2015 International Conference on Networking Systems and Security (NSysS)最新文献

筛选
英文 中文
Probe-fed rectangular patch antenna for wireless communication 用于无线通信的探针馈电矩形贴片天线
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2015-02-19 DOI: 10.1109/NSysS.2015.7043529
T. Alam, M. Faruque, M. Islam
{"title":"Probe-fed rectangular patch antenna for wireless communication","authors":"T. Alam, M. Faruque, M. Islam","doi":"10.1109/NSysS.2015.7043529","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043529","url":null,"abstract":"This paper presents a new multiband antenna is proposed for Wireless communication. Commercially available software High Frequency Structural Simulator (HFSS) and Computer Simulation Technology (CST) microwave studio was adopted in this investigation. The presented antenna consists of a slotted rectangular patch with a rectangular ground plane. The antenna exhibits four resonates at 2.05 GHz, 2.45GHz, 3.54GHz and 4.23 GHz. The antenna has been printed on FR-4 (lossy) Substrate with 4.6 of relative Permittivity and 1.6 mm of thickness. In addition, the specific absorption rate (SAR) analysis has been analyzed for the proposed antenna.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114777832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MARQUES: Distributed multi-attribute range query solution using space filling curve on DTHs MARQUES: DTHs上使用空间填充曲线的分布式多属性范围查询解决方案
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2015-02-19 DOI: 10.1109/NSysS.2015.7043516
Ayon Sen, A. S. M. S. Islam, Md Yusuf Sarwar Uddin
{"title":"MARQUES: Distributed multi-attribute range query solution using space filling curve on DTHs","authors":"Ayon Sen, A. S. M. S. Islam, Md Yusuf Sarwar Uddin","doi":"10.1109/NSysS.2015.7043516","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043516","url":null,"abstract":"This paper proposes a distributed peer-to-peer data lookup technique on DHTs in order to serve range queries over multiple attributes. The scheme, MARQUES, uses space filling curves to map multi-attribute data points to a one-dimensional key space and thus effectively converts multi-attribute range queries into a consecutive series of one-dimensional keys. These keys are then used to place or lookup data objects over a DHT. Space filling curves preserve locality of attribute values and thus helps greatly in facilitating range queries in terms of the number of nodes to be searched to serve a given range query. MARQUES, although can be instrumented with any space filling curve, has been implemented with two curves, namely Z-order curve and Hilbert curve, and uses a multi-level variant of Chord, a popular DHT, as its underlying overlay. Simulation results on OMNET++ show that MARQUES successfully answers range queries with significant efficiency in terms of message overhead and query latency.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132927361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Measurement of heart rate using photoplethysmography 利用光电容积脉搏图测量心率
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2015-02-19 DOI: 10.1109/NSysS.2015.7043525
N. Saquib, M. T. I. Papon, I. Ahmad, Ashikur Rahman
{"title":"Measurement of heart rate using photoplethysmography","authors":"N. Saquib, M. T. I. Papon, I. Ahmad, Ashikur Rahman","doi":"10.1109/NSysS.2015.7043525","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043525","url":null,"abstract":"Heart rate, or pulse, is one of the vital signs used to measure basic functions of human body. Heart rate is the number of times one's heart beats per minute. The method that has been used to measure heart rate in this project is widely known as photoplethysmography (PPG). The constructed device can be used to find out the heart rate of a person and to analyze readings using existing software. Theoretically, any body part can be used to measure heart rate through the sensor of the device, although fingertips and earlobes are commonly targeted.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"714 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133050621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Non-invasive heart rate measuring smartphone applications using on-board cameras: A short survey 非侵入式心率测量智能手机应用程序使用车载摄像头:一个简短的调查
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2015-02-19 DOI: 10.1109/NSysS.2015.7043533
M. T. I. Papon, I. Ahmad, N. Saquib, Ashikur Rahman
{"title":"Non-invasive heart rate measuring smartphone applications using on-board cameras: A short survey","authors":"M. T. I. Papon, I. Ahmad, N. Saquib, Ashikur Rahman","doi":"10.1109/NSysS.2015.7043533","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043533","url":null,"abstract":"The rapid improvement in smartphone technology has produced many medical applications [1]. Cellular phones now offer several advantages over desktop or laptop computers in tele-monitoring applications like individual's fitness, instant diagnosing and systems for monitoring an individual's medical conditions. Heart rate is one of the most important vital signs of human body. Although cellular phones in combination with other sensing devices (like ECG meters) are able to capture heart rates, there exist a myriad of applications that use only smart phone and its associated accessories (such as on-board camera) to detect heart rates within acceptable accuracy limit. Theoretically, any body part can be used to measure heart rate, although fingertips are commonly used. The fundamental technique of measuring heart rate through smartphone applications is based on image or video processing. In this short survey, we discuss the basic mechanism of heart rate measurement using only smartphone cameras and compare the performance of some notable state-of-the-art smartphone applications available for such purpose. Our experiments show that most of the applications are able to capture heart rate with acceptable accuracy under various body conditions such as normal and waking up after sleep.