{"title":"Localization of Sensor Nodes in Underwater Acoustic Sensor Networks Using Two Reference Points","authors":"J. Ko, Jongmin Shin, Cheeha Kim","doi":"10.1109/ICOIN.2008.4472770","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472770","url":null,"abstract":"Underwater acoustic sensor networks (UWASN) is being actively researched for its broad spectrum of potential applications. Submarine or whale tracking can also be greatly leveraged by UWASN. These applications require localization of sensor nodes. We propose a novel scheme that minimizes the influence of node mobility inherent to underwater environment. We evaluate our method analytically, and show that it performs robustly in various network settings and environment.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"53 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123440069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hop-Count Based Congestion-Aware Multi-path Routing in Wireless Mesh Network","authors":"Hung Quoc Vo, C. Hong","doi":"10.1109/ICOIN.2008.4472752","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472752","url":null,"abstract":"In recent years, wireless mesh network (WMN) is a compelling topic to many network researchers due to its low cost in deployment, simplicity in installation and robustness in operation. However, existing routing protocols designed for MANET can not work efficiently in WMN because backbone in WMN formed by Mesh Router has very low mobility and are not put under power and memory constraint. In addition, they just concentrate on finding single path from the source to the destination while the characteristics of robustness of WMN require that every intermediate Mesh Router should establish several paths from itself to its desired destination. In our paper, we design a routing protocol that permits each MR to quickly discover multiple paths based on Hop Count metric to the Internet Gateways. Unfortunately, Hop Count does not take packet loss or bandwidth into account. It results in low throughput of a flow that follows the shortest path. A bandwidth estimation technique has been proposed to apply at each Mesh Router to allow it to predict congestion risk over its connected links and to select high available bandwidth link for forwarding packets. A detailed performance evaluation shows that the throughput increases greatly compared to pure AODV and AOMDV in high-loaded traffic scenario.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114747336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multicast Session Management and QoS Management for Multicast Group Communications","authors":"Jungjin Park, Su-Jin Lee, H. Kahng","doi":"10.1109/ICOIN.2008.4472806","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472806","url":null,"abstract":"Conventional multicast group communications need a dynamic mechanism for group management according to the join/leave of receivers and for the modification of membership information and a QoS management for a reliable multicast group communication. The Group Management Protocol (GMP) is an application-layer control protocol to supports the group management and the membership management for the multicast group communications but GMP does not support the QoS management. Also, RSVP supports the QoS for a reliable multicast group communication but RSVP is limited for managing the group membership. Therefore, we need to manage the group membership together with the QoS for the multicast group communications. In this paper, we propose a reliable multicast session management protocol called Multicast Session Management Protocol (MSMP). MSMP should coordinate the group management and the QoS management. MSMP is an application layer control protocol for managing QoS. MSMP consists of a session management function and a QoS management function.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122100198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-based Service Adaptation Platform: Improving the User Experience towards Mobile Location Services","authors":"S. Schou","doi":"10.1109/ICOIN.2008.4472797","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472797","url":null,"abstract":"Back in 2000 and the following two or three years, mobile location services gained a great deal of interest and they were considered as one of the few service categories where users would be willing to pay for the usage. Since 2000 countless mobile location services have been launched in different parts of the world. However, the mobile location services have obviously not yet met the hyped expectation of mass-market adoption that was expressed in 2000. The lack of adaptability and offerings tailored to different user requirements in specific contexts of use is one of the factors inhibiting the take-off of the existing mobile location services both in Asia and Western Europe. Adaptability is envisioned by Wireless World Research Forum (WWRF) as one of the keys to the success of any service beyond year 2010 and one of the service capabilities that should be made available on the next generation wireless network suggested by International Telecommunication Union (ITU). This paper proposes a new conceptual platform for context-based service adaptation which is designed to be used in the open service environment of the next generation wireless network. The platform aims to add adaptability to the future mobile location services as a means of improving the possibility of the service being a success.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120933373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward A Practical Scheme for IPSec Management","authors":"Qi Li, Mingwei Xu, Ke Xu","doi":"10.1109/ICOIN.2008.4472762","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472762","url":null,"abstract":"IP Security (IPSec) is an important protection mechanism for securing the Internet communication. However, IPSec is a complex security protocol family, and the management issue is still a challenge for mass deployment. Many researchers have investigated the IPSec management issue with various approaches, the policy configuration and distribution issue remain to be efficiently resolved. A certificate-based scheme to manage IPSec endpoints is proposed in this paper. A Role-based Access Control (RBAC) model is introduced to simplify the process of policy configuration, and policy control mechanism is proposed to check whether new security association conforms to local security policies. The analysis of the scheme shows the flexibility and efficiency of our approach. Based on our proposed scheme, we implement a prototype system with the proof-of-concept and conduct experimental studies to demonstrate the feasibility and performance of our approach.