首页 > 最新文献

2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications最新文献

英文 中文
Shorten Reed-Solomon Code for Wireless USB 缩短无线USB的里德-所罗门代码
Runfeng Yang, Xiaoning Chen, Jian Zhao
The creation of Ultra-Wideband (UWB) radio platform has allowed the development of high bit-rate Wireless USB. Reed-Solomon (RS) code is employed in order to improve decoding at the receiver offering good reliability performance in the mobile environment. This paper presents shorten RS (23, 17) code solutions for Wireless USB system encoding/decoding needs. The result is tested from simulation in realistic multi-path environments.
超宽带(UWB)无线通信平台的建立,使高比特率无线USB的发展成为可能。采用RS码改进接收端解码,在移动环境下具有良好的可靠性。本文提出了缩短RS(23,17)码的解决方案,以满足无线USB系统的编码/解码需求。仿真结果在真实的多路径环境中得到了验证。
{"title":"Shorten Reed-Solomon Code for Wireless USB","authors":"Runfeng Yang, Xiaoning Chen, Jian Zhao","doi":"10.1109/BWCCA.2014.57","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.57","url":null,"abstract":"The creation of Ultra-Wideband (UWB) radio platform has allowed the development of high bit-rate Wireless USB. Reed-Solomon (RS) code is employed in order to improve decoding at the receiver offering good reliability performance in the mobile environment. This paper presents shorten RS (23, 17) code solutions for Wireless USB system encoding/decoding needs. The result is tested from simulation in realistic multi-path environments.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124917665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Node Placement in WMNs for Different Movement Methods: A Hill Climbing System Considering Exponential and Weibull Distributions 不同运动方式下WMNs的节点放置:考虑指数分布和威布尔分布的爬坡系统
Xinyue Chang, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli, F. Xhafa
In this paper, we used our proposed and implemented system based on Hill Climbing algorithm, called WMN-HC for mesh router node placement in WMNs. We evaluate and compare the performance of the proposed system for different movement methods. We took into consideration Exponential and Weibull distributions of mesh clients. We use as evaluation metrics giant component and number of covered mesh clients. We compare the performance of WMN-HC for Exponential and Weibull distribution of mesh clients and different movement methods. The simulation results show that, the performance of the four different movement methods depend on the distribution of mesh client nodes. For Exponential distribution of mesh clients, the WMN-HC achieves good performance for Combination, Radius and Swap movement methods. For Weibull distribution of mesh clients, the WMN-HC has the best solution when the movement method is the Swap. The Random movement method has the worst performance among other movement methods.
在本文中,我们使用我们提出并实现的基于爬山算法的系统,称为WMN-HC,用于网状路由器节点在wmn中的放置。我们评估和比较了所提出的系统在不同运动方法下的性能。我们考虑了网格客户端的指数和威布尔分布。我们使用巨大的组件和覆盖的网格客户端数量作为评估指标。我们比较了WMN-HC在网格客户端指数分布和威布尔分布以及不同移动方法下的性能。仿真结果表明,四种不同移动方法的性能取决于网格客户端节点的分布。对于指数分布的网格客户端,WMN-HC在组合、半径和交换移动方法上都取得了良好的性能。对于网格客户端的威布尔分布,当移动方式为Swap时,WMN-HC具有最佳的解决方案。随机移动方法是各种移动方法中性能最差的一种。
{"title":"Node Placement in WMNs for Different Movement Methods: A Hill Climbing System Considering Exponential and Weibull Distributions","authors":"Xinyue Chang, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli, F. Xhafa","doi":"10.1109/BWCCA.2014.53","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.53","url":null,"abstract":"In this paper, we used our proposed and implemented system based on Hill Climbing algorithm, called WMN-HC for mesh router node placement in WMNs. We evaluate and compare the performance of the proposed system for different movement methods. We took into consideration Exponential and Weibull distributions of mesh clients. We use as evaluation metrics giant component and number of covered mesh clients. We compare the performance of WMN-HC for Exponential and Weibull distribution of mesh clients and different movement methods. The simulation results show that, the performance of the four different movement methods depend on the distribution of mesh client nodes. For Exponential distribution of mesh clients, the WMN-HC achieves good performance for Combination, Radius and Swap movement methods. For Weibull distribution of mesh clients, the WMN-HC has the best solution when the movement method is the Swap. The Random movement method has the worst performance among other movement methods.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116068656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pseudonym-Based Cryptography and Its Application in Vehicular Ad Hoc Networks 基于假名的加密技术及其在车载自组织网络中的应用
Chang-ji Wang, Dong-Yuan Shi, Xi-Lei Xu
As the cornerstone of the future intelligent transportation system, vehicular ad hoc networks (VANETs) have attracted intensive attention from the academic and industrial research communities in recent years. For widespread deployment of VANETs, security and privacy issues must be addressed properly. In this paper, we introduce the notion of pseudonym-based cryptography, and present a provable secure pseudonym-based cryptosystems with a trusted authority that includes a pseudonym-based multi-receiver encryption scheme, a pseudonym-based signature scheme, and a pseudonym-based key establishment protocol. We then propose a secure and efficient data access scheme for VANETs based on cooperative caching technology and our proposed pseudonym-based cryptosystems. On the one hand, the efficiency of data access are greatly improved by allowing the sharing and coordination of cached data among multiple vehicles. On the other hand, anonymity of the vehicles, data confidentiality, integrity and non-repudiation are guaranteed by employing our proposed pseudonym-based cryptosystems. Simulation results have shown that our proposed pseudonym-based cryptosystems are suitable to the VANETs environment.
