首页 > 最新文献

2010 Second International Conference on Computer and Network Technology最新文献

英文 中文
Securing On-Demand Source Routing in MANETs 在manet中保护按需源路由
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.29
K. K. Chauhan, A. K. S. Sanger, V. S. Kushwah
Mobile Ad hoc Networks (MANETs) are open to a wide range of attacks due to their unique characteristics such as dynamic topology, open medium, absence of infrastructure, multi hop scenario and resource constraint. An ad hoc node in mobile ad hoc networks operates as not only end terminal but also as an intermediate router. In this way, multi-hop scenario occurs in MANETs. This multi hop scenario demands security against malicious behavior, because there may be one or more attackers in the route from source to destination. A routing protocol in MANETs is said to be securing that detects the detrimental effects of malicious node. Many security solutions for ad hoc routing have been proposed. But still many attacks are not addressable by these protocols. In this paper, we have proposed a protocol to secure the source routing in MANETs that allows both communicating parties as well as intermediate nodes to authenticate other nodes.
移动自组织网络(manet)具有动态拓扑、开放介质、无基础设施、多跳场景和资源约束等独特的特点,容易受到各种攻击。在移动自组织网络中,自组织节点既是终端,又是中间路由器。这样,在manet中就出现了多跳场景。这种多跳场景要求安全防范恶意行为,因为从源到目的的路由中可能有一个或多个攻击者。manet中的路由协议被认为是安全的,它可以检测到恶意节点的有害影响。已经提出了许多针对自组织路由的安全解决方案。但仍有许多攻击无法通过这些协议解决。在本文中,我们提出了一种协议来保护manet中的源路由,该协议允许通信双方以及中间节点验证其他节点。
{"title":"Securing On-Demand Source Routing in MANETs","authors":"K. K. Chauhan, A. K. S. Sanger, V. S. Kushwah","doi":"10.1109/ICCNT.2010.29","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.29","url":null,"abstract":"Mobile Ad hoc Networks (MANETs) are open to a wide range of attacks due to their unique characteristics such as dynamic topology, open medium, absence of infrastructure, multi hop scenario and resource constraint. An ad hoc node in mobile ad hoc networks operates as not only end terminal but also as an intermediate router. In this way, multi-hop scenario occurs in MANETs. This multi hop scenario demands security against malicious behavior, because there may be one or more attackers in the route from source to destination. A routing protocol in MANETs is said to be securing that detects the detrimental effects of malicious node. Many security solutions for ad hoc routing have been proposed. But still many attacks are not addressable by these protocols. In this paper, we have proposed a protocol to secure the source routing in MANETs that allows both communicating parties as well as intermediate nodes to authenticate other nodes.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130241473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Improvement in Apriori Algorithm Using Profit and Quantity 基于利润和数量的Apriori算法改进
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.46
P. Sandhu, D. Dhaliwal, S. Panda, A. Bisht
Association rule mining has been an area of active research in the field of knowledge discovery and numerous algorithms have been developed to this end. Of late, data mining researchers have improved upon the quality of association rule mining for business development by incorporating the influential factors like value (utility), quantity of items sold (weight) and more, for the mining of association patterns. In this paper, we propose an efficient approach based on weight factor and utility for effectual mining of significant association rules. Initially, the proposed approach makes use of the traditional Apriori algorithm to generate a set of association rules from a database. The proposed approach exploits the anti-monotone property of the Apriori algorithm, which states that for a k-itemset to be frequent all (k-1) subsets of this itemset also have to be frequent. Subsequently, the set of association rules mined are subjected to weight age (W-gain) and utility (U-gain) constraints, and for every association rule mined, a combined Utility Weighted Score (UW-Score) is computed. Ultimately, we determine a subset of valuable association rules based on the UW-Score computed. The experimental results demonstrate the effectiveness of the proposed approach in generating high utility association rules that can be lucratively applied for business development.
