. Maatta, T. Raty","doi":"10.1109/COMCOMAP.2012.6154805","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154805","url":null,"abstract":"This paper proposes a tool which can create models for network intrusion detection. The created models are stored in Extensible Mark-up Language (XML) notation that describe packet level details, such as protocol header information, and in Message Sequence Chart (MSC) notation which is used for describing scenario information of network activities, for example describing a port scan with vulnerability exploitation attempt. The proposed tool will utilize Snort rules in the model creation process where a Snort rule is transformed into XML and MSC models. Besides Snort rules, the proposed tool is able to utilize network traffic traces stored in a packet capture format (Pcap). These traces may contain diverse set of different network activities that are relevant in gaining unauthorized access to computer systems or networks. Using these traces the proposed tool can create XML and MSC models that depict the malicious activities. The experimental utilization of the proposed tool will indicate that the XML and MSC models can be created fast and automatically using two separate sources and this will reduce the amount manual work required in the modelling process.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123570503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Hu, Chien-Cheng Sueng, Weichuan Liao, Chian C. Ho
{"title":"Android-based mobile payment service protected by 3-factor authentication and virtual private ad hoc networking","authors":"J. Hu, Chien-Cheng Sueng, Weichuan Liao, Chian C. Ho","doi":"10.1109/COMCOMAP.2012.6154013","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154013","url":null,"abstract":"This work develops a pair of mobile payment devices, a counter reader and a paying client, on Android-based smartphone platforms for emerging mobile payment or electronic wallet services. These two devices featuring 3-factor authentication and virtual private Ad Hoc networking can make an easier and securer transaction than traditional credit cards or electronic payment cards. 3-factor authentication feature combines PIN code authentication, USIM card authentication, and facial biometric authentication. Especially, this work proposes and implements a simple but practical method, Fast Semi-3D Face Vertical Pose Recovery, to cope with the vertical pose variation issue bothering face recognition systems so far. Experimental results show the proposed method can significantly raise the recognition accuracy and enlarge the operating angle range of face recognition system under various vertical pose conditions. Besides, virtual private Ad Hoc networking feature based on OpenSSL and i-Jetty open-source libraries is also integrated seamlessly.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hsin-Fu Chen, Chang-Yun Chiang, Shih-Jui Yang, C. C. Ho
{"title":"Android-based patrol robot featuring automatic license plate recognition","authors":"Hsin-Fu Chen, Chang-Yun Chiang, Shih-Jui Yang, C. C. Ho","doi":"10.1109/COMCOMAP.2012.6154014","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154014","url":null,"abstract":"This work develops an Android-based robot featuring automatic license plate recognition and automatic license plate patrolling. The automatic license plate recognition feature combines 4 self-developed novel methods, Wiener-deconvolution vertical edge enhancement, AdaBoost plus vertical-edge license plate detection, vertical edge projection histogram segmentation stain removal, and customized optical character recognition. Besides, the automatic license plate patrolling feature also integrates 3 novel methods, HL2-band rough license plate detection, orientated license plate approaching, and Ad-Hoc-based remote motion control. Implementation results show the license plate detection rate and recognition rate of the Android-based robot are over 99% and over 98%, respectively, under various scene conditions. Especially, the execution time of license plate recognition, including license plate detection, is only about 0.7 second per frame on the Android-based robot.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128794700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A simple one-constant feedback quasi-orthogonal Space-Time Block Code transmission scheme","authors":"Chi-Min Li, Yu-Ching Chen","doi":"10.1109/COMCOMAP.2012.6154771","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154771","url":null,"abstract":"In the conventional Space-Time Block Code (STBC) scheme, system can't achieve the full diversity and full rate for more than two transmitting antennas. Thereafter, a Quasi-Orthogonal STBC (QOSTBC) has been provided to improve the diversity and full rate behavior for the STBC with more than two transmitting antennas. However, QOSTBC has the drawback of heavy computational burden for the receiver. This paper proposes a simple QOSTBC transmission scheme with the low computational complexity. Besides, we will demonstrate that the proposed method has almost the same Bit Error Rate (BER) performance compared with the Rotated QOSTBC (RQOSTBC) decoder.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123839481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Belghith, S. B. H. Said, Bernard A. Cousin, S. Lahoud
