{"title":"IPv6Suite: a simulation tool for modeling protocols of the next generation Internet","authors":"E. Wu, Steve Woon, Johnny Lai, Y. Sekercioglu","doi":"10.1109/ITRE.2005.1503159","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503159","url":null,"abstract":"In this paper, we describe our software tool (IPv6Suite) which is capable of simulating IPv6 networks accurately. The IPv6 network components are modeled in detail with important functionalities closely following the relevant protocol standard. The OMNeT++ simulation environment is used, providing a generic and flexible architecture with a strong graphical user interface (GUI) support. This allowed the construction of a comprehensive IPv6 model, which is customizable and easy to use. IPv6Suite is a powerful tool for learning and researching IPv6 networks and protocols.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132810715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frame-based attack representation and real-time first order logic automatic reasoning","authors":"W. Yan, E. Hou, N. Ansari","doi":"10.1109/ITRE.2005.1503109","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503109","url":null,"abstract":"Internet has grown by several orders of magnitude in recent years, prompting network security as a great concern. Hence, intrusion detection systems (IDSs) are used to timely detect intrusions and defend against attack attempts. However, the current IDS technology generates a huge volume of alert events due to false alarm alerts, and requires costly alert manual reviewing due to the lack of intelligence in IDS. As a solution, security information management (SIM) is a growing area of interest in network security. In this paper, we propose FAR-FAR (frame-based attack representation and first-order logic automatic reasoning) system in SIM to relieve the administrator from the time-consuming and costly alert manual reviewing. With the backward-chaining, FAR-FAR can make real-time reasoning for network attack scenarios. In FAR-FAR, the aggregated alerts from different IDS agents are converted into uniform frame-structured streams by case grammar. Afterwards, first-order logic production rules are used to extract the hidden attack scenarios. Our simulation results show that FAR-FAR's attack scenario reasoning rate for the incoming alerts are generally far less than the incoming alerts' inter-arrival time. This guarantees FAR-FAR to automatically reason the attack plans in real time and predict possible attack attempts at an early stage.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116202865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A robust watermarking scheme for digital image using self similarity","authors":"Jieh-Ming Shieh, D. Lou, H. Tso","doi":"10.1109/ITRE.2005.1503079","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503079","url":null,"abstract":"The robust watermarking technique has been generally discussed for protecting the copyright of digital media. The paper proposes a watermarking technique with self similarity to achieve the requirement of robustness. Instead of modifying the original image to embed a watermark into an image, the proposed scheme extract a watermark from a protected image by using self similarity between wavelet sub-bands. In the verification stage, the watermark extracting does not need the original image but the attacked image. Then the extracted watermark is compared with the original watermark for copyright verification. The proposed method has the following advantages. The first one is that the proposed method does not modify the protected image. The second one is that the original image is not necessary in the verification process. The third one is that the proposed method is robust to resist several image processing attacks such as JPEG and JPEG2000 compression, blurring, sharpening, noise adding, and scaling.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122253941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A network layer security mechanism based on collaborative intelligent agents in MANET","authors":"Lu Han, Dongmin Zhao, Manli Zhou","doi":"10.1109/ITRE.2005.1503066","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503066","url":null,"abstract":"A new network-layer security mechanism incorporating mobile agent security and grid technology is presented. The architecture of scheme is introduced along with the method to manage sub-network in grid format and the secure routing protocol. The storage space complexity and operational time of the new scheme are then analyzed. Simulation results show that the proposed mechanism is capable of achieving reliable performance in terms of packet delivery ratio when the network environment is insecure.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115538740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of a biology data translation system on grid environments","authors":"Chao-Tung Yang, Yi-Chun Hsiung, H. Kan","doi":"10.1109/ITRE.2005.1503151","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503151","url":null,"abstract":"Biological data exists all over the world as various Web services, which provide biologists with much useful information. However, heterogeneous data formats present a technical hurdle for biologists to fully take advantage of the information. It needs some power tools to handle this issue. The grid technology could help common biology tools with high performance and high throughput. Even so, the data formats produced from various biology tools are heterogeneous. The process of information integration of heterogeneous biological data is complex and difficult. This paper describes an approach to solve this problem by using XML technologies combine with BioGrid system. We use BioJava to integrate with our system for translating data into XML format. Finally, an example is used to illustrate how these techniques can come together in integrating heterogeneous biological data sources.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115736578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chia-Hsing Hou, Hung-Chang Hsiao, C. King, Chun-Nan Lu
