2010 5th International Conference on Future Information Technology最新文献

筛选
英文 中文
Concurrent Multipath Transmission with Adaptive Forward Error Correction Mechanism for Delay-Sensitive Videostreaming in Wireless Home Networks 基于自适应前向纠错机制的无线家庭网络延迟敏感视频流并发多径传输
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482739
Ming-Fong Tsai, N. Chilamkurti, J. Park, C. Shieh
{"title":"Concurrent Multipath Transmission with Adaptive Forward Error Correction Mechanism for Delay-Sensitive Videostreaming in Wireless Home Networks","authors":"Ming-Fong Tsai, N. Chilamkurti, J. Park, C. Shieh","doi":"10.1109/FUTURETECH.2010.5482739","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482739","url":null,"abstract":"This paper proposes the Delay-sensitive Multipath FEC (DM-FEC) mechanism involving an estimation of available bandwidth and a mathematical analytical model with which the appropriate transmission rate, FEC block length and FEC redundancy on each path in a multipath environment can be determined to solve previous problems. The DM-FEC mechanism not only can select the appropriate transmission rate and FEC redundancy on each path but also adaptively adjusts the FEC block length and concurrently sends data over multiple paths to overcome burst packet losses which otherwise can cause the video frame to be unplayable and impede the timely recovery of video information. The experimental results obtained show that the DM-FEC mechanism has better performance than conventional CMT-FEC mechanisms in wireless home networks.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
History-Based Dynamic Voltage Scaling with Few Number of Voltage Modes for GALS NoC 基于历史的低电压模式GALS NoC动态电压缩放
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482684
A. Rahimi, M. Salehi, Mohammad Fattah, S. Mohammadi
{"title":"History-Based Dynamic Voltage Scaling with Few Number of Voltage Modes for GALS NoC","authors":"A. Rahimi, M. Salehi, Mohammad Fattah, S. Mohammadi","doi":"10.1109/FUTURETECH.2010.5482684","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482684","url":null,"abstract":"In this paper, we propose a history-based dynamic voltage scaling (DVS) scheme for a GALS NoC which is suitable for MPSoC architectures. The DVS scheme exploits the link utilization and adjusts the router voltages among few number of voltage modes. The introduced architecture is simulated in 90nm CMOS technology with accurate Spice simulations. Experimental results show that history-based DVS successfully adjusts router voltages to track actual link utilization over time. In comparison to the system in which the voltage is fixed at 1.0v, in a 91% saturated network, the proposed DVS scheme saves dynamic and leakage power about 3.3 and 2.3 times, respectively. In addition, 17% energy-delay saving is achieved in the same traffic load.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132280264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
CTB-MAC: Cluster-Based TDMA Broadcast MAC Protocol for Mobile Ad-Hoc Network CTB-MAC:基于集群的移动自组织网络TDMA广播MAC协议
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482770
Ananta Pandey, J. Lim
{"title":"CTB-MAC: Cluster-Based TDMA Broadcast MAC Protocol for Mobile Ad-Hoc Network","authors":"Ananta Pandey, J. Lim","doi":"10.1109/FUTURETECH.2010.5482770","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482770","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121868524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Development Framework for Supporting Java NS2 Routing Protocols 支持Java NS2路由协议的开发框架
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482665
U. Herberg, I. Taylor
{"title":"Development Framework for Supporting Java NS2 Routing Protocols","authors":"U. Herberg, I. Taylor","doi":"10.1109/FUTURETECH.2010.5482665","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482665","url":null,"abstract":"This paper presents a framework for developing and executing Java routing protocol implementations within the network simulator NS2. NS2 provides extensive support for developing C++ routing protocols, but has no Java support. In this paper, we describe extensions we have made to the AgentJ toolkit that enable routing protocols to be integrated directly into NS2 without needing to extend the internals of NS2 for each new protocol. The framework defines a reusable AgentJ routing protocol definition that can be used to register new protocols dynamically from within Java code. The actual routing protocol can then leverage the AgentJ toolkit for executing unmodified Java applications in NS2. By means of aspect-oriented byte-code rewriting, AgentJ allows preexisting Java routing protocols, which run on the Internet, to run unmodified within NS2. This powerful system also helps researchers to both understand high-level and algorithmic properties of a given Java routing protocol through the analysis of an NS2 simulation and to rapidly develop and debug new routing protocols through prototyping and experimentation.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122059767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Grids vs. Clouds 网格与云
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482758
Michael Brock, A. Goscinski
{"title":"Grids vs. Clouds","authors":"Michael Brock, A. Goscinski","doi":"10.1109/FUTURETECH.2010.5482758","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482758","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114081084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Perceptual-Based Textures for Scene Labeling: A Bottom-Up and a Top-Down Approach 基于感知的场景标记纹理:自下而上和自上而下的方法
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482650
Gaëtan Martens, C. Poppe, P. Lambert, R. Van de Walle
