首页 > 最新文献

Fourth International Conference on Information Technology (ITNG'07)最新文献

英文 中文
Authority, Deontics and Joint Intentions 权威、义务和共同意图
Pub Date : 2007-04-02 DOI: 10.1109/ITNG.2007.43
Marcus J. Huber, Sanjeev Kumar, Sean A. Lisse, David R. McGee
Many agents are fielded within environments requiring modeling traditional organizational structures such as military hierarchies and corporations, with their associated authority relationships and a strong form of responsibility associated with subordinate agents. Addressing the needs above, we have developed an integrated semantic framework for modeling and operationalizing authority relationships and deontic operators based upon joint intention theory. This allows us to not only regularize the representation and reasoning components of agents with respect to the two aspects of agency but to also realize: improved coordination due to enhanced agent teamwork through the persistence and robustness they exhibit toward successful achievement of goals even in the face of problems; improved conformance of the behavior of each agent according to its organizational role and authority related to other organizational positions; and improved bounding of the behavior of agents when faced with the imposition of deontic operators from various sources
许多代理被部署在需要建模传统组织结构的环境中,例如军事层次结构和公司,以及它们相关的权威关系和与下属代理相关的强形式的责任。为了满足上述需求,我们基于联合意图理论开发了一个集成的语义框架,用于对权威关系和道义算子进行建模和操作。这使我们不仅可以根据代理的两个方面规范代理的表示和推理组件,而且还可以实现:通过他们在面对问题时表现出的持久性和鲁棒性,增强代理团队合作,从而改善协调;提高每个代理人根据其组织角色和与其他组织职位相关的权限的行为一致性;并改进了当面对来自各种来源的道义算子的强加时,agent的行为边界
{"title":"Authority, Deontics and Joint Intentions","authors":"Marcus J. Huber, Sanjeev Kumar, Sean A. Lisse, David R. McGee","doi":"10.1109/ITNG.2007.43","DOIUrl":"https://doi.org/10.1109/ITNG.2007.43","url":null,"abstract":"Many agents are fielded within environments requiring modeling traditional organizational structures such as military hierarchies and corporations, with their associated authority relationships and a strong form of responsibility associated with subordinate agents. Addressing the needs above, we have developed an integrated semantic framework for modeling and operationalizing authority relationships and deontic operators based upon joint intention theory. This allows us to not only regularize the representation and reasoning components of agents with respect to the two aspects of agency but to also realize: improved coordination due to enhanced agent teamwork through the persistence and robustness they exhibit toward successful achievement of goals even in the face of problems; improved conformance of the behavior of each agent according to its organizational role and authority related to other organizational positions; and improved bounding of the behavior of agents when faced with the imposition of deontic operators from various sources","PeriodicalId":198970,"journal":{"name":"Fourth International Conference on Information Technology (ITNG'07)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115141331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Mobile Internet User Behaviors using Qualitative Transition Patterns 基于定性转换模式的移动互联网用户行为分类
Pub Date : 2007-04-02 DOI: 10.1109/ITNG.2007.47
T. Yamakami
The mobile-Internet specific methodology to capture the user behavior characteristics is still on the hot research agenda. Based on an ad hoc assumption that the user loyalty relates to Web visit regularity, the author explores regularity measures to track user behaviors. The author performed a 3-month transition pattern using regular users that visits a Web every month for three months. The author discusses the stability of the measures in the long-term behaviors
研究移动互联网用户行为特征的具体方法仍然是研究的热点。基于用户忠诚度与网络访问频率相关的假设,作者探索了跟踪用户行为的规律性措施。作者使用每月访问Web的普通用户进行了为期3个月的转换模式。作者讨论了这些措施在长期行为中的稳定性
