The International Conference on Information Networking 2014 (ICOIN2014)最新文献

筛选
英文 中文
Error-tolerant non-binary error correction code for low power wireless sensor networks 低功耗无线传感器网络容错非二进制纠错码
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799477
Yousef Qassim, M. Magaña
{"title":"Error-tolerant non-binary error correction code for low power wireless sensor networks","authors":"Yousef Qassim, M. Magaña","doi":"10.1109/ICOIN.2014.6799477","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799477","url":null,"abstract":"Wireless sensor networks have emerged as revolutionary technology, where hundreds or thousands of small sensor units are distributed over an environment to monitor a certain phenomenon and achieve a certain functionality. These small sensor nodes are capable of sensing, computing, and communicating. Even though their capabilities are limited, their overall behaviour is complex. For decades researchers all over the world have been working on realizing many applications for wireless sensor networks and trying to overcome their issues. As in any new technology several challenges stand as a barrier to the advancement of wireless sensor networks. One important challenge is power consumption since the expected life of a wireless sensor network is determined by the lifetime of its components. In this paper we propose a modification to the Reed-Solomon decoder algorithm in order to reduce its power consumption and thus improve the lifetime of wireless sensor networks. The proposed modification exploits the fact that there exist applications that tolerate errors without totally jeopardizing the integrity of the data. This opens the door for new type of error control codes, namely error-tolerant non-binary error correction codes. Here we explore the performance of the proposed algorithm in terms of bit error rate and symbol error rate in comparison to the original algorithm and uncoded data. Also we provide a power saving estimate resulting from implementing such an algorithm.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126012059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cooperative cache sharing among ISPs for reducing inter-ISP transit cost in content-centric networking 在以内容为中心的网络中,isp之间的协同缓存共享降低了isp之间的传输成本
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799693
Kazuhito Matsuda, G. Hasegawa, M. Murata
{"title":"Cooperative cache sharing among ISPs for reducing inter-ISP transit cost in content-centric networking","authors":"Kazuhito Matsuda, G. Hasegawa, M. Murata","doi":"10.1109/ICOIN.2014.6799693","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799693","url":null,"abstract":"Content-Centric Networking (CCN) has an in-network caching mechanism, which can reduce the traffic volume along the route to the destination host. This traffic volume reduction can also decrease inter-ISP transit cost. However, the memory space for caching in CCN routers is relatively small for the amount of content. In addition, any initial access to the content requested by a user must use the transit link, even when a nearby CCN router outside the route has the cached content. In this paper, we propose a method of cooperative cache sharing among CCN routers in multiple ISPs. It aims to lead to further reduction in the inter-ISP transit cost by improving the cache hit ratio. In the proposed method, the CCN routers share the memory space for caching of non-overlapping content. We evaluate the proposed method by simulation experiments using the IP-level network topology of actual ISP, and show that the inter-ISP transit traffic can be reduced by up to 28% compared with normal caching behavior of CCN.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"406 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115322092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improved beamforming code book for WiGig using Maximal Ratio Combining 改进波束形成的代码书,使用最大比组合WiGig
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799675
Atchareeya Kongbuntad, M. Uthansakul, P. Uthansakul
{"title":"Improved beamforming code book for WiGig using Maximal Ratio Combining","authors":"Atchareeya Kongbuntad, M. Uthansakul, P. Uthansakul","doi":"10.1109/ICOIN.2014.6799675","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799675","url":null,"abstract":"IEEE 802.11ad standard, so called WiGig has been defined due to the increasing market demands for high data rate communications. The standard was approved at 60 GHz band employing a beam formation to mitigate interference signal. However, a signal loss is introduced at the intersection of two adjacent beams when employing original beamforming codebook, hence the systems provide low BER. Therefore, this paper proposes an extra codebook to avoid the signal drop at direction of beam intersection. The computer simulation reveals lower BER when employing the proposed beamforming codebook.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129816951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Two-hop communication scheme for FlashLinQ device-to-device communication system FlashLinQ设备对设备通信系统的两跳通信方案
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799670
S. Bae, Jaheon Gu, M. Chung