{"title":"Perceptual-Based Textures for Scene Labeling: A Bottom-Up and a Top-Down Approach","authors":"Gaëtan Martens, C. Poppe, P. Lambert, R. Van de Walle","doi":"10.1109/FUTURETECH.2010.5482650","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482650","url":null,"abstract":"Due to the semantic gap, the automatic interpretation of digital images is a very challenging task. Both the segmentation and classification are intricate because of the high variation of the data. Therefore, the application of appropriate features is of utter importance. This paper presents biologically inspired texture features for material classification and interpreting outdoor scenery images. Experiments show that the presented texture features obtain the best classification results for material recognition compared to other well-known texture features, with an average classification rate of 93.0%. For scene analysis, both a bottom-up and top-down strategy are employed to bridge the semantic gap. At first, images are segmented into regions based on the perceptual texture and next, a semantic label is calculated for these regions. Since this emerging interpretation is still error prone, domain knowledge is ingested to achieve a more accurate description of the depicted scene. By applying both strategies, 91.9% of the pixels from outdoor scenery images obtained a correct label.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130559665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Symmetric Key Cryptosystem Based on Randomized Block Cipher 基于随机分组密码的对称密钥密码系统
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482692
S. Aruljothi, M. Venkatesulu
{"title":"Symmetric Key Cryptosystem Based on Randomized Block Cipher","authors":"S. Aruljothi, M. Venkatesulu","doi":"10.1109/FUTURETECH.2010.5482692","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482692","url":null,"abstract":"Multimedia data encryption attempts to prevent unauthorized disclosure of confidential multimedia information in transit or storage. Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. If we call a multimedia data stream (message) plaintext , the process of transforming the plaintext into unintelligible data stream is referred to as multimedia encryption (MME) where the encrypted message (data stream) is often named ciphertext. The process of transforming the ciphertext back into plaintext is termed decryption. We propose a new block cipher based on randomized key of size n × n where n is the block size and the block undergoes n2 iterations with the plaintext. Every iteration generates the pseudo cipher text. The encryption process generate the ciphertext C with the help of the randomized key. The decryption apply the key in reverse order on the cipher text, to get back the plain text. This work deals with the problem of efficient multimedia data encryption.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129909658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Automated State Machines Applied in Client Honeypots 自动状态机在客户端蜜罐中的应用
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482695
Yaser Alosefer, O. Rana
{"title":"Automated State Machines Applied in Client Honeypots","authors":"Yaser Alosefer, O. Rana","doi":"10.1109/FUTURETECH.2010.5482695","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482695","url":null,"abstract":"Client honeypots visit and interact with suspect web sites in order to detect and collect information about malware. This paper will show the benefits of client honeypots as well as the use of an automated state machine in conjunction with a client honeypot. The state machine provides a powerful framework to organize monitoring of malware activity and record the results. We are developing a platform for integrating client honeypots applied on state machines in a Windows environment.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124112814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Wireless Domotic: An Enabling Platform for Granular Intelligence 无线局域网:一个支持粒度智能的平台
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482697
B. Apolloni, S. Bassis, G. Galliani, L. Valerio
{"title":"Wireless Domotic: An Enabling Platform for Granular Intelligence","authors":"B. Apolloni, S. Bassis, G. Galliani, L. Valerio","doi":"10.1109/FUTURETECH.2010.5482697","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482697","url":null,"abstract":"We describe a wireless platform for implementing domotic applications drawn from a fuzzy rule system. The design of its architecture hits three targets: i) complete scalability with the addition of new devices into the domotic system, ii) full operability by the user who is the arbiter of any operational option, and iii) robotic controllability based on a series of environmental sensors and an autonomous rule system under the total supervision of the user. The hardware counterpart is based on a series of micro-transmitters connecting the house devices to the platform through Z-Wave or wired protocols and smartphones as end-user terminals. In the paper we describe how the entire platform has been implemented in our lab and provide some considerations deriving from its early operations.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134252611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Research of Ushiki-Map Chaos PRN in SoL Data Signal of Galileo System 伽利略系统SoL数据信号中的Ushiki-Map混沌PRN研究
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482703
Zhao Chen, Tianhao Tang, Yongxing Jin
{"title":"The Research of Ushiki-Map Chaos PRN in SoL Data Signal of Galileo System","authors":"Zhao Chen, Tianhao Tang, Yongxing Jin","doi":"10.1109/FUTURETECH.2010.5482703","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482703","url":null,"abstract":"The signals of Galileo system were assigned by navigation systems panel (NSP). Some detailed characteristic of RF signals was civil aviation. But it needed some easy way to select out from the other signals such as GPS signal. So BOC modulation was recommend to the Galileo system. The key element of BOC was the PRN which was a stochastic and orthogonal signal. The Ushiki-Map chaos sequence was used to represent the PRN was a good way to modulate the RF signal of Galileo system. It was a two-dimension map in time domain. The space station of Galileo system used chaos BOC modulation; the earth station of it used chaos CDMA2000. The chaos way was enhanced the performance of Galileo system and simplify the structure of modulation which had practicability.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128495151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信