关联规则挖掘一直是知识发现领域的一个活跃研究领域,并为此开发了许多算法。最近,数据挖掘研究人员通过将价值(效用)、销售物品数量(权重)等影响因素纳入关联模式挖掘,提高了业务开发关联规则挖掘的质量。本文提出了一种基于权重因子和效用的有效关联规则挖掘方法。该方法首先利用传统的Apriori算法从数据库中生成一组关联规则。提出的方法利用了Apriori算法的反单调性,即对于k-项集来说,该项集的所有(k-1)个子集也必须是频繁的。随后,挖掘的关联规则集受到权重年龄(W-gain)和效用(U-gain)约束,并且对于挖掘的每个关联规则,计算组合效用加权分数(UW-Score)。最后,我们根据计算的UW-Score确定有价值的关联规则子集。实验结果证明了该方法在生成高效用关联规则方面的有效性,这些关联规则可以有效地应用于业务开发。
{"title":"An Improvement in Apriori Algorithm Using Profit and Quantity","authors":"P. Sandhu, D. Dhaliwal, S. Panda, A. Bisht","doi":"10.1109/ICCNT.2010.46","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.46","url":null,"abstract":"Association rule mining has been an area of active research in the field of knowledge discovery and numerous algorithms have been developed to this end. Of late, data mining researchers have improved upon the quality of association rule mining for business development by incorporating the influential factors like value (utility), quantity of items sold (weight) and more, for the mining of association patterns. In this paper, we propose an efficient approach based on weight factor and utility for effectual mining of significant association rules. Initially, the proposed approach makes use of the traditional Apriori algorithm to generate a set of association rules from a database. The proposed approach exploits the anti-monotone property of the Apriori algorithm, which states that for a k-itemset to be frequent all (k-1) subsets of this itemset also have to be frequent. Subsequently, the set of association rules mined are subjected to weight age (W-gain) and utility (U-gain) constraints, and for every association rule mined, a combined Utility Weighted Score (UW-Score) is computed. Ultimately, we determine a subset of valuable association rules based on the UW-Score computed. The experimental results demonstrate the effectiveness of the proposed approach in generating high utility association rules that can be lucratively applied for business development.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134636672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Part-of-Speech Approach to Evaluation of Textbook Reviews 基于词性的教材评价方法
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.31
P. Tanawongsuwan
Book reviews are comments written by readers regarding their experiences about a particular book. Some reviews contain useful information and may help prospective buyers in making a purchase decision, while some are viewed as less helpful, such as, complaints about shipping delay. The review’s content is the key to differentiating them. Presenting a methodology for evaluating the helpfulness of a book view, this research employed the part-of-speech (POS) approach. A review’s content initially underwent a POS tagging process. Various features were then extracted and used as attributes for classification algorithms. The relation between adjectives and review’s helpfulness was also analyzed. The system’s effectiveness was assessed using textbook reviews obtained from an on-line bookstore.
书评是读者就他们对某本书的体验所写的评论。有些评论包含有用的信息,可能会帮助潜在买家做出购买决定,而有些评论则被认为没有什么帮助,比如对发货延迟的抱怨。评论的内容是区分他们的关键。本研究采用词性(POS)方法,提出了一种评估书籍观点的有用性的方法。评论的内容最初经历了一个POS标记过程。然后提取各种特征并将其用作分类算法的属性。分析了形容词与评论的有用性之间的关系。该系统的有效性是通过从网上书店获得的教科书评论来评估的。
{"title":"Part-of-Speech Approach to Evaluation of Textbook Reviews","authors":"P. Tanawongsuwan","doi":"10.1109/ICCNT.2010.31","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.31","url":null,"abstract":"Book reviews are comments written by readers regarding their experiences about a particular book. Some reviews contain useful information and may help prospective buyers in making a purchase decision, while some are viewed as less helpful, such as, complaints about shipping delay. The review’s content is the key to differentiating them. Presenting a methodology for evaluating the helpfulness of a book view, this research employed the part-of-speech (POS) approach. A review’s content initially underwent a POS tagging process. Various features were then extracted and used as attributes for classification algorithms. The relation between adjectives and review’s helpfulness was also analyzed. The system’s effectiveness was assessed using textbook reviews obtained from an on-line bookstore.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123708209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dynamic Routing Protocol Implementation Decision between EIGRP, OSPF and RIP Based on Technical Background Using OPNET Modeler 基于OPNET Modeler的EIGRP、OSPF和RIP动态路由协议实现决策
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.66
Sheela Ganesh Thorenoor
This paper presents th implementation decisions to be made when th choice is between protocols that involve distance vector or link state or the combination of both. Here a comparison is made between different parameters and a detailed simulation study is performed on the network with different routing protocols and it has been shown that EIGRP provides a better network convergence time, less bandwidth requirements and better CPU and memory utilization compared to OSPF and RIP. EIGRP, OSPF and RIP are the dynamic routing protocols being used in the practical networks to propagat network topology information to the neighboring routers. There have been a large number of static and dynamic routing protocols available but choice of the right protocol for routing is dependent on many parameters critical being network convergence time, scalability, memory and CPU requirements, security and bandwidth requirement etc.
