2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops最新文献

筛选
英文 中文
SDN Based Architecture for IoT and Improvement of the Security 基于SDN的物联网架构及安全性提升
O. Flauzac, Carlos Gonzalez, A. Hachani, F. Nolot
{"title":"SDN Based Architecture for IoT and Improvement of the Security","authors":"O. Flauzac, Carlos Gonzalez, A. Hachani, F. Nolot","doi":"10.1109/WAINA.2015.110","DOIUrl":"https://doi.org/10.1109/WAINA.2015.110","url":null,"abstract":"With the exponential growth of devices connected to the Internet, security networks as one of the hardest challenge for network managers. Maintaining and securing such large scale and heterogeneous network is a challenging task. In this context, the new networking paradigm, the Software Defined Networking (SDN), introduces many opportunities and provides the potential to overcome those challenges. In this article, we first present a new SDN based architecture for networking with or without infrastructure, that we call an SDN domain. A single domain includes wired network, wireless network and Ad-Hoc networks. Next, we propose a second architecture to include sensor networks in an SDN-based network and in a domain. Third, we interconnect multiple domains and we describe how we can enhanced the security of each domain and how to distribute the security rules in order not to compromise the security of one domain. Finally, we propose a new secure and distributed architecture for IoT (Internet of Things).","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"63 1","pages":"688-693"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77600153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 141
Named Entity Relation Extraction Based on Multiple Features 基于多特征的命名实体关系提取
Yeqing Li
{"title":"Named Entity Relation Extraction Based on Multiple Features","authors":"Yeqing Li","doi":"10.1109/WAINA.2015.14","DOIUrl":"https://doi.org/10.1109/WAINA.2015.14","url":null,"abstract":"For the limited availability of established Mongolian named entity dictionary, with the increase of the new terminology and network vocabulary, Mongolian named entity dictionary was not able to update in time. This paper puts forward a method of named entity recognition, which based on a combination of multiple features and CRF. The method of named entity recognition proposed in this paper firstly cluster the entities that never appear in the repository with the method of hierarchical converged clustering, then carry through the normal words recognition and adjust the results of feature base.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"106 1","pages":"213-216"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78098513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New Methods for Big Data Analysis in Images 图像大数据分析的新方法
P. Perner
{"title":"New Methods for Big Data Analysis in Images","authors":"P. Perner","doi":"10.1109/WAINA.2015.75","DOIUrl":"https://doi.org/10.1109/WAINA.2015.75","url":null,"abstract":"In the rapidly expanding fields of cellular and molecular biology, fluorescence illumination and observation is becoming one of the techniques of choice to study the localization and dynamics of proteins, organelles, and other cellular compartments, as well as a tracer of intracellular protein trafficking. The automatic analysis of these images and signals in medicine, biotechnology, and chemistry is a challenging and demanding field. Signal-producing procedures by microscopes, spectrometers and other sensors have found their way into wide fields of medicine, biotechnology, economy and environmental analysis. With this arises the problem of the automatic mass analysis of signal information. Signal-interpreting systems which automatically generate the desired target statements from the signals are therefore of compelling necessity. The continuation of mass analysis on the basis of the classical procedures leads to investments of proportions that are not feasible. New procedures and system architectures are therefore required. We will present, based on our flexible image analysis and interpretation system Cell interpret, new intelligent and automatic image analysis and interpretation procedures. We will demonstrate it in the application of the HEp-2 cell pattern analysis.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"35 1","pages":"255-260"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73825166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid Cloud Service Based Healthcare Solutions 基于混合云服务的医疗保健解决方案
Young-Sil Lee, Bruce Ndibanje, Non Thiranant, E. Alasaarela, Hoon-Jae Lee
