2009 Sixth International Conference on Information Technology: New Generations最新文献

筛选
英文 中文
Security in Wireless Mesh Networks: Challenges and Solutions 无线网状网络的安全性:挑战与解决方案
P. Yi, Tianhao Tong, Ning Liu, Yue Wu, Jianqing Ma
{"title":"Security in Wireless Mesh Networks: Challenges and Solutions","authors":"P. Yi, Tianhao Tong, Ning Liu, Yue Wu, Jianqing Ma","doi":"10.1109/ITNG.2009.20","DOIUrl":"https://doi.org/10.1109/ITNG.2009.20","url":null,"abstract":"Wireless Mesh Network (WMN) is an emerging technology that has developed a lot these years. WMN has the feather of self-organization, distributed structure. The main topological characteristic of WMN is that there are only one or several node connecting to the infrastructure network as gateway and all other nodes connect to the gateway through the relay of the neighboring nodes, and then connect with the internet. WMN represents a whole new network concept and because of the nature of wireless and multi-hop, the security vulnerabilities have become crucial problems. Therefore, specified security mechanism should be introduced. The research on the key security theories and detection to intrusion of WMN has become of great significance both theoretically and empirically. This article starts from the introduction of the basic organization and characteristics of WMN, presenting major security problems and key security approach gradually to the reader, and concludes with the comparison of several secure routing protocols.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114304576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A Novel Biological Recognition Method Based on Cranio-maxillo-facial Feature Information 基于颅颌面特征信息的生物识别新方法
Liwen Huang, Jing Yang, Xiaolong Wu, Xiaoqian Hu
{"title":"A Novel Biological Recognition Method Based on Cranio-maxillo-facial Feature Information","authors":"Liwen Huang, Jing Yang, Xiaolong Wu, Xiaoqian Hu","doi":"10.1109/ITNG.2009.22","DOIUrl":"https://doi.org/10.1109/ITNG.2009.22","url":null,"abstract":"Recently the multi-model recognition has been considered the development trend for the fast-developing biological recognition technology. Taking humanity cranio-maxillo-facial as the target, a novel recognition method is proposed in this paper. Starting from the mathematical model based on extracting characteristic parameters, the types of characteristic parameters is determined, and the features of different parameters are analyzed. Meanwhile the computational method of related parameters has been completed. Finally, a new recognition algorithm based on these parameters is proposed and our preliminary simulation results indicate that this algorithm is effective.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117180048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Movies and Television Shows Using Motion 使用动态的电影和电视节目分类
Mark S. Smith, R. Hashemi, L. Sears
{"title":"Classification of Movies and Television Shows Using Motion","authors":"Mark S. Smith, R. Hashemi, L. Sears","doi":"10.1109/ITNG.2009.250","DOIUrl":"https://doi.org/10.1109/ITNG.2009.250","url":null,"abstract":"An innovative technique used for categorizing motion pictures and television shows based on motion activity is presented. First, scenes extracted from digitally stored movies and television programs are segmented into separate clips based on various editing effects such as hard cuts, fades and dissolves. Next,the initial frame of the sequence is automatically segmented into meaningful objects using color and texture features using any image segmentation algorithm chosen by the author. An object tracking algorithm utilizing motion is then applied to each Intra (I) frame and each Predicted (P) frame in the video sequence. Interesting objects undergoing the highest degree of motion are then automatically selected for additional analysis. The distance between corresponding object’s centroids existing in adjacent frames is computed for each interesting object. These distances are then used in classifying the clip as being an action or non-action video.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Applying a Composite Process Framework (CPF) in Real Life Software Development Project 复合过程框架(CPF)在实际软件开发项目中的应用
Mohammed Al-Maharmeh, B. Unhelkar
{"title":"Applying a Composite Process Framework (CPF) in Real Life Software Development Project","authors":"Mohammed Al-Maharmeh, B. Unhelkar","doi":"10.1109/ITNG.2009.145","DOIUrl":"https://doi.org/10.1109/ITNG.2009.145","url":null,"abstract":"This paper presents the outcome of an action research study that was conducted to validate the application of a Composite Process Framework (CPF) in real life software development project. This research extends an existing application software development methodology to incorporate the composite process framework and tailor it to meet the needs of a particular software development project. This paper also discusses the importance of the agile approach to software development and its role in the CPF. This is so because the CPF aims a proper balance of ceremony and agility in a project - based on an argument that no single ‘type’ of process appears to be suitable for software development projects.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115173234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Exchange Routing Information between New Neighbor Nodes to Improve AODV Performance 在新邻居节点之间交换路由信息,提高AODV性能
L. Tuan, Yuan Luo
{"title":"Exchange Routing Information between New Neighbor Nodes to Improve AODV Performance","authors":"L. Tuan, Yuan Luo","doi":"10.1109/ITNG.2009.68","DOIUrl":"https://doi.org/10.1109/ITNG.2009.68","url":null,"abstract":"In Ad hoc On-Demand Distance Vector (AODV) protocol, once an on-demand link is established, it only maintains that link and does not care about any other paths. AODV may not use some more optimal or reserved paths which occur later but may improve its current transfer. We modify AODV that each node uses routing information provided by the new neighbor nodes to find out and update to better paths and create accumulated routes for later use. Our modeling results in NS2 show that the approach can create more optimal routes and significantly improve the performance with high mobility and traffic level network in term of delay and packet delivery ratio.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123162095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Pervasive System for Enabling Older Adults to Cope with Depression by Motivating them to Socialize 一个普遍的系统,使老年人通过激励他们社交来应对抑郁症
Alejandro Aguirre, M. Rodríguez, Á. G. Andrade
