2011 International Conference on Information Science and Applications最新文献

筛选
英文 中文
A Lightweight Protocol Based on the SSL Protocol for Handheld Devices 基于SSL协议的手持设备轻量级协议
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772417
Daesung Lee, Hyun Sook Jang, K. Kim
{"title":"A Lightweight Protocol Based on the SSL Protocol for Handheld Devices","authors":"Daesung Lee, Hyun Sook Jang, K. Kim","doi":"10.1109/ICISA.2011.5772417","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772417","url":null,"abstract":"Currently the most popular secure protocol is SSL(Secure Sockets Layer), but it has some negative aspects: First, it imposes a heavier burden on handheld wireless devices, and when a certificate uses PKI(Public Key Infrastructure) e.g. RSA algorithms, it takes a long time to establish a secure connection between client and server. This paper proposes a lightweight protocol based on the SSL protocol, which is more suitable for handheld wireless devices operating under low-capabilities, low-bandwidth and error-prone wireless links. The new lightweight SSL protocol has designed the SSL to reduce the client computational load, leaving the computational intensive operation on the server side. The client does not need to generate and encrypt the pre_master secret nor calculate the master secret. The only operation the client needs to perform is to decrypt the master secret it has received from the server. Moreover it is able to reduce the response time between client and server using SSL session reuse. It is more suitable to securely connect handheld wireless devices and servers.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132407098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Indoor positioning in Bluetooth networks using fingerprinting and lateration approach 在蓝牙网络中使用指纹和延迟方法的室内定位
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772436
F. Subhan, H. Hasbullah, A. Rozyyev, S. T. Bakhsh
{"title":"Indoor positioning in Bluetooth networks using fingerprinting and lateration approach","authors":"F. Subhan, H. Hasbullah, A. Rozyyev, S. T. Bakhsh","doi":"10.1109/ICISA.2011.5772436","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772436","url":null,"abstract":"Global Positioning System (GPS) is a well known navigation system for outdoor applications; however this technology does not work in indoor environments. In order to overcome this limitation, Bluetooth technology can be employed. Furthermore, Bluetooth technology provides an accurate and low cost solution for short range wireless communication. Most of the digital devices provide the Bluetooth functionality which also makes it a good candidate for indoor positioning. In this paper, we use Bluetooth devices for indoor positioning and use signal based parameters such as received power level for position estimation. The accuracy of indoor positioning system is greatly dependant on the parameters selected for estimation and the measurements obtained from the environment. However, the measurements are corrupted by various environmental conditions such as temperature, reflection, presence of obstacles, human body and other communication signals. Therefore, we need to filter the measurements. This paper presents an experimental relationship between the received power level and distance using the standard radio propagation model. The idea behind this study is to provide an accurate distance estimate for Trilateration approach. Based on the experiments performed, the average error is minimized from 5.87 meters to 2.67 meters using gradient filter. The use of gradient filter improves the accuracy by 45 %.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132410029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 167
A Study on Jamming Vulnerability of Aeronautical Communication System Using Android Phone 基于Android手机的航空通信系统干扰脆弱性研究
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772366
W. Cheon, W. Park, T. Chung
{"title":"A Study on Jamming Vulnerability of Aeronautical Communication System Using Android Phone","authors":"W. Cheon, W. Park, T. Chung","doi":"10.1109/ICISA.2011.5772366","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772366","url":null,"abstract":"Recently, As a android phone offers more superior functions and interface than an existing traditional phone, the number of user has been increased rapidly. But, the number of vulnerable android phone in security has been rising due to customizing the system of android phone for the convenience of user. there are many cases of customizing the system. Simultaneously a number of android phones which vulnerable to security increase Exponentially.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128151917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Due Time Setting for Peer-to-Peer Retrieval of Teaching Material in Cloud Computing Environments 云计算环境下教材点对点检索的到期时间设置
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772397
Wen-Chung Shih, S. Tseng, Chao-Tung Yang