作为未来智能交通系统的基石,车辆自组织网络(VANETs)近年来受到了学术界和产业界的广泛关注。为了广泛部署vanet,必须妥善解决安全和隐私问题。本文引入了假名密码学的概念,提出了一个可证明的具有可信权限的安全假名密码系统,该系统包括一个基于假名的多接收方加密方案、一个基于假名的签名方案和一个基于假名的密钥建立协议。然后,我们提出了一种基于协作缓存技术和我们提出的基于假名的密码系统的安全高效的vanet数据访问方案。一方面,通过在多辆车之间共享和协调缓存数据,大大提高了数据访问的效率。另一方面,通过采用我们提出的基于假名的密码系统,保证了车辆的匿名性、数据机密性、完整性和不可否认性。仿真结果表明,本文提出的基于假名的密码系统适用于VANETs环境。
{"title":"Pseudonym-Based Cryptography and Its Application in Vehicular Ad Hoc Networks","authors":"Chang-ji Wang, Dong-Yuan Shi, Xi-Lei Xu","doi":"10.1109/BWCCA.2014.72","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.72","url":null,"abstract":"As the cornerstone of the future intelligent transportation system, vehicular ad hoc networks (VANETs) have attracted intensive attention from the academic and industrial research communities in recent years. For widespread deployment of VANETs, security and privacy issues must be addressed properly. In this paper, we introduce the notion of pseudonym-based cryptography, and present a provable secure pseudonym-based cryptosystems with a trusted authority that includes a pseudonym-based multi-receiver encryption scheme, a pseudonym-based signature scheme, and a pseudonym-based key establishment protocol. We then propose a secure and efficient data access scheme for VANETs based on cooperative caching technology and our proposed pseudonym-based cryptosystems. On the one hand, the efficiency of data access are greatly improved by allowing the sharing and coordination of cached data among multiple vehicles. On the other hand, anonymity of the vehicles, data confidentiality, integrity and non-repudiation are guaranteed by employing our proposed pseudonym-based cryptosystems. Simulation results have shown that our proposed pseudonym-based cryptosystems are suitable to the VANETs environment.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123917647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving Multi-path Congestion Control for Event-Driven Wireless Sensor Networks by Using TDMA 利用TDMA改进事件驱动无线传感器网络的多路径拥塞控制
Fang-Yie Leu, Hsin-Liang Chen, Chih-Chung Cheng
In this paper, we propose a time division method to solve the congestion control problem for an event-driven sensor network. In this method, a node adjusts time (therefore bandwidth) assigned to each upstream node by a dynamic TDMA approach to efficiently use resources available to the system and avoid the situation in which a node cannot send event information to the BS on time through the insufficiently allocated bandwidth when it detects multiple events in a short time span. Experimental results show that this method can effectively improve a WSN's throughputs, shorten end-to-end delays and reduce packet loss rates.
