{"title":"Evaluations of Stateful NMR with Byzantine Failures","authors":"M. Uehara","doi":"10.1109/BWCCA.2011.48","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.48","url":null,"abstract":"NMR (N-Modular Redundancy) is a well-known fault tolerance technique. In NMR, if the majority of modules are normal, failures can be masked. However, if the number of normal modules is less than half, it cannot mask failures. Previously, we proposed Stateful NMR to solve this problem. In Stateful NMR, if at least one normal module exists, it can mask failures. This method operates correctly only if more than one module does not fail simultaneously. To relax this constraint, we proposed Reset table Stateful NMR, where the state of a module is reset manually when possible. As a result, Reset table Stateful NMR always reflects the correct state. However, these evaluations were based on stuck failures, one of two kinds of failures in the real world, with the other being Byzantine failures. In this paper, we evaluate our proposed fault tolerance methods with respect to Byzantine failures. Based on the results of the evaluations, we conclude that the fault tolerance of Reset table Stateful NMR is almost equal to that of NMR, whereas Stateful NMR is not effective with Byzantine failures.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124336867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling of Submarine Navigation by Nonmonotonic Logic","authors":"Isabelle Toulgoat, P. Siegel, A. Doncescu","doi":"10.1109/BWCCA.2011.96","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.96","url":null,"abstract":"Simulations of naval action estimate the operational performance of warships or submarines for a given scenario. In common models, the operator's reactions are predefined. This is not realistic: the operator's decision can produce unexpected reactions. This paper presents a method to model operator decision in simulations. This method allows to reason about incomplete, revisable and uncertain information: an operator has partial information about his environment only and must revise his decisions. Our method uses a nonmonotonic logic: the rules of behavior are formalized with default logic, to which we added a consideration of time. Our method uses preferences to manage choice between different rules, with simple probabilistic techniques. This method has been implemented in Prolog, interfaced to DCNS simulator framework and applied to a scenario involving two adverse submarines.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"25 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120858488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Assessing the Impact of Jamming Strategies on the Behavior of DYMO-Based MANETs","authors":"D. Arora, E. Millman, S. Neville","doi":"10.1109/BWCCA.2011.29","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.29","url":null,"abstract":"The wide-scale deployment of smart phones has begun to provide a pragmatic deployment environment for at-scale MANETs, (i.e., for providing non-cellular based mobile device services). The services enabled via these MANETs will, of course, be subject to cyber-attacks, some of the simplest of which are wireless jamming attacks. Through simulation studies, this work assesses the impact that such jamming attacks have on standard network-level MANET features, (i.e., packet delivery ratio (PDR), hops traveled, delay, etc.), using DYMO as the exemplar MANET routing protocol. More particularly, it is shown that jamming causes more complex effects to the MANET's behavior than generally has been reported. For example jamming can cause: a) it to take considerably longer for start-up transients to decay, and b) a larger percentage of the experiments in which statistical steady-states are never reached, (i.e., the start-up transients are never observed to decay). These results are important as they highlight that jamming can have significant impact's on MANET operations past just causing network disconnections. These issues, in turn, imply that designing jamming resistant or resilient MANETs may be significantly more challenging than prior work would tend to suggest.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115672849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Oshima, Yusuke Ichimura, T. Nakashima, T. Sueyoshi
{"title":"An Anomaly Detection System Based on Chi-Square Method with Dynamic BIN Algorithm","authors":"S. Oshima, Yusuke Ichimura, T. Nakashima, T. Sueyoshi","doi":"10.1109/BWCCA.2011.89","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.89","url":null,"abstract":"The statistic researches have been proposed to detect anomaly attacks using chi-square. In these researches, features such as the IP address and the port number are used as the probabilistic variables. The method based on multiple variables has not been proposed to aim to improve the accuracy of anomaly detection. If the number of packets increase, these packets are classified into BINs before the calculation of chi-square method. The classification method depends on the calculation parameters such as the window width and the number of BIN, and the packet distribution of night and day time. In addition, the classification method should be changed based on these parameters. In this paper, we propose the dynamic BIN method to classify the incoming packets automatically. We also propose the CSDM (Chi-square-based Space Division Method) to detect anomaly attacks using the dynamic BIN methods with multiple probabilistic variables. As the results of experiments using the source IP address, the destination port number, and the interval time deviation of arriving packets as the probabilistic variables, the proposed dynamic BIN realized the equal classification, which does not depends on the features of packets and the number of BIN. In addition, the dynamic BIN mechanism and CSDM method using two probabilistic variables could improve F-measure compared to the conventional method.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115868502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Bouras, Savvas Charalambides, K. Stamos, Stamatis Stroumpis, G. Zaoudis