本文提出了在涉及距离矢量或链路状态或两者组合的协议之间进行选择时要做出的实现决策。本文对不同参数进行了比较,并对采用不同路由协议的网络进行了详细的仿真研究,结果表明,与OSPF和RIP相比,EIGRP具有更好的网络收敛时间、更少的带宽需求以及更好的CPU和内存利用率。EIGRP、OSPF和RIP是实际网络中用于向相邻路由器传播网络拓扑信息的动态路由协议。目前已有大量的静态和动态路由协议可供选择,但选择合适的路由协议取决于许多关键参数,如网络收敛时间、可扩展性、内存和CPU需求、安全性和带宽需求等。
{"title":"Dynamic Routing Protocol Implementation Decision between EIGRP, OSPF and RIP Based on Technical Background Using OPNET Modeler","authors":"Sheela Ganesh Thorenoor","doi":"10.1109/ICCNT.2010.66","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.66","url":null,"abstract":"This paper presents th implementation decisions to be made when th choice is between protocols that involve distance vector or link state or the combination of both. Here a comparison is made between different parameters and a detailed simulation study is performed on the network with different routing protocols and it has been shown that EIGRP provides a better network convergence time, less bandwidth requirements and better CPU and memory utilization compared to OSPF and RIP. EIGRP, OSPF and RIP are the dynamic routing protocols being used in the practical networks to propagat network topology information to the neighboring routers. There have been a large number of static and dynamic routing protocols available but choice of the right protocol for routing is dependent on many parameters critical being network convergence time, scalability, memory and CPU requirements, security and bandwidth requirement etc.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126680267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 99
Protection Optimization for MPLS Networks MPLS网络保护优化
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.94
R. Rizk, A. Elmaghraby, Mahmoud Mariee
A crucial aspect in the development of a fault management system is the selection of backup paths. The main issue in this selection is a tradeoff between the resource consumption and the minimization of failure recovery time, link failure, and packet loss. In this paper, a general QoS backup protection optimization policy applicable to a wide range of network situations and traffic types is proposed. A comparison between the proposed policy and the conventional protection backup methods is performed. The numerical results show a significant improvement of the QoS protection over conventional protection backup methods at variable protection parameters, network constraints and traffic types.
在故障管理系统的开发中,备份路径的选择是一个至关重要的方面。这种选择的主要问题是在资源消耗和最小化故障恢复时间、链路故障和数据包丢失之间进行权衡。本文提出了一种适用于多种网络情况和流量类型的通用QoS备份保护优化策略。将提出的策略与传统的保护备份方法进行了比较。数值结果表明,在可变保护参数、网络约束和流量类型下,QoS保护比传统的保护备份方法有显著的改善。
{"title":"Protection Optimization for MPLS Networks","authors":"R. Rizk, A. Elmaghraby, Mahmoud Mariee","doi":"10.1109/ICCNT.2010.94","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.94","url":null,"abstract":"A crucial aspect in the development of a fault management system is the selection of backup paths. The main issue in this selection is a tradeoff between the resource consumption and the minimization of failure recovery time, link failure, and packet loss. In this paper, a general QoS backup protection optimization policy applicable to a wide range of network situations and traffic types is proposed. A comparison between the proposed policy and the conventional protection backup methods is performed. The numerical results show a significant improvement of the QoS protection over conventional protection backup methods at variable protection parameters, network constraints and traffic types.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126824673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Breast Carcinoma Pigeonholing and Vaticination Using an Interspersed and Malleable Approach 用一种分散和可延展性的方法对乳腺癌进行分类和诊断
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.96
H. Mathkour, Muneer Ahmad
Breast carcinoma is considered as the second major cause of death in females. Malignant tumor affects some tissues of breast and may spread over neighboring tissues. Early detection of this malignant mass is very important to save the precious lives. Although the death rate is reduced by application of modern tools yet research for optimal solutions is still in progress to bring more comprehensive mechanisms. In this paper, we are proposing an interspersed approach for breast tumor pigeonholing and vatic nation. We trained our neural network over datasets obtained from the University of Wisconsin Hospitals, Madison and tested over many other datasets with diverse network architectures. The proposed approach was sectioned in applications of data filters. Our network architecture showed 96% of malignant and 99.45% of benign diagnosis for training confusion matrix and 100% for malignant and 97% benign for cross validation matrix. We have given detailed experimentations in light of training and cross validation mean square errors and demonstrated results even for minute curve fluctuations.