在本文中,我们提出了一种时间分割方法来解决事件驱动传感器网络的拥塞控制问题。在该方法中,节点通过动态TDMA方式调整分配给每个上游节点的时间(即带宽),以有效利用系统可用资源,避免节点在短时间内检测到多个事件时,由于分配的带宽不足而无法及时向BS发送事件信息的情况。实验结果表明,该方法能有效提高无线传感器网络的吞吐量,缩短端到端时延,降低丢包率。
{"title":"Improving Multi-path Congestion Control for Event-Driven Wireless Sensor Networks by Using TDMA","authors":"Fang-Yie Leu, Hsin-Liang Chen, Chih-Chung Cheng","doi":"10.22667/JISIS.2015.11.31.001","DOIUrl":"https://doi.org/10.22667/JISIS.2015.11.31.001","url":null,"abstract":"In this paper, we propose a time division method to solve the congestion control problem for an event-driven sensor network. In this method, a node adjusts time (therefore bandwidth) assigned to each upstream node by a dynamic TDMA approach to efficiently use resources available to the system and avoid the situation in which a node cannot send event information to the BS on time through the insufficiently allocated bandwidth when it detects multiple events in a short time span. Experimental results show that this method can effectively improve a WSN's throughputs, shorten end-to-end delays and reduce packet loss rates.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"638 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122949922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Novel Text Watermarking Algorithm Based on Graphic Watermarking Framework 一种基于图形水印框架的文本水印算法
Xiaowei Liu, Jin Zhang, Haozhou Wang, Xiaoli Gong, Yuanyuan Cheng
This paper proposes a research framework for graphic digital text Watermarking algorithms and methods. We summarized graphic text watermarking after a brief review of digital text watermarking, and propose the research framework that consists of 8 levels, such as pixel, line, etymon, character, row, paragraph, page, and chapter. According to the embedding methods, each level is divided into three typical characteristics: self-characteristics, similarity and structural feature. At last we proposed an algorithm as case study and discussed further research's possibility.
本文提出了图形数字文本水印算法和方法的研究框架。在对数字文本水印进行简要回顾的基础上,我们对图形文本水印进行了总结,提出了像素、行、词源、字符、行、段、页、章8个层次的研究框架。根据嵌入方式的不同,每一层次被划分为三个典型特征:自特征、相似性和结构特征。最后提出了一种算法作为案例,并讨论了进一步研究的可能性。
{"title":"A Novel Text Watermarking Algorithm Based on Graphic Watermarking Framework","authors":"Xiaowei Liu, Jin Zhang, Haozhou Wang, Xiaoli Gong, Yuanyuan Cheng","doi":"10.1109/BWCCA.2014.49","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.49","url":null,"abstract":"This paper proposes a research framework for graphic digital text Watermarking algorithms and methods. We summarized graphic text watermarking after a brief review of digital text watermarking, and propose the research framework that consists of 8 levels, such as pixel, line, etymon, character, row, paragraph, page, and chapter. According to the embedding methods, each level is divided into three typical characteristics: self-characteristics, similarity and structural feature. At last we proposed an algorithm as case study and discussed further research's possibility.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125825362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TSDDR: Threshold Sensitive Density Controlled Divide and Rule Routing Protocol for Wireless Sensor Networks 无线传感器网络的阈值敏感密度控制分规则路由协议
M. Behzad, N. Javaid, A. Sana, M. Khan, N. Saeed, Z. Khan, U. Qasim
In Wireless Sensor Networks, efficient energy management is of great importance. In this paper, we propose a novel routing protocol, Threshold Sensitive Density Controlled Divide and Rule (TSDDR) to prolong network lifetime and stability period. To achieve these targets, we utilize static clustering with threshold aware transmissions. Simulations are done in MATLAB and the results show that our protocol has 60% longer stability period than LEACH [1] and 36% longer stability period than DDR [2]. We also implemented the Uniform Random Model (URM) to find Packet Drop to make our scheme more practical.
