2009 International Conference on Future Computer and Communication最新文献

筛选
英文 中文
A Comparison of UWB Communication Characteristics for Different Distribution of People and Various Materials of Walls 不同人群分布和不同墙体材料的超宽带通信特性比较
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.129
Min-Hui Ho, Shu-Han Liao, Chien-Hung Chen, C. Chiu
{"title":"A Comparison of UWB Communication Characteristics for Different Distribution of People and Various Materials of Walls","authors":"Min-Hui Ho, Shu-Han Liao, Chien-Hung Chen, C. Chiu","doi":"10.1109/ICFCC.2009.129","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.129","url":null,"abstract":"A comparison of UWB communication characteristics for different distribution of people and various materials of walls in real environments are investigated. By using the impulse response of these multi-path channels, the mean excess delay, root mean square delay spread, and the number of multi-path arrivals within 10 dB of the peak multi-path arrival (NP10dB), and the number of paths required to meet the 85% energy capture threshold (NP(85%)) for these cases have been obtained. Numerical results have shown that the multi-path effect by people is an important factor for bit error rate (BER) and outage probability performance.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"48 3-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123412039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Secure Mobile Payment System in Wireless Environment 无线环境下的安全移动支付系统
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.125
S. Manvi, L. B. Bhajantri, M. Vijayakumar
{"title":"Secure Mobile Payment System in Wireless Environment","authors":"S. Manvi, L. B. Bhajantri, M. Vijayakumar","doi":"10.1109/ICFCC.2009.125","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.125","url":null,"abstract":"Mobile payments are payments that are carried out through mobile devices in wireless environment. Mobile payment is considered as the accelerator of e-commerce and m-commerce. Currently mobile payments deal with several problems to improve requirements of m-commerce such as: simplifying the mobile payment processes for consumers, improving the security of payment, especially the application of digital signing in mobile payment. The proposed work introduces alternative ways for providing mobile banking services aimed at J2ME enabled mobile phones over Bluetooth communication. The scope of the proposed solution is the combination of J2EE and J2ME capabilities, means of overcoming the API and technical limitations, as well as security consideration. This paper defines the secure mobile payment system to allow mobile users to conduct mobile transactions over Bluetooth communications but also supports the related secured transactions between the payment server and mobile clients. Finally, we have discussed some of the performance parameters such as: time required to password hack for various character lengths, delay and probability error rate.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128905867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Computational Calculations of Islamic Prayer Times - Issues and Solutions 伊斯兰礼拜时间的计算——问题和解决办法
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.85
Z. Ismaail, Zulhizam Sanip, Norashikin Yahaya, Ereneyanti Husmin, R. Kaspin, Noor Fazilatulakma Mohd Zaini, F. Bakar
{"title":"Computational Calculations of Islamic Prayer Times - Issues and Solutions","authors":"Z. Ismaail, Zulhizam Sanip, Norashikin Yahaya, Ereneyanti Husmin, R. Kaspin, Noor Fazilatulakma Mohd Zaini, F. Bakar","doi":"10.1109/ICFCC.2009.85","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.85","url":null,"abstract":"This paper aims to describe the computational calculation of prayer times that will be applied to IMS application for a Location-based Content Utility Service Terminal. In order to calculate the prayer time, a number of properties that relate to the sun such as declination of angle should be taking in consideration. The solar declination reading is used to determine the time begins and time ends of each prayer times. The descriptions for start and end times for Salats is different according to different school.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128963401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Adaptive Network Fuzzy Inference System (ANFIS) Handoff Algorithm 自适应网络模糊推理系统(ANFIS)切换算法
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.95
K. C. Foong, ChuahTeong Chee, L. Wei
{"title":"Adaptive Network Fuzzy Inference System (ANFIS) Handoff Algorithm","authors":"K. C. Foong, ChuahTeong Chee, L. Wei","doi":"10.1109/ICFCC.2009.95","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.95","url":null,"abstract":"Mobility management in the heterogeneous environment demands different design approach, especially in the handoff decision. This is to fulfill the different requirements of different segments especially in the hybrid satellite and terrestrial scenario. There are many works done to replace the traditional handoff algorithm such as hysteresis and fuzzy logic based handoff algorithm. The fuzzy handoff algorithm proposed by earlier work is not optimized and required constant attention from the human experts. This paper proposes a newer approach using Adaptive Network Fuzzy Inference System (ANFIS) where the training element is incorporated into the existing fuzzy handoff algorithm.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124531641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
New Factor of Authentication: Something You Process 新的认证因素:你处理的东西
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.79
S. Shah, Fazl-e-Hadi Riphah, A. A. Minhas
{"title":"New Factor of Authentication: Something You Process","authors":"S. Shah, Fazl-e-Hadi Riphah, A. A. Minhas","doi":"10.1109/ICFCC.2009.79","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.79","url":null,"abstract":"In traditional computing system, user Authentication is dependent on four authentication factors i.e., Something You have (e.g., a hardware token/credit card), Something You are (e.g., a fingerprint), and Something You know (e.g., a password/PIN code) and Somebody You know. In this paper we explore new factor of Authentication, that is, Something You process. Valid user identification is the demand of computing society and it plays a very key role in the arena of security. This study explores a new factor of authentication, human cognitive level of authentication for access control, and proposes new model of multilevel security. This study explores its usage in providing primary mode of authentication in a new and simplified way and discusses its pros and cons.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"59 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121007966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The Theoretic and Empirical Analysis on the Impact of Network Virtual Money on Real Money Supply 网络虚拟货币对现实货币供给影响的理论与实证分析
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.45
Hui Peng, Yanli Sun