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129977925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-Efficient Flooding Mechanisms for the Wireless Sensor Networks","authors":"S. Arm, Yujin Lim, Hyun Yu","doi":"10.1109/ICOIN.2008.4472783","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472783","url":null,"abstract":"Most of the data transmissions in the sensor network are based on flooding. The original flooding causes the implosion and the overlap problems, so flooding may result in the reduced network lifetime of the sensor network with limited resources. Therefore, in order to reduce the overhead by flooding, we propose the flooding overlay structure (FOS) which adopts the concept of the overlay network so that the overhead caused by flooding can be reduced. We propose two types of FOS mechanisms, the centralized FOS (CFOS) and the distributed FOS (DFOS). CFOS is for the static sensor network in which the sink can select forwarding nodes more effectively. And DFOS is proposed for the more dynamic sensor network environment. To provide the network connectivity in DFOS, the concept of the notice delay is introduced. We have carried out simulations for our FOS mechanisms and the original flooding, and shown that our FOS mechanisms outperform the original flooding in many performance aspects.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128806275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khairul Nizam Bin Baharim, M. S. Kamaruddin, Faeizah Jusof
{"title":"Leveraging Missing Values in Call Detail Record Using Naïve Bayes for Fraud Analysis","authors":"Khairul Nizam Bin Baharim, M. S. Kamaruddin, Faeizah Jusof","doi":"10.1109/ICOIN.2008.4472791","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472791","url":null,"abstract":"In Telecom Fraud Management System (TFMS), the corrupted and missing values in call detail record (CDR) information are filtrated by rule-based classifier into the rejection proportion, as most of fraud detection approaches such as customer profiling and learning-based fraud detection technique were demanded clean information. Additionally, very few research works had discussed the issue of fraud detection in the area of corrupted CDR, due to its possibility yielded by lack of telecom equipment. In this paper, we present the leveraging missing values method, using the Naive Bayes approach posterior to rule-based classifier to analyze the probability of corrupted and missing values in CDR which then consequently led to the discovery of useable record lies in rejected CDR. This approach differs from other missing value handling and fraud analysis research where it does not attempt to treat the missing values; instead, leveraging it into the probabilistic model for fraud analysis. In this paper, we also reveal an impact of the missing values in telecommunication services and significantly vacant an avenues future work in fraud detection research.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133589762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Analysis of Multimedia Video Decoding on Embedded Systems","authors":"Chu-Hsing Lin, Jung-Chun Liu, Mao-Hua Cheng","doi":"10.1109/ICOIN.2008.4472815","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472815","url":null,"abstract":"Expanding components and applications on hand-held devices include radio, camera functions, audio, and video media, etc. Due to the complex computing characteristic of video decoding, the video application consumes large amount of energy and demands strict strategies for power management. Codecs are used to encode video media from original sources of films; lots of new compression codecs are released in recent years. In this paper, we aim to find the optimal video codecs on embedded systems from analyses of consumption of energy. Experiments have been done to investigate the effects of various codecs, file formats, and parameters of codecs.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129986843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative Transmission Strategy for Video-on-Demand System","authors":"K. Ho, K. Lo, Jian Feng","doi":"10.1109/ICOIN.2008.4472803","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472803","url":null,"abstract":"Skyscraper broadcast (SB) is one of the effective ways to provide a scalable solution for video-on-demand (VoD) services. Originally, SB was only designed for supporting a near-VoD service to clients. In this paper, we propose a new transmission scheme called skyscraper-based peer-to-peer broadcasting (SPB) to realize a true-VoD service in SB. It is accomplished by shifting the duty of the first segment transmission to the clients in peer-to-peer (P2P) manner. It is found from the results that the proposed scheme is superior to the existing strategies that the transmission cost of the system and that of the central server can be reduced up to 7% and 30% respectively.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123801245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyunduk Jung, Eunhyun Kwon, Inkeun Cho, Sung-Gook Lim, Jaiyong Lee
{"title":"Dynamic Resource Allocation in Cellular Radio Networks with Downlink Relaying","authors":"Hyunduk Jung, Eunhyun Kwon, Inkeun Cho, Sung-Gook Lim, Jaiyong Lee","doi":"10.1109/ICOIN.2008.4472760","DOIUrl":"https://doi.org/10.1109/ICOIN.2008.4472760","url":null,"abstract":"In this paper, we propose dynamic resource allocation with spatial reuse to improve total system throughput in multi-user system and multi-hop communication. The comparison of optimal and heuristic reuse scheme shows the heuristic reuse scheme is still good enough with low complexity. The simulation result shows that dynamic resource reuse scheme among fixed RSs increases the system throughput.","PeriodicalId":447966,"journal":{"name":"2008 International Conference on Information Networking","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134212194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}