在无线传感器网络中,高效的能量管理非常重要。本文提出了一种新的路由协议——阈值敏感密度控制分治协议(TSDDR),以延长网络的生存期和稳定周期。为了实现这些目标,我们利用具有阈值感知传输的静态集群。在MATLAB中进行了仿真,结果表明我们的协议比LEACH[1]的稳定周期长60%,比DDR[2]的稳定周期长36%。我们还实现了统一随机模型(Uniform Random Model, URM)来查找丢包,使我们的方案更加实用。
{"title":"TSDDR: Threshold Sensitive Density Controlled Divide and Rule Routing Protocol for Wireless Sensor Networks","authors":"M. Behzad, N. Javaid, A. Sana, M. Khan, N. Saeed, Z. Khan, U. Qasim","doi":"10.1109/BWCCA.2014.48","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.48","url":null,"abstract":"In Wireless Sensor Networks, efficient energy management is of great importance. In this paper, we propose a novel routing protocol, Threshold Sensitive Density Controlled Divide and Rule (TSDDR) to prolong network lifetime and stability period. To achieve these targets, we utilize static clustering with threshold aware transmissions. Simulations are done in MATLAB and the results show that our protocol has 60% longer stability period than LEACH [1] and 36% longer stability period than DDR [2]. We also implemented the Uniform Random Model (URM) to find Packet Drop to make our scheme more practical.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125859932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Experimental Study on Crank-Shaped Waveguide in 2D Post Array 二维柱阵曲柄波导的实验研究
Yuting Bao, Huili Chen, Jianming Jin, H. Maeda
Measurement of crank-shaped waveguide in two-dimensional square-lattice post array structure composed of aluminum pillars as well as ceramic pillars was done to investigate its fundamental transmission and reflection characteristics. Resonance in the crank by cavity structure composed of aluminum pillars was measured. To improve the resonant characteristics, a pair of rods situated in the cranked part is replaced by ceramic pillars. The result shows the improved cavity has sharper resonant characteristics.
对由铝柱和陶瓷柱组成的二维方阵柱阵结构中的曲柄波导进行了测量,研究了曲柄波导的基本透射和反射特性。测量了由铝柱组成的空腔结构在曲柄中的共振。为了改善谐振特性,位于曲柄部分的一对杆被陶瓷柱取代。结果表明,改进后的腔具有更清晰的谐振特性。
{"title":"Experimental Study on Crank-Shaped Waveguide in 2D Post Array","authors":"Yuting Bao, Huili Chen, Jianming Jin, H. Maeda","doi":"10.1109/BWCCA.2014.91","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.91","url":null,"abstract":"Measurement of crank-shaped waveguide in two-dimensional square-lattice post array structure composed of aluminum pillars as well as ceramic pillars was done to investigate its fundamental transmission and reflection characteristics. Resonance in the crank by cavity structure composed of aluminum pillars was measured. To improve the resonant characteristics, a pair of rods situated in the cranked part is replaced by ceramic pillars. The result shows the improved cavity has sharper resonant characteristics.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133837198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Alternative Flocking Algorithm with Additional Dynamic Conditions 一种附加动态条件的备选群集算法
Ningping Sun, Y. Tokunaga
Flocking simulates the motion of a flock, which is well known as artificial life algorithms. By using the flocking, we can express the motion of the group such as fishes, birds, or crowded animals in computer graphics. In order to render flocking more realistically, we have devised a method that adds some dynamic conditions into flocking computation. The additional external force and the moving coordinated cameras within the three dimensional space can help us to apply the flocking algorithm into 3DCG system more extendedly and easily. In this paper we provide our algorithm and approaches.
群集模拟了一个群体的运动,这是众所周知的人工生命算法。通过使用群集,我们可以在计算机图形学中表达群体的运动,如鱼、鸟或拥挤的动物。为了使群集更加逼真,我们设计了一种在群集计算中加入一些动态条件的方法。附加的外力和三维空间内移动的协调摄像机可以帮助我们更广泛、更容易地将群集算法应用到3DCG系统中。在本文中,我们给出了我们的算法和方法。
{"title":"An Alternative Flocking Algorithm with Additional Dynamic Conditions","authors":"Ningping Sun, Y. Tokunaga","doi":"10.1109/BWCCA.2014.106","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.106","url":null,"abstract":"Flocking simulates the motion of a flock, which is well known as artificial life algorithms. By using the flocking, we can express the motion of the group such as fishes, birds, or crowded animals in computer graphics. In order to render flocking more realistically, we have devised a method that adds some dynamic conditions into flocking computation. The additional external force and the moving coordinated cameras within the three dimensional space can help us to apply the flocking algorithm into 3DCG system more extendedly and easily. In this paper we provide our algorithm and approaches.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133862865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Erasing the JPEG Compression Artifacts: An Improved Counter-Forensic Algorithm Based on Parameter Adjustment 消除JPEG压缩伪影:一种改进的基于参数调整的反取证算法
Guorui Sheng, Qingtang Su
With the growing awareness of the fraud case for digital images, the researchers have developed some forensic techniques that based on the intrinsic statistical history or trace left by the JPEG compression to determine an image's manipulation. In this letter, we present an improved counter-forensic scheme that based on parameter adjustment. The simulation shows that by using the proposed strategy and combined with the chaotic theory, the scheme can erase the quantization artifacts perfectly, especially when the compression factor Q = 50, the improved algorithm can achieve a better counter-forensic result than the original method.