{"title":"Classification of Mobile Internet User Behaviors using Qualitative Transition Patterns","authors":"T. Yamakami","doi":"10.1109/ITNG.2007.47","DOIUrl":"https://doi.org/10.1109/ITNG.2007.47","url":null,"abstract":"The mobile-Internet specific methodology to capture the user behavior characteristics is still on the hot research agenda. Based on an ad hoc assumption that the user loyalty relates to Web visit regularity, the author explores regularity measures to track user behaviors. The author performed a 3-month transition pattern using regular users that visits a Web every month for three months. The author discusses the stability of the measures in the long-term behaviors","PeriodicalId":198970,"journal":{"name":"Fourth International Conference on Information Technology (ITNG'07)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115699662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Vehicle Recognition Using Curvelet Transform and SVM 基于曲波变换和支持向量机的车辆识别
Pub Date : 2007-04-02 DOI: 10.1109/ITNG.2007.205
Farhad Mohamad Kazemi, Saeed Samadi, H. Pourreza, M. Akbarzadeh-Totonchi
This paper proposes the performance of a new algorithm for vehicles recognition system. This recognition system is based on extracted features on the performance of image's curvelet transform and achieving standard deviation of curvelet coefficients matrix in different scales and various orientations. The curvelet transform is a multiscale transform with frame elements indexed by location, scale and orientation parameters, and have time-frequency localization properties of wavelets but also shows a very high degree of directionality and anisotropy. This paper presents the application of three different types of classifiers to the vehicle recognition. They include of support vector machine (one versus one), k nearest-neighbor and support vector machine (one versus all). In addition, the proposed recognition system is obtained by using different scales information as feature vector. So, we could clarify the most important scales in aspect of having useful information. The performed numerical experiments for vehicles recognition have shown the superiority of curvelet and standard deviation preprocessing, which are associated with the support vector machine structure (one versus one). The results of this test show, the right recognition rate of vehicle's model in this recognition system, at the time of using total scales information numbers 3&4 curvelet coefficients matrix is about 99%. We've gathered a data set that includes of 300 images from 5 different classes of vehicles. These 5 classes of vehicles include of: PEUGEOT 206, PEUGEOT 405, Pride, RENAULT55 and Peykan. We've examined 230 pictures as our train data set and 70 pictures as our test data set
本文提出了一种新的车辆识别算法的性能。该识别系统基于提取的特征对图像曲线变换性能的影响,实现曲线系数矩阵在不同尺度和不同方向上的标准差。曲波变换是一种以位置、尺度和方向参数为索引的帧元多尺度变换,具有小波的时频局部化特性,但也表现出非常高的方向性和各向异性。本文介绍了三种不同类型的分类器在车辆识别中的应用。它们包括2个支持向量机(1对1)、k个最近邻和支持向量机(1对所有)。此外,采用不同尺度的信息作为特征向量,得到了该识别系统。因此,我们可以在获得有用信息方面澄清最重要的尺度。车辆识别的数值实验表明,与支持向量机结构(一对一)相关的曲线和标准差预处理具有优越性。测试结果表明,在使用总尺度信息数为3和4的曲线系数矩阵时,该识别系统对车辆模型的识别率约为99%。我们收集了一组数据,包括5种不同类型车辆的300张图片。这5类车型包括:标致206、标致405、普锐特、雷诺55和佩坎。我们检查了230张图片作为我们的火车数据集和70张图片作为我们的测试数据集
{"title":"Vehicle Recognition Using Curvelet Transform and SVM","authors":"Farhad Mohamad Kazemi, Saeed Samadi, H. Pourreza, M. Akbarzadeh-Totonchi","doi":"10.1109/ITNG.2007.205","DOIUrl":"https://doi.org/10.1109/ITNG.2007.205","url":null,"abstract":"This paper proposes the performance of a new algorithm for vehicles recognition system. This recognition system is based on extracted features on the performance of image's curvelet transform and achieving standard deviation of curvelet coefficients matrix in different scales and various orientations. The curvelet transform is a multiscale transform with frame elements indexed by location, scale and orientation parameters, and have time-frequency localization properties of wavelets but also shows a very high degree of directionality and anisotropy. This paper presents the application of three different types of classifiers to the vehicle recognition. They include of support vector machine (one versus one), k nearest-neighbor and support vector machine (one versus all). In addition, the proposed recognition system is obtained by using different scales information as feature vector. So, we could clarify the most important scales in aspect of having useful information. The performed numerical experiments for vehicles recognition have shown the superiority of curvelet and standard deviation preprocessing, which are associated with the support vector machine structure (one versus one). The results of this test show, the right recognition rate of vehicle's