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121209618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
MediaServ: Resource optimization in subscription based media crowdsourcing MediaServ:基于订阅的媒体众包中的资源优化
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2015-01-01 DOI: 10.1109/NSysS.2015.7043527
A. Rizvi, Shamir Ahmed, Minhajul Bashir, Md Yusuf Sarwar Uddin
{"title":"MediaServ: Resource optimization in subscription based media crowdsourcing","authors":"A. Rizvi, Shamir Ahmed, Minhajul Bashir, Md Yusuf Sarwar Uddin","doi":"10.1109/NSysS.2015.7043527","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043527","url":null,"abstract":"In this paper we propose resource optimization for subscription based media content crowdsourcing. In this form of crowdsourcing, interested entities (we refer to them as Campaigners) announce their `interests' expressing what media content (such as pictures, audio, and videos) they want to receive from participant users whereas mobile users subscribe to those interests as an intention to serve content satisfying the respective interests. Campaigners solicit content generated by users by mentioning explicit criteria that the media content should satisfy, for example a `noise pollution' campaigner who wants to measure noise level of a city neighborhood, may ask potential users for audio clips recorded at a certain location at peak hours of weekdays. Subscribed users voluntarily or on paid terms generate content against those interests. Given that a user may subscribe to different campaign interests and its generated content may satisfy different interests in varying degree of accuracy, we propose methods to evaluate contents based on the degree of satisfaction against the subscribed interests, and then develop techniques for delivering those contents to the campaign end points so that it optimizes the user's resource utilization, such as energy and bandwidth.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FGPGA: An efficient genetic approach for producing feasible graph partitions FGPGA:一种有效的生成可行图分区的遗传方法
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 2014-11-16 DOI: 10.1109/NSysS.2015.7043513
Md. Lisul Islam, Novia Nurain, Swakkhar Shatabda, Mohammad Sohel Rahman
{"title":"FGPGA: An efficient genetic approach for producing feasible graph partitions","authors":"Md. Lisul Islam, Novia Nurain, Swakkhar Shatabda, Mohammad Sohel Rahman","doi":"10.1109/NSysS.2015.7043513","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043513","url":null,"abstract":"Graph partitioning, a well studied problem of parallel computing has many applications in diversified fields such as distributed computing, social network analysis, data mining and many other domains. In this paper, we introduce FGPGA, an efficient genetic approach for producing feasible graph partitions. Our method takes into account the heterogeneity and capacity constraints of the partitions to ensure balanced partitioning. Such approach has various applications in mobile cloud computing that include feasible deployment of software applications on the more resourceful infrastructure in the cloud instead of mobile hand set. Our proposed approach is light weight and hence suitable for use in cloud architecture. We ensure feasibility of the partitions generated by not allowing over-sized partitions to be generated during the initialization and search. Our proposed method tested on standard benchmark datasets significantly outperforms the state-of-the-art methods in terms of quality of partitions and feasibility of the solutions.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130364299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A study on combining power management and power control for wireless sensor networks 无线传感器网络电源管理与电源控制相结合的研究
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 1900-01-01 DOI: 10.1109/NSysS.2015.7043528
Md. Mosiur Rahman Lunar, A. Islam