{"title":"Proactive and reactive collaboration schemes for multi-domain networks monitoring","authors":"A. Belghith, S. B. H. Said, Bernard A. Cousin, S. Lahoud","doi":"10.1109/COMCOMAP.2012.6154768","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154768","url":null,"abstract":"The monitoring of the quality of service in a multi-domain network supervises the multi-domain service performance. A multi-domain service is a service that crosses several domains which can be managed by different providers. Since each domain can be managed with its own policies and may require confidentiality of its topology and its monitoring processes, we propose that the monitoring architecture has to be configurable. In this paper, we propose two collaboration schemes that are based on the reactive and the proactive modes. Both of collaboration schemes allow the multi-domain monitoring architecture to select the measurement points that will participate in the multi-domain monitoring and to configure the selected measurement points. In this paper, we present our proposed collaboration schemes and then we evaluate their performance through extensive simulations using Network Simulator (NS-2).","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123571624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weight Computing in Competitive K-Means Algorithm","authors":"Tingting Cui, Fangshi Li","doi":"10.1109/COMCOMAP.2012.6154887","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154887","url":null,"abstract":"This paper presents Weight Computing in Competitive K-Means Algorithm which is derived from Improved K-means method and subspace clustering. By adding weights to the objective function, the contributions from each feature of each clustering could simultaneously minimize the separations within clusters and maximize the separation between clusters. The experiments described in this paper confirm good performance of the proposed algorithm.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"73 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124332158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and development of a clinical decision support system for diagnosing appendicitis","authors":"E. Sivasankar, R. Rajesh","doi":"10.1109/COMCOMAP.2012.6154864","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154864","url":null,"abstract":"This paper presents a Genetic Algorithm based feature selection approach for clinical decision support system, which is designed to assist physicians with decision making tasks, as to discriminate healthy people from those with appendicitis disease. We have compared the performance of Genetic Algorithm with two feature ranking algorithms namely Information Gain and Chi-Square algorithm. The genetic algorithm that we propose is wrapper based scheme where the fitness of an individual is determined based on the ability of the selected features to classify the training dataset. To measure the performance of the feature selection algorithms, two different types of standard classification algorithms were implemented namely Bayesian Classifier and K-Nearest Neighbor (K-NN) Classifier. We determine which feature selection algorithm is best suited for clinical datasets under consideration. Experiments show that Genetic Algorithm would be the best choice for feature selection in appendicitis clinical dataset.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124069317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Haigh, T. T. Son, E. Bentley, Z. Ghassemlooy, H. Le Minh, L. Chao
{"title":"Development of a Visible Light Communications system for optical wireless local area networks","authors":"P. Haigh, T. T. Son, E. Bentley, Z. Ghassemlooy, H. Le Minh, L. Chao","doi":"10.1109/COMCOMAP.2012.6154870","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154870","url":null,"abstract":"This paper presents the development of a Visible Light Communications (VLC) system for a local area network (LAN). The link is analyzed for all development stages and compared with a typical Ethernet system. The VLC system uses a Philips Luxeon Rebel as the transmitter and a Centronic OSD15-5T as the receiver coupled with a blue filter to achieve the required 10 Mb/s bit rates. The distance in which the optical link was measured was up to 1 m, and the link was successful (BER 10-6) for distances up to 0.7 m. To achieve higher distances and therefore to make the system practical in the home or office environment, the number of LEDs used can be scaled.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131610227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Boolean complex logic","authors":"K. Suzuki, K. Sugimoto, H. Suzuki","doi":"10.1109/COMCOMAP.2012.6154874","DOIUrl":"https://doi.org/10.1109/COMCOMAP.2012.6154874","url":null,"abstract":"This article, by describing atoms and logic formulae with complex functions, defines a new multivalued logic such that the set of logic formulae forms a Boolean algebra in contrast to popular multivalued logics such as fuzzy logics, which we call a Boolean complex logic. This article shows also some intuitively understandable examples demonstrating that the proposed logic can process deductive inferences syntactically by evaluating ranges of truth values.","PeriodicalId":281865,"journal":{"name":"2012 Computing, Communications and Applications Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133496956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}