{"title":"Text Steganography in chat","authors":"M. Shirali-Shahreza, M. Shirali-Shahreza","doi":"10.1109/CANET.2007.4401716","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401716","url":null,"abstract":"Invention of the Internet and its spread in the world changes various aspects of human life. In addition, Internet changed human relations. Chat is one of the new aspects which invented after the Internet and is welcomed by users, especially by young people. In chat rooms, people talk with each other using text messages. Because of the need for quick typing of the word and also because of the high amount of sentences which is exchanged between users, new abbreviations are invented for various words and phrases in chat rooms. This new language is known as SMS-texting. On the other hand, the issue of safety and security of information and especially secret relationships has led to the introduction of numerous methods for secret communication. Among these methods, steganography is a rather new method. The present paper offers a new method for secret exchange of information through chat by using and developing abbreviation text steganography with the use of the SMS-texting language. This paper has been implemented by Java programming language.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129809671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-based translation of constant concept values in E-business","authors":"Xin Guan, J. Guo","doi":"10.1109/CANET.2007.4401717","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401717","url":null,"abstract":"The heterogeneous concept mapping (HCM) approach of collaborative concept exchange (CONEX) supports the multilingual business information exchange between heterogeneous e-business systems, but it unexplored the issue of semantic consistency maintenance in the constant value translation. This paper discusses this issue with a proposal of contextual value translation (CAT) approach to complementing the previous HCM research. This approach provides the solution to facilitate the multilingual translation of business concept values with semantic consensus.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128981376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Equalization of spectral characterist of optical signanls by acousto-optic filters","authors":"Z. T. Hakimov, D. Davronbekov","doi":"10.1109/CANET.2007.4401704","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401704","url":null,"abstract":"Use in the main high-speed fiber-optical transmitting systems (FOTS) with spectral compensation of channels of optical amplifiers of a running wave (ARW) leads to distortion of spectral characteristics of a group optical signal. The given distortions after repeated amplification lead to full or partial loss of an alarm stream of those components of a signal which are at edges of a strip of a strengthened spectrum. Equalization the through passage characteristic of each amplifier of a running wave allows to reduce these distortions, however this problem technically represents difficulties. The decision ' this problem probably use of one or several devices of alignment a spectrum in path FOTS which completely would level its through spectral characteristics. Such device has been created on the basis of joint application of the optical amplifier of type ARW and the acousto-optical filter on Superficial acoustic wave (SAW) of type acousto-optical the reconstructed filter (AORF). Application acousto-optical the reconstructed filter allows to equalization through passage spectral characteristics FOTS. As the device for equalization through communicating spectral characteristics the ring scheme (fig.I). The scheme consisted from entrance directed fiber-optical branch - 1, a fiber-optical path - 2, AORF - 3, a fiber-optical path - 4, optical ARW - 5, the day off directed fiber-optical branch - 6, multifrequency electric. The generator - 7, with an opportunity of regulation of target capacity on everyone from frequencies and the adder of electric signals - 8. The device on fig.l works as follows: the spectrally distorted signal from FOTS through 1 and the path 2 gets on optical input AORF. On electric input AORF the complex electric signal representing the sum of fluctuations, different on frequency and amplitude works. Amplitudes of various fluctuations are picked up in such a manner that lengths of waves coming in FOTS a signal which is being at edges of a spectrum, not weakened, and lengths of waves are closer to the central frequency of a spectrum are weakened partially. This process leads to partial alignment of spectral characteristics. Further through a path 4 partially leveled spectrum, gets on an input optical ARW which strengthens an optical signal and through a path 2 again gets on optical input AORF where is exposed to repeated alignment and strengthening. The quantity recircle signal on a ring gets out of a condition of reception of flat spectral characteristics, and also a necessary level of an optical signal on an output of the device.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126850464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Many-to-one congestion control scheme for densely populated WSNs","authors":"F. Hussain, G. Seçkin, Y. Çebi","doi":"10.1109/CANET.2007.4401667","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401667","url":null,"abstract":"Many-to-one transport results in congestion in wireless sensor networks. This is due to the sudden impulse of information flow to a single destination. Greater the number of event reporting nodes greater will be the degree of congestion; considering fixed transmission power for nodes. Therefore an important factor in the design of a congestion control scheme is the density of the network. In this paper we present a new congestion control scheme based on hop-by-hop packet delivery time and buffer size. The new congestion control scheme is at the transport layer and uses a TDMA-like mechanism to optimally adjust the reporting rate of events. Detailed simulation analysis confirm that the proposed congestion control scheme decreases packet drops and provide high packet delivery ratio (above 90%) from even very dense event reporting regions.