首页 > 最新文献

2009 International Conference on Innovations in Information Technology (IIT)最新文献

英文 中文
Usability constraints of grid in ad hoc networks 自组织网络中网格的可用性约束
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413638
Bekim Cilku, A. Grnarov, Alajdin Abazi
The rapid growth of devices that can be connected wirelessly and the high bandwidth communication capacity among these devices makes implementation of Grid services practical in an ad hoc network today. In this paper we have proposed a new layer called Ad Hoc Grid Layer (AHGL) which contains all necessary services to create a grid environment in ad hoc networks. This layer considers the unreliability and resource limited nature of nodes that are part of ad hoc network also. We have also simulated AHGL in NS-2 simulator, and from the gained results we show that the Grid implementation in ad-hoc networks is not always efficient to speed up the process of job execution. Based on this we have also defined some constraints to see when the Grid implementation in ad-hock networks is efficient to be used. This is done by considering the influence of network transmission time in job execution time.
可以无线连接的设备的快速增长以及这些设备之间的高带宽通信能力使得网格服务的实现在当今的自组织网络中变得切实可行。在本文中,我们提出了一个新的层,称为自组织网格层(AHGL),它包含了在自组织网络中创建网格环境所必需的所有服务。该层还考虑了自组织网络中节点的不可靠性和资源有限性。我们还在NS-2模拟器中对AHGL进行了仿真,结果表明,在ad-hoc网络中网格的实现并不总是有效地加快作业执行的过程。在此基础上,我们还定义了一些约束条件,以确定何时可以有效地使用ad-hock网络中的网格实现。考虑了网络传输时间对作业执行时间的影响。
{"title":"Usability constraints of grid in ad hoc networks","authors":"Bekim Cilku, A. Grnarov, Alajdin Abazi","doi":"10.1109/IIT.2009.5413638","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413638","url":null,"abstract":"The rapid growth of devices that can be connected wirelessly and the high bandwidth communication capacity among these devices makes implementation of Grid services practical in an ad hoc network today. In this paper we have proposed a new layer called Ad Hoc Grid Layer (AHGL) which contains all necessary services to create a grid environment in ad hoc networks. This layer considers the unreliability and resource limited nature of nodes that are part of ad hoc network also. We have also simulated AHGL in NS-2 simulator, and from the gained results we show that the Grid implementation in ad-hoc networks is not always efficient to speed up the process of job execution. Based on this we have also defined some constraints to see when the Grid implementation in ad-hock networks is efficient to be used. This is done by considering the influence of network transmission time in job execution time.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121800557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of single-event effects in embedded processors for non-uniform fault tolerant design 嵌入式处理器非均匀容错设计中的单事件效应分析
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413372
F. Firouzi, M. Salehi, A. Azarpeyvand, S. M. Fakhraie, S. Safari
Advances in silicon technology and shrinking the feature size to nanometer scale make unreliability of nano devices the most important concern of fault-tolerant designs. Design of reliable and fault-tolerant embedded processors is mostly based on developing techniques that compensate adding hardware or software redundancy. The recently-proposed redundancy techniques are generally applied uniformly to a system and lead to inefficiencies in terms of performance, power, and area. Non-uniform redundancy requires a quantitative analysis of the system behavior encountering transient faults. In this paper, we introduce a custom fault injection framework that helps to locate the most vulnerable nodes and components of embedded processors. Our framework is based on an exhaustive transient fault injection to candidate nodes which are selected from a user-defined list. Furthermore, the list of nodes containing the microarchitectural state is also defined by user to validate execution of instructions. Based on the reported results, the most vulnerable nodes, components, and instructions are found and could be used for an effective non-uniform fault-tolerant redundancy technique.