model in this recognition system, at the time of using total scales information numbers 3&4 curvelet coefficients matrix is about 99%. We've gathered a data set that includes of 300 images from 5 different classes of vehicles. These 5 classes of vehicles include of: PEUGEOT 206, PEUGEOT 405, Pride, RENAULT55 and Peykan. We've examined 230 pictures as our train data set and 70 pictures as our test data set","PeriodicalId":198970,"journal":{"name":"Fourth International Conference on Information Technology (ITNG'07)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114644895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Super Iterator A design pattern for Algorithm and Data structure collections 一种用于算法和数据结构集合的设计模式
Pub Date : 2007-04-02 DOI: 10.1109/ITNG.2007.188
Andre Oboler, Charles R. Twardy, D. Albrecht
The Super Iterator pattern, like the standard Iterator pattern, traverses an unknown data structure without exposing that structure. With the standard Iterator pattern, clients must create a different iterator for each new structure, and the object returned must be of the specific type stored in the structure, even when they share a common super class. With the Super Iterator pattern, the object returned is of the common super class, and the iterator itself need not be altered when adding a new subtype with custom data structures. The client, however, must change two lines of code to load and instantiate the new subclass
与标准Iterator模式一样,Super Iterator模式遍历未知的数据结构而不暴露该结构。使用标准的Iterator模式,客户端必须为每个新结构创建不同的迭代器,并且返回的对象必须是存储在结构中的特定类型,即使它们共享一个公共超类。使用Super Iterator模式,返回的对象属于公共超类,并且在添加具有自定义数据结构的新子类型时不需要更改迭代器本身。但是,客户端必须更改两行代码来加载和实例化新的子类
{"title":"Super Iterator A design pattern for Algorithm and Data structure collections","authors":"Andre Oboler, Charles R. Twardy, D. Albrecht","doi":"10.1109/ITNG.2007.188","DOIUrl":"https://doi.org/10.1109/ITNG.2007.188","url":null,"abstract":"The Super Iterator pattern, like the standard Iterator pattern, traverses an unknown data structure without exposing that structure. With the standard Iterator pattern, clients must create a different iterator for each new structure, and the object returned must be of the specific type stored in the structure, even when they share a common super class. With the Super Iterator pattern, the object returned is of the common super class, and the iterator itself need not be altered when adding a new subtype with custom data structures. The client, however, must change two lines of code to load and instantiate the new subclass","PeriodicalId":198970,"journal":{"name":"Fourth International Conference on Information Technology (ITNG'07)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117183428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving Mobile Banking Security Using Steganography 利用隐写技术提高手机银行的安全性
Pub Date : 2007-04-02 DOI: 10.1109/ITNG.2007.108
M. Shirali-Shahreza
Upon development of m-commerce as one of the new branches of e-commerce, m-banking has emerged as one of the main divisions of m-commerce. As the m-banking was received very well, it has embarked upon supply of various services based on different systems and with the aid of various services such as the short messaging service (SMS). However, in spite of its advantages, m-banking is facing some challenges as well. One of these challenges is the issue of security of this system. This paper presents a method for increasing security of the information requested by users with the use of steganography method. In this method, instead of direct sending of the information, it is hidden in a picture by the password and is put on a site. Then the address of the picture is sent to the user. After receiving the address of the picture through SMS, the user downloads the picture by a special program. After entering the password, the user can witness the information extracted from the picture if the password is entered correctly. This project is written in J2ME language (Java 2 Micro Edition) and has been implemented on Nokia mobile phones, models N71 and 6680
随着移动电子商务作为电子商务的一个新分支的发展,移动银行已经成为移动电子商务的主要部门之一。由于手机银行受到了很好的欢迎,它已经开始提供基于不同系统的各种服务,并借助各种服务,如短信服务(SMS)。然而,尽管有其优势,移动银行也面临着一些挑战。其中一个挑战是该系统的安全性问题。本文提出了一种利用隐写技术提高用户请求信息安全性的方法。在这种方法中,信息不是直接发送,而是通过密码隐藏在图片中并放在网站上。然后将图片的地址发送给用户。用户通过短信收到图片的地址后,通过专门的程序下载图片。输入密码后,如果密码输入正确,用户可以见证从图片中提取的信息。本项目采用J2ME语言(Java 2 Micro Edition)编写,已在诺基亚手机N71和6680上实现