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133313654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Location dependent variation of service quality","authors":"A. Sheikh, M. Azam","doi":"10.1109/CANET.2007.4401713","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401713","url":null,"abstract":"The effect of varying distances between the mobile station and base station on the Nakagami-m parameter is studied. A path loss model is developed that determines the received direct and scattered powers at the mobile station. The effect on the Nakagami-m parameter for different distributions of the reflection co-efficient Gamma is also presented. It is found that the exponential distribution gives larger values of m as compared to uniform and half Gaussian distribution. It is observed that the transmitter and receiver antenna heights also effects the Nakagami-m parameter and an increase in their effective value enhances the performance of the system. A change in the operating frequency also effects the performance of a digital communication link. A new parameter Deltam is also introduced in order to study the impact on performance of the system with increase in distance.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132656708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Provision of electromagnetic com patibilities of radioelectronic equip ment of new technologies with live communication systems","authors":"A. Abduazizov, K.H. Abdusagatov, I.A. Savitskiy","doi":"10.1109/CANET.2007.4401691","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401691","url":null,"abstract":"In article are considered the questions of provision electromagnetic compatibility radio electronic facilities new technology with acting radio electronic facilities of different purpose.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126495480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WEP-based security management in IEEE 802.11 wireless sensor networks","authors":"Vincent Guyot","doi":"10.1109/CANET.2007.4401682","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401682","url":null,"abstract":"With the normalization of the 802.11 standard and the emergence of Wi-Fi low-cost devices, some sensor network testbeds use this wireless technology. WEP, the protocol handling 802.11 security, is finally a flawed protocol. The TKIP protocol has been standardized to solve these security problems in infrastructure environments with access points. Unfortunately, 802.11 sensor networks remain unsafe. To solve this security problem in sensor networks, we use smart cards to handle the actual WEP-based 802.11 networking adapters.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128918022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use of multimedia technology in education","authors":"M. S. Abilova, M.T. Shakhakimova, M.D. Yuldoshev","doi":"10.1109/CANET.2007.4401693","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401693","url":null,"abstract":"In this report video conference communication system as one of the most striking example use of multimedia technology is considered. Video conference service gives an chance to effective real time realization of lectures, practical training, seminars, consultation in, and also ability realization of various testing forms and control knowledge in a distance, video conference communication system is one of the most important means in supporting educational process in distance learning system.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133645689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interaction of functional modules and information processes in modern telecommunication network","authors":"N. Usmanova, N.G. Kushakova","doi":"10.1109/CANET.2007.4401689","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401689","url":null,"abstract":"The possibility of applying the associative media concept for investigation of information processes and components of traffic in telecommunication network is considered and results of realization the approach based on associative processes simulation for decreasing the packet delay time are provided.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134117834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increasing ip network survivability in harsh scenarios with dynamic source routing","authors":"Yu Tao, Chen Shan-zhi, Li Xin, Qin Zhen","doi":"10.1109/CANET.2007.4401676","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401676","url":null,"abstract":"With the ubiquity of IP services, networks, especially Internet, are playing more and more important role in daily life than ever. The IP network survivability is gaining increasing attention from the Internet research community and a lot of recipes to the survivability were proposed. Unfortunately, harsh scenarios (e.g. earth quakes, hurricanes) which have great impact on the network topologies have always been overlooked. The reason may be the rarity of this kind of scenarios but they do exist and the consequents are disruptive. In this paper, we propose a dynamic source routing scheme to handle route disruptions in harsh scenarios. The proposed scheme doesn't alter the existing routing and forwarding diagrams. Instead, it can collaborate with the existing routing protocol and provide alternate route during the routing convergence. Simulation results show that compared with traditional routing protocol, the proposed routing scheme remarkably reduces service disruption time.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131505053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}