{"title":"Power Management for SVC Video over Wireless Networks","authors":"C. Bouras, Savvas Charalambides, K. Stamos, Stamatis Stroumpis, G. Zaoudis","doi":"10.1109/BWCCA.2011.40","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.40","url":null,"abstract":"The main idea of this paper is to study how the emerging H.264 SVC standard can be utilized for more efficient power management in wireless video transmissions. Our proposal uses a cross-layer approach which adapts the power transmission level of the sender according to the SVC information regarding the priority of the SVC NAL frame. Our aim is to improve transmission statistics, and therefore user experience, without unnecessary power consumption. We use extensive experimentation on the ns2 network simulator, which we have specifically modified for this purpose, in order to verify this approach.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115998014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Motion Tracking and Processing for Multimedia Sport E-Learning","authors":"K. F. Li, Kosuke Takano, M. G. Johnson","doi":"10.1109/BWCCA.2011.16","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.16","url":null,"abstract":"Computer-based Multimedia instructional systems are ideal for e-learning in many domains. For applications such as sport instruction, the central issue is to capture motions accurately and correctly for further processing. Many gesture capturing techniques, including light, video and motion tracking, are employed in commercial products, research systems, and the game industry. A tennis e-learning system is under study and being designed. To capture the motion of a tennis swing, the Nintendo Wii Remote is used as the input device. This work examines the various issues associated with motion-sensing input data: capturing, cleansing, classification and clustering. Results from the classification and clustering of some basic tennis swings, and the subsequent swing matching and identification are presented.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123307199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service Specific Queue Sorting and Scheduling Algorithm for OFDMA-Based LTE-Advanced Networks","authors":"R. Kausar, Yue Chen, K. K. Chai","doi":"10.1109/BWCCA.2011.22","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.22","url":null,"abstract":"In this paper two Service Specific Queue Sorting Algorithms (SSSA) are proposed for Real Time (RT) and Non Real Time (NRT) streaming video traffic, respectively. The proposed SSSA is implemented in a QoS aware dynamic Packet Scheduling Architecture (PSA) for Long Term Evolution-Advanced (LTE-A) networks and aims at improving the support of QoS guarantee and maintaining the overall system throughput and user fairness at a good level. Multiuser diversity is exploited both in the Time Domain (TD) and Frequency Domain (FD) to achieve effective resource utilization. The simulation results show that SSSA has reduces average delay, delay viability and Packet Drop rate (PDR) of RT traffic and fulfils throughput requirements of NRT streaming video traffic while keeping the system overall throughput and fairness among users at a good level.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Digital Evidence Forensics Standard Operating Procedure with Comparison and Analysis Based on Smart Phone","authors":"Iven Lin, H. Chao, Shih-Hao Peng","doi":"10.1109/BWCCA.2011.63","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.63","url":null,"abstract":"In the recent years, the technologies develop rapidly. Mobile devices have become very important tools in the modern world. They combine many functions like OS, camera, video, internet, Bluetooth, calendar, address book, application. They contain copious personal information, high mobility and powerful hardware, so the crimes of smart phone increase rapidly. There are many kind of modus operandi increasing. Smart phone has become one of the high technical tools to commit a crime. In view of this, our research will discuss Smart-Phone Digital Evidence Forensics Standard Operating Procedure (Smart-Phone DEFSOP) which was proposed by Prof. I-Long, Lin. Our research will compare with the SOP which was proposed by National Institute of Standards and Technology (NIST). Finally, we will use trusted third party forensics tools to collect, analyze and examine digital evidences. In order to assist proof capacity of digital evidences in the court, we have to authenticate the ¡§integrity¡¨, ¡§consistency¡¨ and ¡§precision¡¨ of the digital evidences.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122008413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Gentile, S. Andolina, A. Massara, D. Pirrone, G. Russo, A. Santangelo, E. Trumello, S. Sorce
{"title":"A Multichannel Information System to Build and Deliver Rich User-Experiences in Exhibits and Museums","authors":"A. Gentile, S. Andolina, A. Massara, D. Pirrone, G. Russo, A. Santangelo, E. Trumello, S. Sorce","doi":"10.1109/BWCCA.2011.14","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.14","url":null,"abstract":"In this article a multichannel information system to build and deliver rich user experiences in exhibits and museums is presented. The system was designed to use information about a particular exhibit or museum while delivering a wide user experience based on different distribution channels. The overall information is used to build different solutions that can be delivered simultaneously on different media from touch-screen installations to portable devices like smart phones. Moreover, all the devices signed in the environment are able to communicate to each others to increase the level of the usability of the system. A case study and analysis of experimental results are also provided.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132462218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Vision Techniques for Hidden Conditional Random Field-Based Mandarin Phonetic Symbols I Recognition","authors":"Chien-Cheng Lee, Yi-Fang Li","doi":"10.1109/BWCCA.2011.75","DOIUrl":"https://doi.org/10.1109/BWCCA.2011.75","url":null,"abstract":"This paper presents a handwritten recognition method using camera as human-computer interaction device (HCI) for Mandarin Phonetic Symbols I (MPS1). The method is based on a hidden conditional random field (HCRF) model, which is an extension of the conditional random field (CRF) framework that incorporates hidden variables. The main advantage of the proposed method is that it avoids limitations of the traditional hidden Markov model (HMM)-based methods. This work built an HCRF for each symbol of MPS1 and used twelve-dimensional features. The features in the proposed system include the stroke length ratio feature, the horizontal stroke feature, the vertical stroke feature, the stroke-based loci features, and the stroke curvature feature. The recognition rate achieved 94.05% on 1532 handwritten word samples covering 37 symbols.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115576665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}