乳腺癌被认为是女性死亡的第二大原因。恶性肿瘤影响乳房的某些组织,并可能扩散到邻近组织。早期发现这种恶性肿块对挽救宝贵的生命至关重要。尽管现代工具的应用降低了死亡率,但仍在进行最佳解决办法的研究,以建立更全面的机制。在本文中,我们提出了一种乳腺肿瘤分类和分类的分散方法。我们使用从威斯康辛大学麦迪逊分校医院获得的数据集来训练我们的神经网络,并在许多其他具有不同网络架构的数据集上进行测试。最后对该方法在数据过滤器中的应用进行了介绍。我们的网络架构显示,训练混淆矩阵的恶性诊断率为96%,良性诊断率为99.45%;交叉验证矩阵的恶性诊断率为100%,良性诊断率为97%。我们根据训练和交叉验证均方误差给出了详细的实验,并证明了即使是微小的曲线波动也能得到结果。
{"title":"Breast Carcinoma Pigeonholing and Vaticination Using an Interspersed and Malleable Approach","authors":"H. Mathkour, Muneer Ahmad","doi":"10.1109/ICCNT.2010.96","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.96","url":null,"abstract":"Breast carcinoma is considered as the second major cause of death in females. Malignant tumor affects some tissues of breast and may spread over neighboring tissues. Early detection of this malignant mass is very important to save the precious lives. Although the death rate is reduced by application of modern tools yet research for optimal solutions is still in progress to bring more comprehensive mechanisms. In this paper, we are proposing an interspersed approach for breast tumor pigeonholing and vatic nation. We trained our neural network over datasets obtained from the University of Wisconsin Hospitals, Madison and tested over many other datasets with diverse network architectures. The proposed approach was sectioned in applications of data filters. Our network architecture showed 96% of malignant and 99.45% of benign diagnosis for training confusion matrix and 100% for malignant and 97% benign for cross validation matrix. We have given detailed experimentations in light of training and cross validation mean square errors and demonstrated results even for minute curve fluctuations.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116733422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location Dependent Query Processing – Issues, Challenges and Applications 位置相关查询处理——问题、挑战和应用
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.39
Kahkashan Tabassum, Maniza Hijab, A. Damodaram
The growth in the number of mobile users is motivating the new technology of mobile computing to offer many new types of services like location-based services that pose many challenging problems for location-dependent query processing and data management. In this paper, we discuss the various challenges in distributed processing of location-dependent continuous queries in a mobile environment by studying the different scenarios in which both the querying unit and the object being queried are in motion. Then we proceed to classify different types of location dependent queries. We discuss the different solutions to solve these complex location dependent queries using caching techniques that facilitate fast access to data and at the same time minimize the massive network traffic generated due to location dependent query processing in a wireless environment. To further reduce the data transfer the query results are cached so that these results are reusable. The conventional query processing method like join processing of data from mobile units and server is directly applied in the mobile environment. Additionally this paper also focuses on the methods of location-dependent query processing and applications. The main goal of this paper is to study the various location dependent query processing methods along with data management problems involved in evaluation of Location-dependent queries and classify them.