{"title":"Improving Mobile Banking Security Using Steganography","authors":"M. Shirali-Shahreza","doi":"10.1109/ITNG.2007.108","DOIUrl":"https://doi.org/10.1109/ITNG.2007.108","url":null,"abstract":"Upon development of m-commerce as one of the new branches of e-commerce, m-banking has emerged as one of the main divisions of m-commerce. As the m-banking was received very well, it has embarked upon supply of various services based on different systems and with the aid of various services such as the short messaging service (SMS). However, in spite of its advantages, m-banking is facing some challenges as well. One of these challenges is the issue of security of this system. This paper presents a method for increasing security of the information requested by users with the use of steganography method. In this method, instead of direct sending of the information, it is hidden in a picture by the password and is put on a site. Then the address of the picture is sent to the user. After receiving the address of the picture through SMS, the user downloads the picture by a special program. After entering the password, the user can witness the information extracted from the picture if the password is entered correctly. This project is written in J2ME language (Java 2 Micro Edition) and has been implemented on Nokia mobile phones, models N71 and 6680","PeriodicalId":198970,"journal":{"name":"Fourth International Conference on Information Technology (ITNG'07)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127134175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Topology and Binary Routing Schemes of A PRDT-Based NoC 基于prdt的NoC拓扑结构和二进制路由方案
Pub Date : 2007-04-02 DOI: 10.1109/ITNG.2007.195
Xinming Duan, Yulu Yang, Mei Yang, Lei Li, Yingtao Jiang
In this paper, we present a novel network topology to build an on chip interconnection network. This so called PRDT(2, 1) structure offers a few distinct architectural features, including (i) high scalability, (ii) small diameter and average distance, (iii) reconfigurability with its embedded mesh/torus topology, and (iv) high degree of fault tolerance. Routing in a PRDT(2, 1)-based network can be performed using an efficient and deadlock-free binary routing scheme without using virtual channels. As an extension to this binary routing scheme, we further propose a fully adaptive routing algorithm which is also deadlock-free by using a few virtual channels. Comparisons between the proposed routing algorithms and a vector routing algorithm have been conducted though computer simulations, and the results show that the proposed routing algorithms can achieve better performance than the vector routing algorithm but require significantly less buffers
在本文中,我们提出了一种新的网络拓扑结构来构建片上互连网络。这种所谓的PRDT(2,1)结构提供了一些独特的架构特征,包括(i)高可扩展性,(ii)小直径和平均距离,(iii)嵌入网格/环面拓扑的可重构性,以及(iv)高度的容错性。在基于PRDT(2,1)的网络中,路由可以使用高效且无死锁的二进制路由方案进行,而无需使用虚拟通道。作为该二进制路由方案的扩展,我们进一步提出了一种完全自适应的路由算法,该算法使用少量虚拟通道实现无死锁。通过计算机仿真,将所提出的路由算法与矢量路由算法进行了比较,结果表明,所提出的路由算法比矢量路由算法具有更好的性能,但所需的缓冲区明显减少
{"title":"Topology and Binary Routing Schemes of A PRDT-Based NoC","authors":"Xinming Duan, Yulu Yang, Mei Yang, Lei Li, Yingtao Jiang","doi":"10.1109/ITNG.2007.195","DOIUrl":"https://doi.org/10.1109/ITNG.2007.195","url":null,"abstract":"In this paper, we present a novel network topology to build an on chip interconnection network. This so called PRDT(2, 1) structure offers a few distinct architectural features, including (i) high scalability, (ii) small diameter and average distance, (iii) reconfigurability with its embedded mesh/torus topology, and (iv) high degree of fault tolerance. Routing in a PRDT(2, 1)-based network can be performed using an efficient and deadlock-free binary routing scheme without using virtual channels. As an extension to this binary routing scheme, we further propose a fully adaptive routing algorithm which is also deadlock-free by using a few virtual channels. Comparisons between the proposed routing algorithms and a vector routing algorithm have been conducted though computer simulations, and the results show that the proposed routing algorithms can achieve better performance than the vector routing algorithm but require significantly less buffers","PeriodicalId":198970,"journal":{"name":"Fourth International Conference on Information Technology (ITNG'07)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127214620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Exponentially Aggressive Preservation of Nearly Depleted Nodes for Wireless Sensor Networks 无线传感器网络中几近耗尽节点的指数侵略性保存