{"title":"Due Time Setting for Peer-to-Peer Retrieval of Teaching Material in Cloud Computing Environments","authors":"Wen-Chung Shih, S. Tseng, Chao-Tung Yang","doi":"10.1109/ICISA.2011.5772397","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772397","url":null,"abstract":"Cloud computing technologies can be used to store a tremendous amount of learning resources, including educational videos. However, it is difficult for users to retrieve relevant teaching material in cloud environments by submitting a few keywords. We propose a search mechanism based on social networks. Furthermore, the issues of availability and trustworthiness have to be considered in teaching material retrieval process, in order to improve the retrieval performance. Current P2P file sharing applications focus on exact matching and ignore the dynamic nature inherent in P2P networks, which might degrade the retrieval performance in terms of precision and response time. Our idea is to appropriately set the due time to improve response time of P2P teaching material retrieval without sacrificing much precision. In this study, we formulate the due time setting problem as a bi-objective optimization problem and approximately solve it by an interaction-based heuristic method. The proposed approach consists of two phases: construction phase and sharing phase. In construction phase, peer information is acquired and managed in a decentralized manner. In sharing phase, the due time is interactively determined and the results are retrieved. A prototype of cloud platform has been constructed and experiments have been conducted to evaluate the performance of the approach. The experimental results show that the interactive algorithm performs well in P2P networks with low trust and availability. Also, a survey of satisfaction shows that the proposed method is more user-friendly.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124610687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Web PLC Using Distributed Web Servers for Data Acquisition and Control: Wed Based PLC 采用分布式Web服务器进行数据采集和控制的Web PLC:基于Web的PLC
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772427
J. Antony, Basanta Mahato, Sachin Sharma, G. Chitranshi
{"title":"A Web PLC Using Distributed Web Servers for Data Acquisition and Control: Wed Based PLC","authors":"J. Antony, Basanta Mahato, Sachin Sharma, G. Chitranshi","doi":"10.1109/ICISA.2011.5772427","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772427","url":null,"abstract":"Advancement in technology is very well reflected and supported by changes in measurement and control instrumentation. To move to high-speed serial from Parallel bus architectures has become prevalent and among these Ethernet is the most preferred switched Serial bus, which is forward-looking and backward-compatible. Great stride have been made in promoting Ethernet use for industrial networks and factory automation. The Web based distributed measurement and control is slowly replacing parallel architectures due to its non-crate architecture which reduces complexities of cooling, maintenance etc. for slow speed field processing. A new kind of expandable, distributed large I/O data acquisition system based on low cost microcontroller based web server[1] boards has been investigated and developed in this paper, whose hardware boards use 8-bit RISC processor with Ethernet controller, and software platform use AVR-GCC for firmware and Python for OS independent man machine interface. This system can measure all kinds of electrical and thermal parameters such as voltage, current, thermocouple, RTD, and so on. The measured data can be displayed on web pages at different geographical locations, and at the same time can be transmitted through RJ-45 Ethernet network to remote web based data acquisition and control (DAC) monitoring system by using HTTP protocol. A central embedded single board can act as a central CPU to communicate between web servers automatically. The novelty of this proposed system is a substitute of web PLC for industry application.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121564545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Comparative Study of PID Controller Designs Using Particle Swarm Optimizations for Automatic Voltage Regulators 基于粒子群算法的自动调压器PID控制器设计比较研究
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772345
H. Kang, Min Woo Kwon, H. Bae
{"title":"Comparative Study of PID Controller Designs Using Particle Swarm Optimizations for Automatic Voltage Regulators","authors":"H. Kang, Min Woo Kwon, H. Bae","doi":"10.1109/ICISA.2011.5772345","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772345","url":null,"abstract":"In this paper, we present PID controller design methods for automatic voltage regulators. We use three improved particle swarm optimization for PID controllers with which the step response is optimally regulated for automatic voltage controllers. We compare three different versions of particle swarm optimizations, i.e., the modified original PSO, the crazy PSO and the chaotic PSO. Among three PSOs, the chaotic PSO has the best performance and the modified original PSO has second best performance and the crazy PSO has poor performance for the convergence and the optimal solutions.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"35 s143","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113954143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Echocardiography Images Using Grid Independent Technique for Patients with Mitral Valve Problems (MVP) 网格独立技术对二尖瓣病变超声心动图的分析
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772385
M. Adib, N. Hasni, P. O. A. Razak