{"title":"A study on combining power management and power control for wireless sensor networks","authors":"Md. Mosiur Rahman Lunar, A. Islam","doi":"10.1109/NSysS.2015.7043528","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043528","url":null,"abstract":"Two power saving schemes namely power management and power control have been investigated in isolation for addressing power constraint of wireless sensor networks, which is known to be the most prominent limitation in road to successful deployment of wireless sensor networks. However, combining the power saving schemes is yet to be investigated in the literature. Therefore, in this paper, we propose a power saving scheme combining power management and power control simultaneously for wireless sensor networks. We perform real testbed experiments to evaluate the performance of the proposed power saving scheme. Experimental results demonstrate that we can reduce power consumption of sensor nodes using the proposed scheme at an expense of marginal decrease in delivery ratio.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133993719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets 基于解密混合网的对称和非对称密钥加密算法的比较
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 1900-01-01 DOI: 10.1109/NSysS.2015.7043532
Sahan Ahmad, K. R. Alam, Habibur Rahman, S. Tamura
{"title":"A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets","authors":"Sahan Ahmad, K. R. Alam, Habibur Rahman, S. Tamura","doi":"10.1109/NSysS.2015.7043532","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043532","url":null,"abstract":"This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in a decryption mixnet receive independently and repeatedly encrypted messages as their input, then successively decrypt and shuffle them to generate a new altered output from which finally the messages are regained. Thus mixnets confirm unlinkability and anonymity between senders and the receiver of messages. Both symmetric (e.g. onetime pad, AES) and asymmetric (e.g. RSA and ElGamal cryptosystems) key encryption algorithms can be exploited to accomplish decryption mixnets. This paper evaluates both symmetric (e.g. ESEBM: enhanced symmetric key encryption based mixnet) and asymmetric (e.g. RSA and ElGamal based) key encryption algorithm based decryption mixnets. Here they are evaluated based on several criteria such as: the number of messages traversing through the mixnet, the number of mix-servers involved in the mixnet and the key length of the underlying cryptosystem. Finally mixnets are compared on the basis of the computation time requirement for the above mentioned criteria while sending messages anonymously.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Towards empirical study based mathematical modeling for throughput of MANETs 基于实证研究的manet吞吐量数学模型
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 1900-01-01 DOI: 10.1109/NSysS.2015.7043524
Novia Nurain, M. Mostakim, A. Islam
{"title":"Towards empirical study based mathematical modeling for throughput of MANETs","authors":"Novia Nurain, M. Mostakim, A. Islam","doi":"10.1109/NSysS.2015.7043524","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043524","url":null,"abstract":"Mathematical modeling for throughput of MANETs considering the impact of different layers in the protocol stack in addition to that of different network parameters remains unexplored till now even though such modeling is considered as the fastest and the most cost-effective tool for evaluating the performance of a network. Therefore, in this paper, we attempt to develop a mathematical model for throughput of MANETs considering both of the aspects. In addition, we also focus on developing mathematical models for delivery ratio and drop ratio, these metrics limit the maximum throughput of a network. In our analysis, we perform rigorous simulation utilizing ns-2 to capture the performance of MANETs under diversified settings. Our rigorous empirical study reveals that we need to develop cross-layer mathematical models for throughput, delivery ratio, and drop ratio to represent the performance of MANETs and such mathematical models need to resolve higher-order polynomial equations. Consequently, our study uncovers a key finding that mathematical modeling of MANETs considering variation in all parameters is not feasible.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121154310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Incentive model design for participatory sensing: Technologies and challenges 参与式感知的激励模式设计:技术与挑战
2015 International Conference on Networking Systems and Security (NSysS) Pub Date : 1900-01-01 DOI: 10.1109/NSysS.2015.7043526
Shaolin Zaman, Nafeez Abrar, Anindya Iqbal
{"title":"Incentive model design for participatory sensing: Technologies and challenges","authors":"Shaolin Zaman, Nafeez Abrar, Anindya Iqbal","doi":"10.1109/NSysS.2015.7043526","DOIUrl":"https://doi.org/10.1109/NSysS.2015.7043526","url":null,"abstract":"Participatory sensing is a crowd-sourcing technique for exploring interesting aspects of the world ranging from personal to community. Recently participatory sensing has attracted considerable attention of research community with a number of open issues and challenges. Motivating people to participate in sensing the phenomena around and report those to dedicated servers is the key factor for the success of this system. Different incentive mechanisms have been proposed to increase the participation rate of users in this context. This paper presents a brief survey of these techniques identifying their respective limitations and finally reports the issues yet to be addressed to develop an widely acceptable incentive model.","PeriodicalId":408601,"journal":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125134070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信