Pub Date : 2007-04-02 DOI: 10.1109/ITNG.2007.92
S. Ito, K. Yoshigoe
In this paper, exponentially aggressive preservation of nearly depleted nodes is employed to discourage a node with considerably low residual energy from being selected as a routing node in wireless sensor networks (WSNs). Simulation model shows that geographical and energy aware routing (GEAR) with dynamically adaptive transmission power (DATP) and exponentially aggressive preservation of nearly depleted nodes can send over 65% more packets than the GEAR for both uniform and non-uniform traffic regardless of network size. The exponentially aggressive preservation of nearly depleted node can be applied to various existing energy aware routing protocols to potentially extend the life-spans of WSNs
在无线传感器网络(WSNs)中,采用指数级主动保留接近耗尽节点的方法来阻止剩余能量相当低的节点被选为路由节点。仿真模型表明,地理和能量感知路由(GEAR)具有动态自适应传输功率(DATP)和指数级积极保护近耗尽节点,无论网络大小如何,均匀和非均匀流量都比GEAR多发送65%以上的数据包。近耗尽节点的指数级积极保护可以应用于各种现有的能量感知路由协议,以潜在地延长无线传感器网络的寿命
{"title":"Exponentially Aggressive Preservation of Nearly Depleted Nodes for Wireless Sensor Networks","authors":"S. Ito, K. Yoshigoe","doi":"10.1109/ITNG.2007.92","DOIUrl":"https://doi.org/10.1109/ITNG.2007.92","url":null,"abstract":"In this paper, exponentially aggressive preservation of nearly depleted nodes is employed to discourage a node with considerably low residual energy from being selected as a routing node in wireless sensor networks (WSNs). Simulation model shows that geographical and energy aware routing (GEAR) with dynamically adaptive transmission power (DATP) and exponentially aggressive preservation of nearly depleted nodes can send over 65% more packets than the GEAR for both uniform and non-uniform traffic regardless of network size. The exponentially aggressive preservation of nearly depleted node can be applied to various existing energy aware routing protocols to potentially extend the life-spans of WSNs","PeriodicalId":198970,"journal":{"name":"Fourth International Conference on Information Technology (ITNG'07)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115093327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Dominator Colorings in Bipartite Graphs 二部图中的支配子着色
Pub Date : 2007-04-02 DOI: 10.1109/ITNG.2007.142
Ralucca Gera
A graph has a dominator coloring if it has a proper coloring in which each vertex of the graph dominates every vertex of some color class. The dominator chromatic number Xd(G) is the minimum number of color classes in a dominator coloring of a graph G. In this paper we study the dominator chromatic number for the hypercube, Qn = Qn- times K2 (with Q1 cong P2, n ges 2), and more generally for bipartite graphs. We then conclude it with open questions for further research
如果图具有适当的着色,其中图的每个顶点优于某些颜色类的每个顶点,则图具有支配着色。本文研究了超立方体Qn = Qn- * K2 (Q1 = P2, n = 2)以及更一般的二部图的控制子色数。最后,我们提出一些有待进一步研究的开放性问题
{"title":"On the Dominator Colorings in Bipartite Graphs","authors":"Ralucca Gera","doi":"10.1109/ITNG.2007.142","DOIUrl":"https://doi.org/10.1109/ITNG.2007.142","url":null,"abstract":"A graph has a dominator coloring if it has a proper coloring in which each vertex of the graph dominates every vertex of some color class. The dominator chromatic number <sub>Xd</sub>(G) is the minimum number of color classes in a dominator coloring of a graph G. In this paper we study the dominator chromatic number for the hypercube, Q<sub>n </sub> = Q<sub>n-</sub> times K<sub>2</sub> (with Q<sub>1</sub> cong P<sub>2</sub>, n ges 2), and more generally for bipartite graphs. We then conclude it with open questions for further research","PeriodicalId":198970,"journal":{"name":"Fourth International Conference on Information Technology (ITNG'07)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122953138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Analysis of Time-Based Random Waypoint Mobility Model for Wireless Mobile Networks 无线移动网络基于时间的随机路点移动模型分析