{"title":"Analysis of Echocardiography Images Using Grid Independent Technique for Patients with Mitral Valve Problems (MVP)","authors":"M. Adib, N. Hasni, P. O. A. Razak","doi":"10.1109/ICISA.2011.5772385","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772385","url":null,"abstract":"With echocardiography images collected by a transthoracic transducer, can be used to evaluate the mitral valve problems. Incorrect surgical of mitral valves failure will cause death and the surgical repair can be improved by knowing the correlations between backflow and the rigidity of mitral valve. In this study, a nearly method for identifying the mitral valve rigidity from two-dimensional (2D) images of echocardiography is presented. This method employs the grid independent technique. Systolic and diastolic stages of mitral valve condition were investigated by 10 patients with MVP. The results show linear correlation between degeneration of the valves and volume of backflow. The findings are the prediction of the behavior of the mitral valves and blood flow which can assist the medical practitioners in their decision on the patients' treatments","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121923532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Enhanced Selective Forwarding Scheme for Real-Time Applications in MANETs 一种面向manet实时应用的增强选择性转发方案
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772370
Do-hyeon Lee, Junho Oh, Jae-il Jung
{"title":"An Enhanced Selective Forwarding Scheme for Real-Time Applications in MANETs","authors":"Do-hyeon Lee, Junho Oh, Jae-il Jung","doi":"10.1109/ICISA.2011.5772370","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772370","url":null,"abstract":"In MANETs, flooding-based route discovery is usually preferred in order to set up the route with reliability between transmission pair. However, this approach may cause a serious contention in transmission between adjacent nodes and a considerable amount of control packets. In addition, most of ad hoc routing protocols establish the route with minimum hop count. Consequently, the performance of ad hoc routing protocol is considerably affected by link (or route) duration since the network comprises the nodes with unrestricted mobility and constrained range in transmission. This paper proposes a novel routing algorithm that aims to i) minimize routing overhead in route discovery procedure, and ii) guarantee a reliable and fast packet delivery between source and destination, especially in providing real-time applications over MANETs. To achieve this objective, we introduce Relay Region within the transmission range of nodes in order to select optimal next relaying nodes for supporting specific application requirements in route discovery procedure. The proposed Relay Region is defined by the limited distance progress in transmission to next relaying node in order to maintain the established route for an arbitrary length of time (i.e., route duration) while meeting packet delivery reliability and delay constraints. The simulation results showed that the proposed scheme can significantly improve the performance of packet delivery ratio and packet delivery latency, reducing transmission redundancy in route discovery procedure.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"52 Pt 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128953319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme for E-Learning 基于广义ElGamal签名方案的改进可否认认证协议
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772410
Eunjun Yoon, K. Yoo
{"title":"An Improved Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme for E-Learning","authors":"Eunjun Yoon, K. Yoo","doi":"10.1109/ICISA.2011.5772410","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772410","url":null,"abstract":"The importance of correctly identifying and authenticating a student in an e-learning environment comes from the necessity to avoid fraud or cheating. A new deniable authentication protocol based on the generalized ElGamal signature scheme was proposed by Shao in [11]. However, this paper demonstrates that Shao's protocol has two drawbacks: forward/backward secrecy problem and message confidentiality problem. To mitigate the security breaches, we also propose an improved deniable authentication protocol based on the generalized ElGamal signature scheme that can applicable for E-learning. As a result, the proposed protocol has same efficiency and strong security compared with Shao's protocol.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124448587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Compound Knowledge Based 3D Knowledge Navigation Framework 基于复合知识的三维知识导航框架设计
2011 International Conference on Information Science and Applications Pub Date : 2011-04-26 DOI: 10.1109/ICISA.2011.5772358
Gui-Jung Kim, Si-Jung Kim, Youngho Song, Sung-Ja Choi, B. Kim, Jungsoo Han
{"title":"Design of Compound Knowledge Based 3D Knowledge Navigation Framework","authors":"Gui-Jung Kim, Si-Jung Kim, Youngho Song, Sung-Ja Choi, B. Kim, Jungsoo Han","doi":"10.1109/ICISA.2011.5772358","DOIUrl":"https://doi.org/10.1109/ICISA.2011.5772358","url":null,"abstract":"This study aims to develop a knowledge navigation framework based on realistic 3D in order to get coaching and advice in real time and recognize multi-relation easily and retrieve on the basis of compound knowledge objects. To do so, it proposed the methods of 3D visualization of compound knowledge, intellectual retrieval, and construction of compound knowledge repository.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121312391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信