{"title":"Context discovery in sensor networks","authors":"Chia-Hsing Hou, Hung-Chang Hsiao, C. King, Chun-Nan Lu","doi":"10.1109/ITRE.2005.1503053","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503053","url":null,"abstract":"Context discovery refers loosely to the operations of extraction, aggregation, storage and deduction of environmental information. Such information can be delivered to context-aware applications so that they can adapt their behavior according to the discovered contexts. Context information may be sensed and extracted by various sensors deployed freely in the environment These sensors must be interconnected to allow sensed data be collected. They are often heterogeneous with different sensing and computing capabilities to allow multimodal sensing. To help the interaction among the heterogeneous sensors in a context-aware environment, we need an efficient data-centric communication substrate on top of these sensors. The substrate must be self-organizing, self-tuning, and self-healing. It also needs to exploit the ad hoc interactions among heterogeneous sensors for energy conservation and operation efficiency. In this paper, we introduce such a substrate called TRAILBLAZER to enable the discovery of high-level contexts. We evaluate TRAILBLAZER via simulation. The results show that the communication among sensors is efficient in terms of the consumed energy when compared with an ideal solution and it is also fault-resilient.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115370370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of the UMTS system for Web traffic over dedicated channels","authors":"M. Sarvagya, Ratnam V. Raja Kumar","doi":"10.1109/ITRE.2005.1503155","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503155","url":null,"abstract":"The WCDMA based 3G cellular standards have a great flexibility and a variety of logical and transport channels defined for different types of traffic classes. In this paper performance of the dedicated channel for WWW traffic has been investigated. The UMTS standard specifies the use of dedicated channels (DCH) for the actual traffic, through access requests placed on the random access channel (RACH). Performance of the UMTS MAC on dedicated channel for Web traffic has been studied through simulation models in terms of throughput, transfer delay, collision probability and blocking probability as a function of network load. Also the effect of other parameters like number of users and number of resources on the performance has been analyzed for UTRA- FDD.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126739279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A two-tier on-line learning model for teaching Web services","authors":"Cheer-Sun D. Yang","doi":"10.1109/ITRE.2005.1503062","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503062","url":null,"abstract":"Since the advent of the Internet and the World-Wide Web (WWW), the computing model known as business-to-business (B2B) e-commerce has evolved to take advantage of the ubiquitous accessing of the Internet The concept of Web services using extensible Markup Language (XML) and Simple Object Access Protocol (SOAP) has become an essential subject in the curriculum of Computer Science. However, there have been too many standards to be covered in one semester. This paper discusses the pedagogical issues on teaching Web services using a two-tiered approach. This approach is deployed with a Web-based online tutorial to form the main idea of the two-tiered online learning model. This paper describes the details about the two-tiered online learning model first. Then, the teaching experience on using the Java Web Service Developer's Pack (JWSDP) tutorial is provided. Finally, the advantages of the two-tier online learning model are summarized.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121825260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wen-Tsuen Chen, Wen-Hsiang Tsai, C. King, Yaw-Chung Chen
{"title":"An overview of the project for next generation information communication networks","authors":"Wen-Tsuen Chen, Wen-Hsiang Tsai, C. King, Yaw-Chung Chen","doi":"10.1109/ITRE.2005.1503103","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503103","url":null,"abstract":"The project, \"Advanced Technologies and Applications of Next Generation Information Communication Networks,\" is a four-year, multi-disciplinary research project sponsored by the Ministry of Education, R.O.C., under the \"Program for Promoting Academic Excellence of Universities.\" The project started in January 2000 and completed in March 2004. In this paper, we give an overview of the project and highlight some of the major achievements.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122087956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of optimistic and pessimistic pilgrims for concurrency management in CSCW through a probabilistic study","authors":"G. Eric, H. Julien, L. Jean-Christophe","doi":"10.1109/ITRE.2005.1503130","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503130","url":null,"abstract":"Concurrency management protocols are required in CSCW applications in which users create, update and delete shared objects. Pessimistic protocols are based on lock-unlock mechanisms before writings, whereas users are allowed to do modifications without having locked the object in optimistic protocols. Our pilgrim protocol is pessimistic since a user has to become the owner of an object before modifying it optimistic protocols minimize the delays before writing. This is the reason why we defined an optimistic protocol based on the pilgrim protocol, using multiversion. After having presenting both of those protocols through a finite state automaton, we make a comparison of them based on a probabilistic study. This study allows us to choose whether the optimistic or the pessimistic pilgrim regarding user activities, types of CSCW and network.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116902508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}