{"title":"Concurrent Multipath Transmission with Adaptive Forward Error Correction Mechanism for Delay-Sensitive Videostreaming in Wireless Home Networks","authors":"Ming-Fong Tsai, N. Chilamkurti, J. Park, C. Shieh","doi":"10.1109/FUTURETECH.2010.5482739","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482739","url":null,"abstract":"This paper proposes the Delay-sensitive Multipath FEC (DM-FEC) mechanism involving an estimation of available bandwidth and a mathematical analytical model with which the appropriate transmission rate, FEC block length and FEC redundancy on each path in a multipath environment can be determined to solve previous problems. The DM-FEC mechanism not only can select the appropriate transmission rate and FEC redundancy on each path but also adaptively adjusts the FEC block length and concurrently sends data over multiple paths to overcome burst packet losses which otherwise can cause the video frame to be unplayable and impede the timely recovery of video information. The experimental results obtained show that the DM-FEC mechanism has better performance than conventional CMT-FEC mechanisms in wireless home networks.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Rahimi, M. Salehi, Mohammad Fattah, S. Mohammadi
{"title":"History-Based Dynamic Voltage Scaling with Few Number of Voltage Modes for GALS NoC","authors":"A. Rahimi, M. Salehi, Mohammad Fattah, S. Mohammadi","doi":"10.1109/FUTURETECH.2010.5482684","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482684","url":null,"abstract":"In this paper, we propose a history-based dynamic voltage scaling (DVS) scheme for a GALS NoC which is suitable for MPSoC architectures. The DVS scheme exploits the link utilization and adjusts the router voltages among few number of voltage modes. The introduced architecture is simulated in 90nm CMOS technology with accurate Spice simulations. Experimental results show that history-based DVS successfully adjusts router voltages to track actual link utilization over time. In comparison to the system in which the voltage is fixed at 1.0v, in a 91% saturated network, the proposed DVS scheme saves dynamic and leakage power about 3.3 and 2.3 times, respectively. In addition, 17% energy-delay saving is achieved in the same traffic load.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132280264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CTB-MAC: Cluster-Based TDMA Broadcast MAC Protocol for Mobile Ad-Hoc Network","authors":"Ananta Pandey, J. Lim","doi":"10.1109/FUTURETECH.2010.5482770","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482770","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121868524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development Framework for Supporting Java NS2 Routing Protocols","authors":"U. Herberg, I. Taylor","doi":"10.1109/FUTURETECH.2010.5482665","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482665","url":null,"abstract":"This paper presents a framework for developing and executing Java routing protocol implementations within the network simulator NS2. NS2 provides extensive support for developing C++ routing protocols, but has no Java support. In this paper, we describe extensions we have made to the AgentJ toolkit that enable routing protocols to be integrated directly into NS2 without needing to extend the internals of NS2 for each new protocol. The framework defines a reusable AgentJ routing protocol definition that can be used to register new protocols dynamically from within Java code. The actual routing protocol can then leverage the AgentJ toolkit for executing unmodified Java applications in NS2. By means of aspect-oriented byte-code rewriting, AgentJ allows preexisting Java routing protocols, which run on the Internet, to run unmodified within NS2. This powerful system also helps researchers to both understand high-level and algorithmic properties of a given Java routing protocol through the analysis of an NS2 simulation and to rapidly develop and debug new routing protocols through prototyping and experimentation.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122059767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grids vs. Clouds","authors":"Michael Brock, A. Goscinski","doi":"10.1109/FUTURETECH.2010.5482758","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482758","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114081084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gaëtan Martens, C. Poppe, P. Lambert, R. Van de Walle