{"title":"Two-hop communication scheme for FlashLinQ device-to-device communication system","authors":"S. Bae, Jaheon Gu, M. Chung","doi":"10.1109/ICOIN.2014.6799670","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799670","url":null,"abstract":"A new technology for D2D communication, called FlashLinQ (FLQ), is introduced by Qualcomm in order to enable effective D2D communications in OFDM based wireless networks. Through introducing a SIR-based link scheduling method, FLQ can more efficiently utilize the shared wireless medium than the existing technologies. In addition, newly designed single-tone analog signal in FLQ enables D2D devices to discover each other, establish D2D links, and coordinate medium access in much wider area compare with the existing technologies. Nevertheless, the signaling based on the single-tone signal cannot guarantee the minimum performance of the data transfer through multi-tone signals. In order to overcome the limitation, we propose a new two-hop communication scheme (THCS) that enables MAC-level multi-hop communications with minor overheads in FLQ. Through naturally evolving the existing link scheduling in FLQ, the proposed two-hop communication scheme enhances service coverage of D2D communications and improves the utilization of the newly designed single-tone signals. From simulations, it is shown that the proposed scheme promotes not only the overall throughput but also the reuse of the shared medium of FLQ networks.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125965288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Network-based content identification system via content-based comics fingerprint 基于网络的内容识别系统通过基于内容的漫画指纹
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799705
Jiwoo Kang, Taegeun Oh, Nakyeon Choi, Sang-Hoon Lee, Sanghoon Lee, Hogab Kang
{"title":"Network-based content identification system via content-based comics fingerprint","authors":"Jiwoo Kang, Taegeun Oh, Nakyeon Choi, Sang-Hoon Lee, Sanghoon Lee, Hogab Kang","doi":"10.1109/ICOIN.2014.6799705","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799705","url":null,"abstract":"Recently, the comic contents are widely spread due to the development of mobile devices and network-based distribution. Large-scale data of contents increases the work load of network, so that it is necessary to manage effectively these contents distribution via content identifiers. However, the illegal channels such as online storage service provide the comics without the identifier. In addition, these comics would violate the copyright. To prevent the copyright violation, the comic identification is very important. However, the comic identification is the beginning stage. Thus, we propose a novel content-based fingerprint for comic content. To reduce work load of network, the fingerprint are extracted in consumer's device with low computational complexity. The proposed method shows the reliable performance with the robustness and the efficiency for distorted comics identification.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122201315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An evaluation of load distribution method on multi-source P2P sensor data stream delivery system 多源P2P传感器数据流传输系统负载分配方法的评价
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799729
Tomoya Kawakami, Yoshimasa Ishi, T. Yoshihisa, Y. Teranishi
{"title":"An evaluation of load distribution method on multi-source P2P sensor data stream delivery system","authors":"Tomoya Kawakami, Yoshimasa Ishi, T. Yoshihisa, Y. Teranishi","doi":"10.1109/ICOIN.2014.6799729","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799729","url":null,"abstract":"Due to the prevalence of sensors such as security cameras or environmental monitoring, sensor data stream delivery which means delivering the observed data continuously attracts great attention. Our researching team proposed methods to distribute communication loads in the case of delivering the sensor data stream that have different data delivery cycles. In the proposed methods, source nodes and destination nodes consist P2P overlay network, and communication loads are distributed by re-delivering the sensor data that have the same delivery time. In addition, we evaluated the proposed methods by simulation in an environment where specific source node delivers single sensor data stream. In this paper, we evaluated the existing methods by simulation in an environment which has multiple sensor data streams.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125028642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Clickable and interactive video system using HTML5 使用HTML5的可点击交互式视频系统
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799697
Prima Dewi Purnamasari, Helen, Nadya Syifana