{"title":"Hybrid Cloud Service Based Healthcare Solutions","authors":"Young-Sil Lee, Bruce Ndibanje, Non Thiranant, E. Alasaarela, Hoon-Jae Lee","doi":"10.1109/WAINA.2015.42","DOIUrl":"https://doi.org/10.1109/WAINA.2015.42","url":null,"abstract":"In many countries, the increasing longevity and declining fertility rates have contributed to aging populations and thus increased medical needs. The traditional healthcare methodology is being replaced by smarter healthcare (a.k.a. E-healthcare, u-healthcare, m-healthcare or cloud-healthcare). The cloud computing has gained more and more popularity in recent years. Several cloud based healthcare solutions have been proposed in previous publication. However, even though cloud computing gives many benefits for healthcare system, is not without its risks. In this paper, we are introducing few security requirements for healthcare system and propose a hybrid cloud service based healthcare solution. We also propose secure sensor module to protect the sensed patient biological data during transmit.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"31 1","pages":"25-30"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75133120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Implementation and Experimental Results of a WMN Testbed in Indoor Environment Considering LoS Scenario 考虑LoS场景的室内WMN试验台的实现与实验结果
Tetsuya Oda, Admir Barolli, Shinji Sakamoto, L. Barolli, Makoto Ikeda, K. Uchida
{"title":"Implementation and Experimental Results of a WMN Testbed in Indoor Environment Considering LoS Scenario","authors":"Tetsuya Oda, Admir Barolli, Shinji Sakamoto, L. Barolli, Makoto Ikeda, K. Uchida","doi":"10.1109/AINA.2015.163","DOIUrl":"https://doi.org/10.1109/AINA.2015.163","url":null,"abstract":"Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers, because of their potential use in several fields such as collaborative computing and communications. Considering mobility of the terminals, routing is a key process for operation of WMNs. In this paper, we present the implementation of a test bed for WMNs. We analyze the performance of Optimized Link State Routing (OLSR) protocol in an indoor scenario. For evaluation we considered throughput, Packet Delivery Ratio (PDR), hop count, delay and jitter metrics. The experimental results show that the nodes in the test bed were communicating smoothly and we got height values of throughput and PDR and low values of delay and jitter.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"2 1","pages":"37-42"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75661066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Applicability of Probablistic Data Structures for Filtering Tasks in Data Loss Prevention Systems 概率数据结构在数据丢失防护系统中过滤任务的适用性
Lu Shi, S. Butakov, Dale Lindskog, Ron Ruhl, Evgeny Storozhenko
{"title":"Applicability of Probablistic Data Structures for Filtering Tasks in Data Loss Prevention Systems","authors":"Lu Shi, S. Butakov, Dale Lindskog, Ron Ruhl, Evgeny Storozhenko","doi":"10.1109/WAINA.2015.47","DOIUrl":"https://doi.org/10.1109/WAINA.2015.47","url":null,"abstract":"The paper studies the applicability of a probabilistic data structure known as Bloom Filter (BF) in the content analysis component of Data Loss Prevention (DLP) Systems. The study shows that Bus may serve as preliminary selection mechanism in content analysis. The goal of such mechanism is to quickly pre-select documents that may be similar to the one being checked. This selection should be accompanied by more detailed comparison to cope with false positive results produced by BFs. Specialized form of the filter called Matrix BF has been found particularly helpful for the content analysis task as it provides search localization and allows the filter to grow along with the document database and maintain liner search time. The paper outlined theoretical threshold for false positives for comparison of two rows in the Matrix BF. The threshold was confirmed by experiments. The experiments also indicated acceptable performance in terms of computational performance and level of false positives. Tests with obfuscated texts revealed some limitations of the proposed approach.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"262 1","pages":"582-586"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75105027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication 基于RSA和椭圆曲线密码的QR码认证性能比较
Non Thiranant, Young-Sil Lee, Hoon-Jae Lee