硅技术的进步和特征尺寸的缩小使得纳米器件的不可靠性成为容错设计中最重要的问题。可靠和容错嵌入式处理器的设计主要基于开发技术来补偿增加的硬件或软件冗余。最近提出的冗余技术通常被统一应用于一个系统,导致在性能、功率和面积方面效率低下。非均匀冗余要求对系统在遇到暂态故障时的行为进行定量分析。在本文中,我们引入了一个自定义的故障注入框架,以帮助定位嵌入式处理器中最脆弱的节点和组件。我们的框架基于对从用户定义列表中选择的候选节点的穷举瞬时故障注入。此外,用户还定义了包含微体系结构状态的节点列表,以验证指令的执行。根据报告的结果,找到了最易受攻击的节点、组件和指令,并可用于有效的非统一容错冗余技术。
{"title":"Analysis of single-event effects in embedded processors for non-uniform fault tolerant design","authors":"F. Firouzi, M. Salehi, A. Azarpeyvand, S. M. Fakhraie, S. Safari","doi":"10.1109/IIT.2009.5413372","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413372","url":null,"abstract":"Advances in silicon technology and shrinking the feature size to nanometer scale make unreliability of nano devices the most important concern of fault-tolerant designs. Design of reliable and fault-tolerant embedded processors is mostly based on developing techniques that compensate adding hardware or software redundancy. The recently-proposed redundancy techniques are generally applied uniformly to a system and lead to inefficiencies in terms of performance, power, and area. Non-uniform redundancy requires a quantitative analysis of the system behavior encountering transient faults. In this paper, we introduce a custom fault injection framework that helps to locate the most vulnerable nodes and components of embedded processors. Our framework is based on an exhaustive transient fault injection to candidate nodes which are selected from a user-defined list. Furthermore, the list of nodes containing the microarchitectural state is also defined by user to validate execution of instructions. Based on the reported results, the most vulnerable nodes, components, and instructions are found and could be used for an effective non-uniform fault-tolerant redundancy technique.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128053984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Securing Bluetooth-based payment system using honeypot 使用蜜罐保护蓝牙支付系统
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413764
K. Zolfaghar, S. Mohammadi
Wireless technologies provide a new channel for implementation of mobile payments systems. In this regard, the potential of short-range wireless technologies such as Bluetooth is enormous. These systems can be used for proximity payment to vending machines or offering banking service in the bank area. However, unsolved security issues are the biggest barriers to the growth of mobile payment. This paper is focused on the security of banking services which can be offered through Bluetooth technology. We propose a solution using honeypots in bank environment to mitigate the risk of Bluetooth-enabled payment transactions. In this paper, we try to elaborate how honeypot systems can be exploited to reduce the chance of Bluetooth enabled attacks' success by limiting the client device discoverability for attackers.
无线技术为移动支付系统的实现提供了新的渠道。在这方面,像蓝牙这样的短距离无线技术的潜力是巨大的。这些系统可用于自动售货机附近的支付或在银行区域提供银行服务。然而,未解决的安全问题是移动支付发展的最大障碍。本文主要研究通过蓝牙技术提供的银行服务的安全性。我们提出了一种在银行环境中使用蜜罐的解决方案,以降低蓝牙支付交易的风险。在本文中,我们试图详细说明如何利用蜜罐系统通过限制攻击者的客户端设备可发现性来减少启用蓝牙的攻击成功的机会。
{"title":"Securing Bluetooth-based payment system using honeypot","authors":"K. Zolfaghar, S. Mohammadi","doi":"10.1109/IIT.2009.5413764","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413764","url":null,"abstract":"Wireless technologies provide a new channel for implementation of mobile payments systems. In this regard, the potential of short-range wireless technologies such as Bluetooth is enormous. These systems can be used for proximity payment to vending machines or offering banking service in the bank area. However, unsolved security issues are the biggest barriers to the growth of mobile payment. This paper is focused on the security of banking services which can be offered through Bluetooth technology. We propose a solution using honeypots in bank environment to mitigate the risk of Bluetooth-enabled payment transactions. In this paper, we try to elaborate how honeypot systems can be exploited to reduce the chance of Bluetooth enabled attacks' success by limiting the client device discoverability for attackers.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129904586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Network effects on the functionality of voice-controlled systems and applications 网络对语音控制系统和应用程序功能的影响
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413777
Y. Gadallah, Ikbal Taleb
The use of voice to control devices and applications provides a flexible, convenient and secure method for operating these systems. Users can control these systems using voice commands while they are in the proximity of the system to be controlled. Attempting to apply such control over the internet may be affected by several network impairments, e.g. jitter, errors, losses, etc. The effects of these impairments, while may not be felt by the normal human ear, can impact the operation of the software that processes these commands. This processing system is usually based on speaker identification and speech recognition components. In this paper, we study these network effects on the correct operation of such systems. We experiment with different types of network impairments and measure the effects on the voice-controlled operation. Our experiments show that network impairments affect the processing of voice commands to varying degrees. They also provide a comparative view between the behavior of command processing modules and the perceived quality of voice.