{"title":"The Theoretic and Empirical Analysis on the Impact of Network Virtual Money on Real Money Supply","authors":"Hui Peng, Yanli Sun","doi":"10.1109/ICFCC.2009.45","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.45","url":null,"abstract":"Existing literatures took network virtual money as a prepaid method which has no effects on real money supply. We argue that, the phenomenon that virtual money acts as a medium of exchange in the real goods trade and that real GDP affected by the virtual community should be taken into consideration when studying the effects of virtual money on real money supply. This paper classified the effect of virtual economy on real economy into three types: no substitution effect, positive substitution effect and negative substitution effect. The impact of virtual money on real money supply is mainly reflected in two aspects: First, the substitution effect of virtual economy on real economy affects the volume of real monetary base; Second, the net effect of crowding-out effect of virtual money and the behavior effect of issuers changes the internal monetary base structure of cash and reserve, leading to the cash-deposit ratio reduction and real monetary multiplier increase. Based on the analysis of data in China, we found that the effect of virtual economy on real economy is negative substitute currently, we also calculated the intensity of the crowding-out effect of virtual money to real money, verified that the crowding-out effect is greater than the behavior effect recently. Finally, new monetary statistical and monitoring indicator is advanced for Central Bank under the influence of virtual money, and the marginal substitution propensity of virtual money is advised to measure whether the volume of virtual money should be monitored and integrated into the amount of money supply.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127293587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Extensive Empirical Study for the Impact of Increasing Data Hidden on the Images Texture 增加隐藏数据对图像纹理影响的广泛实证研究
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.154
Fazidah Othman, Laiha Maktom, A. Taqa, B. Zaidan, A. A. Zaidan
{"title":"An Extensive Empirical Study for the Impact of Increasing Data Hidden on the Images Texture","authors":"Fazidah Othman, Laiha Maktom, A. Taqa, B. Zaidan, A. A. Zaidan","doi":"10.1109/ICFCC.2009.154","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.154","url":null,"abstract":"Steganography is the art of hidden important information inside other innocuous media in an imperceptible way. In this paper we will overview the use of data hidden techniques in digital images. In particular we will describe on how can use the human vision system and pure Steganography to increase the size of the data that want to embed in the image. This paper will focused on the property of human vision system that help to increase the size of data hidden in the bitmap (.bmp) and (.JPG) image practically and improve the work by given result and make a brief discussion on this result. Image processing is involved in the texture analysis, it is important to quantitatively evaluate such differences using texture features. This paper also discuss the impact of increasing data hidden on the images texture for colour image and gray level image.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133617416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Performance Analysis of a General Tree Structure for Target Detection in Wireless Sensor Networks 一种用于无线传感器网络目标检测的通用树状结构性能分析
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.105
H. Varaee, G. Mirjalily, A. Tadaion
{"title":"Performance Analysis of a General Tree Structure for Target Detection in Wireless Sensor Networks","authors":"H. Varaee, G. Mirjalily, A. Tadaion","doi":"10.1109/ICFCC.2009.105","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.105","url":null,"abstract":"One of the basic tasks of a wireless sensor network is target detection, and one of the main issues must be addressed in a detection sensor network is its active topology. Here, we assume a simple hierarchical topology, where sensors that are close to each other will form a cluster and each cluster has its own cluster head, which serves as the local fusion center. Based on decisions received from sensors located within a specific cluster, the corresponding cluster head will make a decision about target presence/absence within that sub-region. The decisions from cluster heads will be further transmitted to the central fusion node to inform it if there is a target or event in specific sub-regions. In this paper, we propose a general tree structure to fuse decisions within a cluster. The aim is to investigate the effects of using different tree topologies in a cluster on the detection performance and energy consumption in a detection sensor network. We will find a tradeoff between high performance and low energy consumption. For this purpose, a function named energy-error has been defined. By finding the minimum value of this function, it is possible to achieve a tradeoff between performance and energy consumption","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133771277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of the Efficiency of Different Remote User and Server Authentication Schemes 不同远程用户和服务器认证方案的效率分析
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.144
C. Koner, C. Bhunia, U. Maulik
{"title":"Analysis of the Efficiency of Different Remote User and Server Authentication Schemes","authors":"C. Koner, C. Bhunia, U. Maulik","doi":"10.1109/ICFCC.2009.144","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.144","url":null,"abstract":"Authentication in sending information is a great research challenge. Many different authentication schemes have been invented to improve the security and efficiency due to increasing of threats and attacks with the increasing volume of traffic. There is a need for analysis the efficiency and security of authentication schemes to apply them in specific application. For this purpose, an analysis of few authentication schemes is made with several parameters of interest in this paper. We observe that no scheme is suitable for all applications neither any application is suitable invariably.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Rate Video Streaming Steganography 高速率视频流隐写术
2009 International Conference on Future Computer and Communication Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.44
Mohamed Elsadig Eltahir, Laiha Binti Mat Kiah, B. Zaidan, A. Zaidan
{"title":"High Rate Video Streaming Steganography","authors":"Mohamed Elsadig Eltahir, Laiha Binti Mat Kiah, B. Zaidan, A. Zaidan","doi":"10.1109/ICFCC.2009.44","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.44","url":null,"abstract":"Steganography is the idea of hiding private or sensitive data or information within something that appears to be nothing out of the ordinary.In this paper we will overview the use of data hiding techniques in digital video as still images. We will describe how we can use the Least Significant Bit insertion (LSB) method on video images or frames, in addition to the usage of the human vision system to increase the size of the data embedded in digital video streaming.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123412581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信