移动用户数量的增长促使移动计算的新技术提供了许多新的服务类型,如基于位置的服务,这给依赖于位置的查询处理和数据管理带来了许多具有挑战性的问题。在本文中,我们通过研究查询单元和被查询对象都处于运动状态的不同场景,讨论了在移动环境中分布式处理位置依赖连续查询的各种挑战。然后我们继续对不同类型的位置相关查询进行分类。我们将讨论使用缓存技术来解决这些复杂的位置相关查询的不同解决方案,这些技术可以促进对数据的快速访问,同时最大限度地减少由于无线环境中位置相关查询处理而产生的大量网络流量。为了进一步减少数据传输,查询结果被缓存,以便这些结果可重用。将传统的对移动设备和服务器数据进行联接处理的查询处理方法直接应用到移动环境中。此外,本文还重点介绍了位置相关查询的处理方法和应用。本文的主要目的是研究各种位置相关查询处理方法,以及位置相关查询评估中涉及的数据管理问题,并对其进行分类。
{"title":"Location Dependent Query Processing – Issues, Challenges and Applications","authors":"Kahkashan Tabassum, Maniza Hijab, A. Damodaram","doi":"10.1109/ICCNT.2010.39","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.39","url":null,"abstract":"The growth in the number of mobile users is motivating the new technology of mobile computing to offer many new types of services like location-based services that pose many challenging problems for location-dependent query processing and data management. In this paper, we discuss the various challenges in distributed processing of location-dependent continuous queries in a mobile environment by studying the different scenarios in which both the querying unit and the object being queried are in motion. Then we proceed to classify different types of location dependent queries. We discuss the different solutions to solve these complex location dependent queries using caching techniques that facilitate fast access to data and at the same time minimize the massive network traffic generated due to location dependent query processing in a wireless environment. To further reduce the data transfer the query results are cached so that these results are reusable. The conventional query processing method like join processing of data from mobile units and server is directly applied in the mobile environment. Additionally this paper also focuses on the methods of location-dependent query processing and applications. The main goal of this paper is to study the various location dependent query processing methods along with data management problems involved in evaluation of Location-dependent queries and classify them.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114692562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Prioritized Quality of Service Support Medium Access Control for Real Time Flows 优先服务质量支持实时流的介质访问控制
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.69
Jims Marchang, Sukumar Nandi, N. Sarma
In multi-hop wireless mobile ad hoc network each node is capable of sending, receiving and forwarding data packets. Since it is an infrastructure-less networks, it makes it feasible to set up at anyplace and at any time. Supporting Quality of Service (QoS) in such network is a challenge due to limited available resources like bandwidth etc. This paper describes a new approach of Medium Access Control (MAC) which supports QoS for real time applications. Each node is assigned priorities dynamically based on their roles (as sender, receiver or forwarding node) and type of traffics (Real Time Packet – RTP or Non Real Time Packet - NRTP) in the networks. This approach enhances QoS for Real Time data in terms of bandwidth utilization and delay. This ensures higher network throughput with lower delay for packet delivery. New queue has been designed to fit in to the proposed MAC protocol. Simulation shows that our proposed MAC performs much better than the standard IEEE 802.11 DCF in terms of average throughput, delay, MAC overheads in support of RTP and fairness within a class of traffic also increases.
在多跳无线移动自组网中,每个节点都具有发送、接收和转发数据包的能力。由于它是一个无基础设施的网络,因此可以在任何地点和任何时间进行设置。由于带宽等可用资源有限,在这种网络中支持服务质量(QoS)是一个挑战。本文提出了一种新的支持QoS的实时应用介质访问控制(MAC)方法。每个节点根据其在网络中的角色(发送节点、接收节点或转发节点)和流量类型(实时报文RTP或非实时报文NRTP)动态分配优先级。这种方法在带宽利用率和延迟方面增强了实时数据的QoS。这确保了更高的网络吞吐量和更低的数据包传输延迟。为了适应提议的MAC协议,设计了新的队列。仿真表明,我们提出的MAC在平均吞吐量、延迟、支持RTP的MAC开销和一类流量内的公平性方面都比标准的IEEE 802.11 DCF性能好得多。
{"title":"Prioritized Quality of Service Support Medium Access Control for Real Time Flows","authors":"Jims Marchang, Sukumar Nandi, N. Sarma","doi":"10.1109/ICCNT.2010.69","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.69","url":null,"abstract":"In multi-hop wireless mobile ad hoc network each node is capable of sending, receiving and forwarding data packets. Since it is an infrastructure-less networks, it makes it feasible to set up at anyplace and at any time. Supporting Quality of Service (QoS) in such network is a challenge due to limited available resources like bandwidth etc. This paper describes a new approach of Medium Access Control (MAC) which supports QoS for real time applications. Each node is assigned priorities dynamically based on their roles (as sender, receiver or forwarding node) and type of traffics (Real Time Packet – RTP or Non Real Time Packet - NRTP) in the networks. This approach enhances QoS for Real Time data in terms of bandwidth utilization and delay. This ensures higher network throughput with lower delay for packet delivery. New queue has been designed to fit in to the proposed MAC protocol. Simulation shows that our proposed MAC performs much better than the standard IEEE 802.11 DCF in terms of average throughput, delay, MAC overheads in support of RTP and fairness within a class of traffic also increases.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114696030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Distributed Fusion Filters for Linear Dynamic System with Uncertainty 不确定线性动态系统分布式融合滤波器的比较
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.71
J. Yoon, S. Bae, V. Shin
In this paper, a distributed fusion filtering problem for a linear discrete-time dynamic system with uncertainty is considered. All fusion filtering algorithms are based on fusion formulas which represent a weighted sum of the local Kalman estimates with matrix or scalar weights. The fusion weights are calculated by using four algorithms: convex combination, optimal fusion, covariance intersection, and median fusion. The comparison results of the fusion algorithms are discussed in terms of estimation accuracy and computation cost.