使用语音控制设备和应用程序为操作这些系统提供了一种灵活、方便和安全的方法。当用户在待控制系统附近时,可以使用语音命令控制这些系统。试图在互联网上应用这种控制可能会受到一些网络缺陷的影响,例如抖动、错误、丢失等。虽然正常人的耳朵可能感觉不到这些损伤的影响,但它们会影响处理这些命令的软件的操作。这种处理系统通常由说话人识别和语音识别两部分组成。在本文中,我们研究了这些网络效应对这些系统的正确运行的影响。我们对不同类型的网络障碍进行了实验,并测量了对语音控制操作的影响。我们的实验表明,网络障碍对语音命令的处理有不同程度的影响。他们还提供了命令处理模块的行为和语音感知质量之间的比较观点。
{"title":"Network effects on the functionality of voice-controlled systems and applications","authors":"Y. Gadallah, Ikbal Taleb","doi":"10.1109/IIT.2009.5413777","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413777","url":null,"abstract":"The use of voice to control devices and applications provides a flexible, convenient and secure method for operating these systems. Users can control these systems using voice commands while they are in the proximity of the system to be controlled. Attempting to apply such control over the internet may be affected by several network impairments, e.g. jitter, errors, losses, etc. The effects of these impairments, while may not be felt by the normal human ear, can impact the operation of the software that processes these commands. This processing system is usually based on speaker identification and speech recognition components. In this paper, we study these network effects on the correct operation of such systems. We experiment with different types of network impairments and measure the effects on the voice-controlled operation. Our experiments show that network impairments affect the processing of voice commands to varying degrees. They also provide a comparative view between the behavior of command processing modules and the perceived quality of voice.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130818204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An architecture for e-voting systems based on dependable web services 基于可靠web服务的电子投票系统体系结构
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413640
A. Omidi, M. A. Azgomi
The explosion in the use of information technology and widespread use of the Internet makes the countries to utilize the information and communication technologies in order to get their inevitable benefits. Some of these benefits are: accuracy, speed, cost saving and etc. Election and voting is one of the cases, which is recently tended to be performed electronically. Web services, due to their advantages, may have a key role in usage and deployment of e-voting systems. However, employment of web services faces some major dependability and security issues. In this paper, an architecture for e-voting systems based on dependable web services is proposed. The proposed architecture is then modeled using stochastic Petri nets (SPNs), and the reliability and availability measures are evaluated.