Pub Date : 2007-04-02 DOI: 10.1109/ITNG.2007.38
A. Nayebi, M. Rahimi, H. Sarbazi-Azad
In this paper time-based random waypoint (TBRWP) model is analyzed in detail. Random waypoint model has been studied in mobility literature extensively. Traditional RWP model is based on the independency of the velocity and trajectory; TBR WP, instead, focuses on the independency of motion time and trajectory. Basic model is introduced and general method to evaluate the asymptotical probability density function (PDF) is presented. The model for the one-dimensional and two-dimensional cases with uniform destination distribution in unit square area is solved and exact closed form formulas is obtained. Moreover, normal distribution of nodes in one- and twodimensional models is investigated and practical approximations are derived for them. To verify the obtained results an extensive simulation is performed and tight results are obtained
本文对基于时间的随机路径点(TBRWP)模型进行了详细的分析。随机航路点模型在机动文献中得到了广泛的研究。传统的RWP模型是基于速度和轨迹的独立性;相反,TBR WP侧重于运动时间和轨迹的独立性。介绍了渐近概率密度函数的基本模型,并给出了估计渐近概率密度函数的一般方法。求解了目标均匀分布在单位平方区域的一维和二维情况下的模型,得到了精确的封闭形式公式。此外,研究了一维和二维模型中节点的正态分布,并推导了它们的实用近似。为了验证得到的结果,进行了广泛的仿真,得到了严密的结果
{"title":"Analysis of Time-Based Random Waypoint Mobility Model for Wireless Mobile Networks","authors":"A. Nayebi, M. Rahimi, H. Sarbazi-Azad","doi":"10.1109/ITNG.2007.38","DOIUrl":"https://doi.org/10.1109/ITNG.2007.38","url":null,"abstract":"In this paper time-based random waypoint (TBRWP) model is analyzed in detail. Random waypoint model has been studied in mobility literature extensively. Traditional RWP model is based on the independency of the velocity and trajectory; TBR WP, instead, focuses on the independency of motion time and trajectory. Basic model is introduced and general method to evaluate the asymptotical probability density function (PDF) is presented. The model for the one-dimensional and two-dimensional cases with uniform destination distribution in unit square area is solved and exact closed form formulas is obtained. Moreover, normal distribution of nodes in one- and twodimensional models is investigated and practical approximations are derived for them. To verify the obtained results an extensive simulation is performed and tight results are obtained","PeriodicalId":198970,"journal":{"name":"Fourth International Conference on Information Technology (ITNG'07)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114177825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Incorporating a New Hash Function in OpenPGP and SSL/TLS 在OpenPGP和SSL/TLS中加入一个新的哈希函数
Pub Date : 2007-04-02 DOI: 10.1109/ITNG.2007.109
C. N. Michael, Xiao Su
MD5 and SHA-1 are the most common hash functions used in most security protocols and implementations. However, recent discoveries show that these hash functions are not secure as they should be, which necessitate the need for deploying a new hash function. This implies a number of changes for all major cryptographic protocols. This paper analyzes OpenPGP and SSL/TLS protocols showing all the necessary changes to make the transition to a new hash function
MD5和SHA-1是大多数安全协议和实现中最常用的散列函数。然而,最近的发现表明,这些哈希函数并不像它们应该的那样安全,这就需要部署一个新的哈希函数。这意味着所有主要的加密协议都需要进行一些更改。本文分析了OpenPGP和SSL/TLS协议,展示了向新哈希函数过渡所需的所有更改
{"title":"Incorporating a New Hash Function in OpenPGP and SSL/TLS","authors":"C. N. Michael, Xiao Su","doi":"10.1109/ITNG.2007.109","DOIUrl":"https://doi.org/10.1109/ITNG.2007.109","url":null,"abstract":"MD5 and SHA-1 are the most common hash functions used in most security protocols and implementations. However, recent discoveries show that these hash functions are not secure as they should be, which necessitate the need for deploying a new hash function. This implies a number of changes for all major cryptographic protocols. This paper analyzes OpenPGP and SSL/TLS protocols showing all the necessary changes to make the transition to a new hash function","PeriodicalId":198970,"journal":{"name":"Fourth International Conference on Information Technology (ITNG'07)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129749618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Fourth International Conference on Information Technology (ITNG'07)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1