{"title":"Permission-based malware detection mechanisms for smart phones","authors":"Ming-Yang Su, Wen-Chuan Chang","doi":"10.1109/ICOIN.2014.6799722","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799722","url":null,"abstract":"Smart phone users often neglect security issues, and directly confirm the pop-up windows without reading the permission requirement of the software. As a result, many smart phones have been implanted with virus. In the Android market, malicious software is disguised as games for users to download, thus resulting in malicious consumption, phone resource consumption, assistance in crime, or information theft. This study focuses on the prevention of the malware installed on Android smart phones, and analyzes whether an app is malware according to the announced permission combinations of the application.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An SLA-aware load balancing scheme for cloud datacenters","authors":"Chung-Cheng Li, Kuochen Wang","doi":"10.1109/ICOIN.2014.6799665","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799665","url":null,"abstract":"One of the most important issues about cloud computing is how to achieve load balancing among thousands of virtual machines (VMs) in a large datacenter. In this paper, we propose a novel decentralized load balancing architecture, called tldlb (two-level decentralized load balancer). This distributed load balancer takes advantage of the decentralized architecture for providing scalability and high availability capabilities to service more cloud users. We also propose a neural network-based dynamic load balancing algorithm, called nn-dwrr (neural network-based dynamic weighted round-robin), to dispatch a large number of requests to different VMs, which are actually providing services. In nn-dwrr, we combine VM load metrics (CPU, memory, network bandwidth, and disk I/O utilizations) monitoring and neural network-based load prediction to adjust the weight of each VM. Experimental results support that our proposed load balancing algorithm, nn-dwrr, can be applied to a large cloud datacenter, and it is 1.86 times faster than the wrr, 1.49 times faster than the Capacity-based, and 1.21 times faster than the ANN-based load balancing algorithms in terms of average response time. In addition, tldlb can reduce the SLA (service-level agreement) violation rate via in-time activating VMs from a spare VM pool.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117195907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kazuhiro Yamaguchi, Hayato Iriyama, Yoshihiro Kainuma, M. Sugita, H. Matsue
{"title":"A network routing method based on received power of repeater nodes and QoS for mobile ad-hoc networks","authors":"Kazuhiro Yamaguchi, Hayato Iriyama, Yoshihiro Kainuma, M. Sugita, H. Matsue","doi":"10.1109/ICOIN.2014.6799685","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799685","url":null,"abstract":"In this paper, a network routing method based on Quality of Service (QoS) for ZigBee-based mobile ad-hoc networks in a multipath fading environment is studied. The proposed routing method adapts the priority information for QoS to Route Request message in the route discovery process and HELLO message in the route maintenance process. According to the priority information, periods elapsed between transmitting Route Request and Hello messages are controlled according to QoS mechanism. Computer simulations about route discovery times, route effective time, throughput performances, and delay-time distribution for real time and non-real time packets are carried out. We reported the results of the computer simulations and the effectiveness of the proposed routing method.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131408295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoE-enhanced adaptation algorithm over DASH for multimedia streaming","authors":"Dongeun Suh, Insun Jang, Sangheon Pack","doi":"10.1109/ICOIN.2014.6799731","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799731","url":null,"abstract":"In dynamic adaptive streaming over HTTP (DASH), a client consecutively estimates the available network bandwidth and decides the transmission rate for the forthcoming video chunks to be downloaded. Even though several enhancements to DASH have been reported in the literature, they do not well-investigate the current buffer status to cope with fluctuating network conditions and thus do not achieve seamless video streaming. In this paper, we propose a novel rate adaptation algorithm called quality of experience (QoE)-enhanced adaptation algorithm over DASH (QAAD), which preserves the minimum buffer length to avoid interruption and minimizes the video quality changes during the playback. We implemented a DASH testbed and conducted extensive experiments. Experimental results demonstrate that under fluctuating network conditions, QAAD provides seamless streaming with stabilized video quality while the previous buffer-aware algorithm (i.e., QoE-aware DASH) frequently changes the video quality and undergoes the interruption.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128971638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approximate recovery of network coded real-time information","authors":"Minhae Kwon, Hyunggon Park","doi":"10.1109/ICOIN.2014.6799741","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799741","url":null,"abstract":"In this paper, we consider real-time voice transmission or speech communication systems, where voice information is encoded based on network coding techniques. For real-time delivery of data encoded by network coding techniques, the All-Or-Nothing problem of network coding is one of the most important challenges in order to guarantee quality of service (QoS) requirements. In order to overcome the problem, approximate decoding is used for immediate data recovery. In this paper, we focus on optimizing parameters for the best performance of approximate decoding algorithm by explicitly considering the information about source correlation. In particular, we consider the case where consecutive source data sets have symmetric distributions. We analytically show that the best strategy for the approximate decoding algorithm is to use mean of the distributions. Moreover, the performance of the proposed algorithm can improve as the variance of the distributions becomes lower.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116726758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chuan Pham, Nguyen H. Tran, Cuong T. Do, S. I. Moon, C. Hong