{"title":"Clickable and interactive video system using HTML5","authors":"Prima Dewi Purnamasari, Helen, Nadya Syifana","doi":"10.1109/ICOIN.2014.6799697","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799697","url":null,"abstract":"Interactive video aims to make users feel more involved in an information search, so that they will try to obtain deeper information without feeling forced. Therefore, interactive video is one of the appropriate approaches that can be used in information dissemination process. In this research, we have successfully made an interactive video system in the form of clickable video where user can click some parts of the video while the video is playing. This event links user to deeper information in a pop up area. Video streaming is conducted using HTTP streaming mechanism through a web browser that supports HTML5 without additional plug-in or video player. The clickable interactive video system was made using HTML5 and JavaScript. Canvas element in HTML5 is the main component used to make the video streaming clickable and interactive. The experiment demonstrates that the clickable video streaming in MP4 format can be successfully played on Chrome, Safari and Internet Explorer Web browser and it also shown that Google Chrome has the fastest video loading time.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"5 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116921850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks 基于私有共享密钥的互认证协议的加密计算:无线网络仿真与建模
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799747
Bruce Ndibanje, Hoon-Jae Lee
{"title":"Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks","authors":"Bruce Ndibanje, Hoon-Jae Lee","doi":"10.1109/ICOIN.2014.6799747","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799747","url":null,"abstract":"Protecting communication among sender and receiver over a public channel network requires for the most part an important security mechanism to provide two parties with the property that they can authenticate each other's identification parameters which are indispensable to construct a common private key. Based on the decisional Diffie-Hellman assumptions, this paper presents a cryptographic calculation of the shared secret key enabling mutual authentication and confidentiality services over public, insecure networks. This protocol is efficient than “classical” Diffe-Hellman key exchange which provides no authentication at all. To attain this, we first model the scheme with mathematical concept for exponential calculation using entity parameters and finally we simulate the work by CrypTool 2.0 to verify the feasibility and shared secret value sameness. The resultant shows that the protocol is practical and provably-secure in regards with standard cryptographic assumptions. Moreover, the value that would be exchanged can be used as secret key for further encrypted symmetric communication. The proposed method is awfully straightforward, valuable, and resilient to know attacks.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125668405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Publisher mobility support in content centric networks 内容中心网络中的发布者移动性支持
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799694
Dookyoon Han, Munyoung Lee, Kideok Cho, T. Kwon, Yanghee Choi
{"title":"Publisher mobility support in content centric networks","authors":"Dookyoon Han, Munyoung Lee, Kideok Cho, T. Kwon, Yanghee Choi","doi":"10.1109/ICOIN.2014.6799694","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799694","url":null,"abstract":"As the high speed Internet and the smart devices become prevalent, it is expected that the traffic volume of the video conferencing/broadcasting on the mobile devices is increasing explosively. One of the promising solutions for the traffic explosion problem is the content centric networking (CCN), which solves the problem by focusing on the content instead of the location. Even though CCN can provide better delivery efficiency, robustness, security, and native subscriber mobility, little attention is paid to the publisher mobility problem, where the mobile devices produce the real-time traffic. In this paper, we propose PMC, a publisher mobility support protocol in CCN. By introducing two names and corresponding operations at the routers, PMC supports publisher mobility for the mobile video conferencing and broadcasting without violating the original CCN architecture. We believe that PMC is a validated and secured scheme following the philosophy of the CCN architecture to support mobile publisher.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132208259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Copyright protection and distribution system for scanned books/comics 扫描图书/漫画版权保护及发行制度
The International Conference on Information Networking 2014 (ICOIN2014) Pub Date : 2014-04-17 DOI: 10.1109/ICOIN.2014.6799703
Seonghyun Kim, Sang-Hoon Lee, Taegeun Oh, Nakyeon Choi, Justin Daegull Ryu, Hogab Kang, Sanghoon Lee
{"title":"Copyright protection and distribution system for scanned books/comics","authors":"Seonghyun Kim, Sang-Hoon Lee, Taegeun Oh, Nakyeon Choi, Justin Daegull Ryu, Hogab Kang, Sanghoon Lee","doi":"10.1109/ICOIN.2014.6799703","DOIUrl":"https://doi.org/10.1109/ICOIN.2014.6799703","url":null,"abstract":"The book scanning agency scans paper books, and converts them to e-book format. However those e-books are vulnerable to illegal copy, because they don't have any copyright protection technologies. In addition to the e-books, illegally scanned books and comics are distributed at commercial on-line storage site without any regulations. To resolve such problems, in this paper, we proposed a system of identification and copy protection for scanned books and comics.","PeriodicalId":388486,"journal":{"name":"The International Conference on Information Networking 2014 (ICOIN2014)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信