{"title":"Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication","authors":"Non Thiranant, Young-Sil Lee, Hoon-Jae Lee","doi":"10.1109/WAINA.2015.62","DOIUrl":"https://doi.org/10.1109/WAINA.2015.62","url":null,"abstract":"In the QR Code authentication technique, smart phone has become a great tool and played an important role in the authentication process. It has been used in various fields over the internet, especially in multi-factor authentication. However, security aspects should be well taken care of. In this paper, the performance comparison between RSA and Elliptic Curve Cryptography-based QR Code Authentication is proposed. It mainly focuses on QR Code, as it is now widely used all over the world. In addition, existing and related work has leveraged the use of RSA, but no work done on Elliptic Curve Cryptography. The experiment results and comparisons are shown and described in this paper.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"70 1","pages":"278-282"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75257391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Location Search Based on Subarea Fingerprinting and Surface Fitting for Indoor Positioning System 基于分区指纹和曲面拟合的室内定位系统位置搜索
Bang Wang, Shengliang Zhou
{"title":"Location Search Based on Subarea Fingerprinting and Surface Fitting for Indoor Positioning System","authors":"Bang Wang, Shengliang Zhou","doi":"10.1109/AINA.2015.199","DOIUrl":"https://doi.org/10.1109/AINA.2015.199","url":null,"abstract":"The fingerprinting technique based on received signal strength (RSS) has been intensively researched for indoor localization in the last decade. Instead of using discrete reference points to build a fingerprint database, this paper applies the surface fitting technique to construct RSS spatial distribution functions and proposes two location search methods to find the target location. We also propose to use subarea division and determination to improve the fitting accuracy and search efficiency. In the offline phase, we divide the whole indoor environment into several subareas, construct a fingerprint for each subarea, and build a RSS fitting function for each access point in each subarea. In the online phase, we first determine to which subarea a target belongs, and then search its location according to the proposed exhaustive location search or gradient descent based search algorithm. We conduct both simulations and field experiments to verify the proposed scheme. The experiment results show that for the same reference point granularity, the proposed scheme can achieve on average 10% to 22% localization accuracy improvements, compared with the classical nearest neighbor-based fingerprinting method.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"31 1","pages":"302-309"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75802638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secured mVoIP Service over Cloud and Container-Based Improvement 基于云和容器的安全移动voip服务改进
Byung-Rae Cha, Sun Park, Sujeong Shim, JongWon Kim
{"title":"Secured mVoIP Service over Cloud and Container-Based Improvement","authors":"Byung-Rae Cha, Sun Park, Sujeong Shim, JongWon Kim","doi":"10.1109/AINA.2015.269","DOIUrl":"https://doi.org/10.1109/AINA.2015.269","url":null,"abstract":"The VoIP technology is being revisited to support diversified services and mobile computing has been changing to mobile cloud computing paradigm. In this paper, we design and implement cloud-leveraged secured voice services, enabled by the combination of open-source software PBX (private branch exchange), shared hardware platform, and mobile devices. We also test and verify the end-to-end delay of the secured voice communication. In addition, we propose a preliminary idea to improve the portability by adopting Docker-based containers.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"224 1","pages":"791-795"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80047268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multipath Transmission Model and Its Route Selection Policy Considering Packet Re-sequencing Buffers Availability 考虑数据包重排序缓冲区可用性的多路径传输模型及其路由选择策略
Y. Yoshinaga, M. Shimamura, K. Iida
{"title":"Multipath Transmission Model and Its Route Selection Policy Considering Packet Re-sequencing Buffers Availability","authors":"Y. Yoshinaga, M. Shimamura, K. Iida","doi":"10.1109/WAINA.2015.88","DOIUrl":"https://doi.org/10.1109/WAINA.2015.88","url":null,"abstract":"Multipath transmission in intermediate nodes is a promising approach to support high bandwidth applications. To prevent out-of-order packet deliveries, packet re-sequencing nodes must be deployed. In this paper, we propose a multipath transmission model that incorporates packet re-sequencing buffers and the Random with Availability Check policy. After mathematically analyzing the model, we show numerical comparisons between the Random with Availability Check and Random policies.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"715-720"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88587988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信