{"title":"Spectrum handoff model based on Hidden Markov model in Cognitive Radio Networks","authors":"Chuan Pham, Nguyen H. Tran, Cuong T. Do, S. I. Moon, C. Hong","doi":"10.1109/ICOIN.2014.6799714","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799714","url":null,"abstract":"Cognitive Radio Network (CRN) is one of technologies to enhance the spectrum utilization by allowing unlicensed users to exploit the spectrum in an opportunistic manner. In CRN, the spectrum handoff function is a necessary component to provide a resilient service for the unlicensed users. This function is used to discover spectrum holes in a licensed network and avoid interference between unlicensed users and licensed users. Due to the randomness of the appearance of Primary users, disruptions to communications of Secondary users are often difficult to prevent and lead to low throughput of CRN. In our paper, we analyze the status of channels and propose the spectrum handoff model based on Hidden Markov model (HMM) to optimize the spectrum handoff scheme for CRN. Moreover, we compare our method with the random channel selection in the simulation.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127421506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint source-channel distortion model for optimal FEC code rate decision","authors":"Tae-jun Jung, Kwang-deok Seo, Yo-Won Jeong","doi":"10.1109/ICOIN.2014.6799737","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799737","url":null,"abstract":"The optimal FEC code rate decision is a crucial procedure to determine the optimal source and channel coding rates to minimize the overall picture distortion when transporting video packets over packet loss channels. To avoid the complex modeling procedure, we propose a simple but accurate joint source-channel distortion model to estimate channel loss threshold set for optimal FEC code rate decision.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121901932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient uplink admission control for ertPS in IEEE 802.16","authors":"Minho Park, D. Noh, Souhwan Jung","doi":"10.1109/ICOIN.2014.6799712","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799712","url":null,"abstract":"In this paper, we propose an efficient call admission control scheme for ertPS, one of QoS services in IEEE 802.16, which is designed for Voice over IP. In ertPS, a user's unused spare bandwidth is temporally shared with others, which can achieve the efficient bandwidth usage. Since the bandwidth sharing happens among the connected calls, a BS should retain the appropriate number of connected calls. If it has too small number of calls, the unallocated spare BW will be waisted. Otherwise, the excessive number of calls accepted by the BS may cause cell-overloading and call-dropping. By using the statistical multiplexing and probabilistic guard channel reservation, the proposed scheme increases the bandwidth utilization. The results show that the analytical model and the simulation are the very close, and our scheme can achieve 10% less blocking probability of a new call and higher utilization of bandwidth than a conventional guard channel scheme.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131867529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoE assessment of a web-based streaming service in seeking operation","authors":"Hiroaki Tani, Toshiro Nunome","doi":"10.1109/ICOIN.2014.6799701","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799701","url":null,"abstract":"This paper conducts multidimensional QoE assessment of Web-based audio and video transmission in seeking operation to evaluate the effect of two transmission schemes: adaptive bitrate streaming and progressive download. In the subjective experiment, we employ two contents and create various network conditions with load traffic. In the experiment, subjects find pre-specified scenes by means of seeking the video as they want to see the scenes right now. As a result, we find that the adaptive bitrate streaming is not necessarily effective for QoE enhancement; the effectiveness of the scheme depends on the usage of the system and network conditions.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"379 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132121897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WoO based user centric Energy Management System in the internet of things","authors":"Zia Ush-Shamszaman, Sanghong Lee, I. Chong","doi":"10.1109/ICOIN.2014.6799727","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799727","url":null,"abstract":"In this paper we aim to propose a Web-Of-Objects (WoO) based Energy Management System (WEMS) for providing a solution to efficiently manage energy consumption in smart home environment. The general goal of the WoO is to simplify object and application deployment, maintenance and operation in Internet of Things infrastructures. WoO also intends to propose service architecture system to support an intelligent features through an objectification and virtualization of the physical things. Object virtualization ensures harmonization, federation and combination of objects as well as services in the WEMS. Semantic ontology plays a vital role in WoO for ensuring the information reusability, extensibility and interoperability among virtual objects. It enables WEMS to be easily deployable in the real environment. This system can be applicable to building, home and factory, particularly we consider a home environment in this paper.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132575431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}