研究了一类具有不确定性的线性离散动态系统的分布式融合滤波问题。所有的融合滤波算法都是基于融合公式,该融合公式表示具有矩阵或标量权重的局部卡尔曼估计的加权和。采用凸组合、最优融合、协方差交叉和中值融合四种算法计算融合权值。从估计精度和计算量两方面讨论了两种融合算法的比较结果。
{"title":"Comparison of Distributed Fusion Filters for Linear Dynamic System with Uncertainty","authors":"J. Yoon, S. Bae, V. Shin","doi":"10.1109/ICCNT.2010.71","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.71","url":null,"abstract":"In this paper, a distributed fusion filtering problem for a linear discrete-time dynamic system with uncertainty is considered. All fusion filtering algorithms are based on fusion formulas which represent a weighted sum of the local Kalman estimates with matrix or scalar weights. The fusion weights are calculated by using four algorithms: convex combination, optimal fusion, covariance intersection, and median fusion. The comparison results of the fusion algorithms are discussed in terms of estimation accuracy and computation cost.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114890450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Animal Situation Tracking Service Using RFID, GPS, and Sensors 使用RFID, GPS和传感器的动物状况跟踪服务
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.40
So-Hyeon Kim, Do-Hyeun Kim, Hee-Dong Park
With the technology of sensor, RFID, and GPS, many researches are recently being carried out on monitoring animal behavior and interactions with the environment. Plus, the technology is applicable to develop new zoological systems for animal trace ability, identification, and anti-theft. Yet, there is a lack of studies of providing zoos with intelligent animal tracking and management services based on RFID, GPS, and sensors. Accordingly, in this paper, we propose an intelligent animal situation tracking service for zoological gardens, based on GPS, RFID, and sensors. Firstly, we present a service scenario of animal situation tracking and introduce the tracking system configuration. The proposed system can provide real-time animal situation information such as the current location, bodily temperature, and pictures. Plus, it can track the animals based on the information even when they escape their cages. Next, we design and implement a prototype of the proposed animal situation tracking system.
近年来,随着传感器、RFID和GPS等技术的发展,人们对动物行为及其与环境的相互作用进行了许多研究。此外,该技术适用于开发新的动物追踪能力,识别和防盗动物学系统。然而,为动物园提供基于RFID、GPS和传感器的智能动物跟踪和管理服务的研究还很缺乏。为此,本文提出了一种基于GPS、RFID和传感器的智能动物园动物状态跟踪服务。首先,提出了一种动物状态跟踪的服务场景,并介绍了跟踪系统的配置。该系统可以提供实时的动物状况信息,如当前位置、体温和图片。此外,它可以根据这些信息跟踪动物,即使它们逃离了笼子。接下来,我们设计并实现了所提出的动物状态跟踪系统的原型。
{"title":"Animal Situation Tracking Service Using RFID, GPS, and Sensors","authors":"So-Hyeon Kim, Do-Hyeun Kim, Hee-Dong Park","doi":"10.1109/ICCNT.2010.40","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.40","url":null,"abstract":"With the technology of sensor, RFID, and GPS, many researches are recently being carried out on monitoring animal behavior and interactions with the environment. Plus, the technology is applicable to develop new zoological systems for animal trace ability, identification, and anti-theft. Yet, there is a lack of studies of providing zoos with intelligent animal tracking and management services based on RFID, GPS, and sensors. Accordingly, in this paper, we propose an intelligent animal situation tracking service for zoological gardens, based on GPS, RFID, and sensors. Firstly, we present a service scenario of animal situation tracking and introduce the tracking system configuration. The proposed system can provide real-time animal situation information such as the current location, bodily temperature, and pictures. Plus, it can track the animals based on the information even when they escape their cages. Next, we design and implement a prototype of the proposed animal situation tracking system.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128309959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
期刊
2010 Second International Conference on Computer and Network Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1