{"title":"A Pervasive System for Enabling Older Adults to Cope with Depression by Motivating them to Socialize","authors":"Alejandro Aguirre, M. Rodríguez, Á. G. Andrade","doi":"10.1109/ITNG.2009.310","DOIUrl":"https://doi.org/10.1109/ITNG.2009.310","url":null,"abstract":"We report on the design of a home-based ubiquitous computing system that helps elders to prevent and reduce the onset of depression by managing their social lifestyle with the family members. We propose that through a Social Calendar, elders are encouraged to socialize by receiving invitations and suggestions generated by the system when it detects that in the last two weeks the communication patterns with one or more of their children have been altered, or that it has detected those elders may have a symptom of depression.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123474561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A New Method to Reduce the Side-Channel Leakage Caused by Unbalanced Capacitances of Differential Interconnections in Dual-Rail Logic Styles 一种减少双轨逻辑差分互连电容不平衡引起的侧道泄漏的新方法
Jianping Quan, Guoqiang Bai
{"title":"A New Method to Reduce the Side-Channel Leakage Caused by Unbalanced Capacitances of Differential Interconnections in Dual-Rail Logic Styles","authors":"Jianping Quan, Guoqiang Bai","doi":"10.1109/ITNG.2009.185","DOIUrl":"https://doi.org/10.1109/ITNG.2009.185","url":null,"abstract":"Recently DPA resistant logic styles are of great concern. As far as we know, each kind of logic style has its own drawbacks. Masking logic styles can easily be attacked by the template attack. For dual-rail logic styles, TDPL can only keep the total power consumption of the whole cycle constant; as for WDDL, it becomes more and more difficult to efficiently match the interconnect capacitances of differential wires with shrinking feature sizes. To avoid these drawbacks, we present a new direction for routing effort to solve the unbalanced interconnection problem. By using Three-phase logic and removing the load dependent power consumption in the evaluation phase and discharge phase, our logic style is insensitive to the unbalanced interconnect capacitances of differential wires. Additionally, the early propagation effect is another threat to certain DPA resistant logic styles. We also propose a theoretical method to solve it at the system level.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123580508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID 使用移动电话的联邦身份验证机制-与OpenID的协作
R. Watanabe, Toshiaki Tanaka
{"title":"Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID","authors":"R. Watanabe, Toshiaki Tanaka","doi":"10.1109/ITNG.2009.111","DOIUrl":"https://doi.org/10.1109/ITNG.2009.111","url":null,"abstract":"OpenID authentication is a method to provide a single sign-on (SSO) service among Internet service sites. OpenID has been widely adopted by blog sites because of its usability and ease of implementation. However, the assurance of the ID in OpenID authentication is a concern because currently anyone can hold accounts on an OpenID provider (OP) simply by sending a registration mail and OPs usually do not check to confirm the real identity of their applicants. In contrast, a telephone company checks the identity of their mobile service users before a contract is completed by referring to such credentials as a driver’s license or passport. Therefore, on a cellular phone, the ID, such as subscriber ID, is assured by the contract process and telephone companies can trace the user’s identity through the ID. In this paper, we propose a federation authentication scheme between Open ID and a cellular phone in order to assure the ID of the OpenID. In addition, by using the cellular phone at user authentication for each service use, secure authentication is also provided.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124795440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Post-processing of Multiview Images: Depth Scaling 多视图图像的后处理:深度缩放
Manbae Kim
{"title":"Post-processing of Multiview Images: Depth Scaling","authors":"Manbae Kim","doi":"10.1109/ITNG.2009.110","DOIUrl":"https://doi.org/10.1109/ITNG.2009.110","url":null,"abstract":"The post processing of multiview images is one of new fields. Among them, a depth scaling is an important research. In this paper, we present a depth scaling method for multiview images that could provide an effective control of stereoscopic depth range. Unlike the previous works that change a camera configuration, our proposed method utilizes depth data in order to carry out the scaling of a depth range requested by users. In particular, our method can deal with multiview images captured by multiple cameras, and can be expanded from stereoscopic to multiview images. Our experimental results tested on automultiscopic 3D displays show that the perceived depth is appropriately scaled according to a user’s preferred depth. To prove this, DQCQS (Double Stimulus Continuous Quality Scale) subjective test is performed. The mean evaluation value of ten subjects is varied proportional to a scale factor.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121683140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Mobile Application to Support Phatic Communication in the Hybrid Space 在混合空间中支持Phatic通信的移动应用程序
Mark Bilandzic, Daniel Filonik, Michael Gross, A. Hackel, H. Mangesius, H. Krcmar
{"title":"A Mobile Application to Support Phatic Communication in the Hybrid Space","authors":"Mark Bilandzic, Daniel Filonik, Michael Gross, A. Hackel, H. Mangesius, H. Krcmar","doi":"10.1109/ITNG.2009.261","DOIUrl":"https://doi.org/10.1109/ITNG.2009.261","url":null,"abstract":"This paper presents a prototype implementation of the PengYo application that offers a cross-platform interaction method between an online social community and mobile users based on the “beeping” phenomenon. PengYo provides a novel interface that explicitly supports the practice of beeping, a nearly-globally applied implicit communication method of calling somebody and hanging up before the call is answered. In contrast to the traditional beeping-method, PengYo provides a custom tailored user interface and user interaction style for beeping, following the real-life cognitive model of “tapping someone on the shoulder”. PengYo builds a platform for further investigation of the beeping phenomenon and its usage patterns, that very little research has been done on so far. The results of further research studies that base on PengYo might deliver crucial information for redesigning and enhancing existing channels following the user-led communication phenomenon of beeping.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121752083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信