{"title":"Perceptual-Based Textures for Scene Labeling: A Bottom-Up and a Top-Down Approach","authors":"Gaëtan Martens, C. Poppe, P. Lambert, R. Van de Walle","doi":"10.1109/FUTURETECH.2010.5482650","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482650","url":null,"abstract":"Due to the semantic gap, the automatic interpretation of digital images is a very challenging task. Both the segmentation and classification are intricate because of the high variation of the data. Therefore, the application of appropriate features is of utter importance. This paper presents biologically inspired texture features for material classification and interpreting outdoor scenery images. Experiments show that the presented texture features obtain the best classification results for material recognition compared to other well-known texture features, with an average classification rate of 93.0%. For scene analysis, both a bottom-up and top-down strategy are employed to bridge the semantic gap. At first, images are segmented into regions based on the perceptual texture and next, a semantic label is calculated for these regions. Since this emerging interpretation is still error prone, domain knowledge is ingested to achieve a more accurate description of the depicted scene. By applying both strategies, 91.9% of the pixels from outdoor scenery images obtained a correct label.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130559665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Symmetric Key Cryptosystem Based on Randomized Block Cipher","authors":"S. Aruljothi, M. Venkatesulu","doi":"10.1109/FUTURETECH.2010.5482692","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482692","url":null,"abstract":"Multimedia data encryption attempts to prevent unauthorized disclosure of confidential multimedia information in transit or storage. Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. If we call a multimedia data stream (message) plaintext , the process of transforming the plaintext into unintelligible data stream is referred to as multimedia encryption (MME) where the encrypted message (data stream) is often named ciphertext. The process of transforming the ciphertext back into plaintext is termed decryption. We propose a new block cipher based on randomized key of size n × n where n is the block size and the block undergoes n2 iterations with the plaintext. Every iteration generates the pseudo cipher text. The encryption process generate the ciphertext C with the help of the randomized key. The decryption apply the key in reverse order on the cipher text, to get back the plain text. This work deals with the problem of efficient multimedia data encryption.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129909658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated State Machines Applied in Client Honeypots","authors":"Yaser Alosefer, O. Rana","doi":"10.1109/FUTURETECH.2010.5482695","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482695","url":null,"abstract":"Client honeypots visit and interact with suspect web sites in order to detect and collect information about malware. This paper will show the benefits of client honeypots as well as the use of an automated state machine in conjunction with a client honeypot. The state machine provides a powerful framework to organize monitoring of malware activity and record the results. We are developing a platform for integrating client honeypots applied on state machines in a Windows environment.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124112814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Domotic: An Enabling Platform for Granular Intelligence","authors":"B. Apolloni, S. Bassis, G. Galliani, L. Valerio","doi":"10.1109/FUTURETECH.2010.5482697","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482697","url":null,"abstract":"We describe a wireless platform for implementing domotic applications drawn from a fuzzy rule system. The design of its architecture hits three targets: i) complete scalability with the addition of new devices into the domotic system, ii) full operability by the user who is the arbiter of any operational option, and iii) robotic controllability based on a series of environmental sensors and an autonomous rule system under the total supervision of the user. The hardware counterpart is based on a series of micro-transmitters connecting the house devices to the platform through Z-Wave or wired protocols and smartphones as end-user terminals. In the paper we describe how the entire platform has been implemented in our lab and provide some considerations deriving from its early operations.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134252611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research of Ushiki-Map Chaos PRN in SoL Data Signal of Galileo System","authors":"Zhao Chen, Tianhao Tang, Yongxing Jin","doi":"10.1109/FUTURETECH.2010.5482703","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482703","url":null,"abstract":"The signals of Galileo system were assigned by navigation systems panel (NSP). Some detailed characteristic of RF signals was civil aviation. But it needed some easy way to select out from the other signals such as GPS signal. So BOC modulation was recommend to the Galileo system. The key element of BOC was the PRN which was a stochastic and orthogonal signal. The Ushiki-Map chaos sequence was used to represent the PRN was a good way to modulate the RF signal of Galileo system. It was a two-dimension map in time domain. The space station of Galileo system used chaos BOC modulation; the earth station of it used chaos CDMA2000. The chaos way was enhanced the performance of Galileo system and simplify the structure of modulation which had practicability.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128495151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}