随着对数字图像欺诈案件的意识日益增强,研究人员开发了一些基于JPEG压缩留下的固有统计历史或痕迹的法医技术来确定图像的操纵。在这封信中,我们提出了一个改进的基于参数调整的反取证方案。仿真结果表明,采用该策略并结合混沌理论,改进算法可以很好地消除量化伪影,特别是当压缩因子Q = 50时,改进算法的反取证效果优于原方法。
{"title":"Erasing the JPEG Compression Artifacts: An Improved Counter-Forensic Algorithm Based on Parameter Adjustment","authors":"Guorui Sheng, Qingtang Su","doi":"10.1109/BWCCA.2014.83","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.83","url":null,"abstract":"With the growing awareness of the fraud case for digital images, the researchers have developed some forensic techniques that based on the intrinsic statistical history or trace left by the JPEG compression to determine an image's manipulation. In this letter, we present an improved counter-forensic scheme that based on parameter adjustment. The simulation shows that by using the proposed strategy and combined with the chaotic theory, the scheme can erase the quantization artifacts perfectly, especially when the compression factor Q = 50, the improved algorithm can achieve a better counter-forensic result than the original method.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130990460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposal of the Relief Supplies Support System at the Time of Large-Scale Natural Disaster 大规模自然灾害时救援物资保障体系的构想
K. Takahagi, Tomoyuki Ishida, Akira Sakuraba, Kaoru Sugita, Noriki Uchida, Y. Shibata
The Great East Japan Earthquake caused catastrophic damage to Iwate Prefecture, Miyagi Prefecture, and Fukushima Prefecture. A lot of relief supplies were sent to these stricken areas from all over the country in case of the Great East Japan Earthquake. However, since the relief supplies accumulation hub got confused by management and sorting work of relief supplies, "the relief supplies shortage and overage problem" arose for every evacuation center. Therefore, in this paper, we propose the "Relief Supplies Support System" for supporting relief supplies management of the disaster countermeasures headquarters at the time of large-scale natural disaster. Distribution of the exact quantity of relief supplies to each evacuation center is realized by this system. Furthermore, visualization of a relief supplies distribution status is realized by utilizing Web-GIS.
东日本大地震对岩手县、宫城县和福岛县造成了灾难性的破坏。在东日本大地震的情况下,大量的救援物资从全国各地送到这些灾区。然而,由于救援物资的管理和整理工作使救援物资积累中心陷入混乱,每个疏散中心都出现了“救援物资短缺和过剩的问题”。因此,本文提出了“救灾物资保障系统”,以支持灾害应对指挥部在发生大规模自然灾害时的救灾物资管理。通过该系统实现了向各个疏散中心准确分配数量的救援物资。利用Web-GIS实现了救灾物资分配状况的可视化。
{"title":"Proposal of the Relief Supplies Support System at the Time of Large-Scale Natural Disaster","authors":"K. Takahagi, Tomoyuki Ishida, Akira Sakuraba, Kaoru Sugita, Noriki Uchida, Y. Shibata","doi":"10.1109/BWCCA.2014.99","DOIUrl":"https://doi.org/10.1109/BWCCA.2014.99","url":null,"abstract":"The Great East Japan Earthquake caused catastrophic damage to Iwate Prefecture, Miyagi Prefecture, and Fukushima Prefecture. A lot of relief supplies were sent to these stricken areas from all over the country in case of the Great East Japan Earthquake. However, since the relief supplies accumulation hub got confused by management and sorting work of relief supplies, \"the relief supplies shortage and overage problem\" arose for every evacuation center. Therefore, in this paper, we propose the \"Relief Supplies Support System\" for supporting relief supplies management of the disaster countermeasures headquarters at the time of large-scale natural disaster. Distribution of the exact quantity of relief supplies to each evacuation center is realized by this system. Furthermore, visualization of a relief supplies distribution status is realized by utilizing Web-GIS.","PeriodicalId":195099,"journal":{"name":"2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122197836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1