信息技术使用的爆炸式增长和互联网的广泛使用,使得各国都必须利用信息通信技术来获得其必然的利益。其中一些好处是:准确性,速度,节省成本等。选举和投票就是其中之一,最近倾向于通过电子方式进行。由于其优势,Web服务可能在电子投票系统的使用和部署中发挥关键作用。然而,使用web服务面临着一些主要的可靠性和安全性问题。本文提出了一种基于可靠web服务的电子投票系统体系结构。然后使用随机Petri网(spn)对所提出的体系结构进行建模,并对可靠性和可用性度量进行评估。
{"title":"An architecture for e-voting systems based on dependable web services","authors":"A. Omidi, M. A. Azgomi","doi":"10.1109/IIT.2009.5413640","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413640","url":null,"abstract":"The explosion in the use of information technology and widespread use of the Internet makes the countries to utilize the information and communication technologies in order to get their inevitable benefits. Some of these benefits are: accuracy, speed, cost saving and etc. Election and voting is one of the cases, which is recently tended to be performed electronically. Web services, due to their advantages, may have a key role in usage and deployment of e-voting systems. However, employment of web services faces some major dependability and security issues. In this paper, an architecture for e-voting systems based on dependable web services is proposed. The proposed architecture is then modeled using stochastic Petri nets (SPNs), and the reliability and availability measures are evaluated.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131073273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Comparison of generality based algorithm variants for automatic taxonomy generation 基于通用性的自动分类法生成算法变体比较
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413365
Andreas Henschel, W. Woon, Thomas Wachter, S. Madnick
We compare a family of algorithms for the automatic generation of taxonomies by adapting the Heymann-algorithm in various ways. The core algorithm determines the generality of terms and iteratively inserts them in a growing taxonomy. Variants of the algorithm are created by altering the way and the frequency, generality of terms is calculated. We analyse the performance and the complexity of the variants combined with a systematic threshold evaluation on a set of seven manually created benchmark sets. As a result, betweenness centrality calculated on unweighted similarity graphs often performs best but requires threshold fine-tuning and is computationally more expensive than closeness centrality. Finally, we show how an entropy-based filter can lead to more precise taxonomies.
我们比较了一个家族的算法自动生成分类法通过适应海曼算法在不同的方式。核心算法确定术语的通用性,并迭代地将它们插入到不断增长的分类法中。该算法的变体是通过改变方式和频率来创建的,计算项的通用性。我们分析了变体的性能和复杂性,并结合了七个手动创建的基准集的系统阈值评估。因此,在未加权的相似图上计算的中间性中心性通常表现最好,但需要阈值微调,并且在计算上比接近性中心性更昂贵。最后,我们将展示基于熵的过滤器如何产生更精确的分类法。
{"title":"Comparison of generality based algorithm variants for automatic taxonomy generation","authors":"Andreas Henschel, W. Woon, Thomas Wachter, S. Madnick","doi":"10.1109/IIT.2009.5413365","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413365","url":null,"abstract":"We compare a family of algorithms for the automatic generation of taxonomies by adapting the Heymann-algorithm in various ways. The core algorithm determines the generality of terms and iteratively inserts them in a growing taxonomy. Variants of the algorithm are created by altering the way and the frequency, generality of terms is calculated. We analyse the performance and the complexity of the variants combined with a systematic threshold evaluation on a set of seven manually created benchmark sets. As a result, betweenness centrality calculated on unweighted similarity graphs often performs best but requires threshold fine-tuning and is computationally more expensive than closeness centrality. Finally, we show how an entropy-based filter can lead to more precise taxonomies.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131120558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
XQPoint: A queriable homomorphic XML compressor 一个可查询的同态XML压缩器
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413789
Baydaa T. Al-Hamadani1, R. Alwan, Joan Lu
XML has becoming the standard way for representing and transforming data over the World Wide Web. The annoying problem with XML documents is that they have a very high ratio of redundancy, which makes these documents storage demanding and require a large network band-width for transmission. To remedy this problem, a lot of approaches had been conducted in order to compress XML documents. Some of these approaches supply querying the compressed documents, while others compress the XML documents for archival purposes. In this paper we propose a new XML compression technique that obeys the structure of the XML documents and provides the ability to querying the compressed document with both content and structure (CAS) queries type. XML elements and attributes names are encoded by using fixed-point dictionary-based technique. Other XML data are organized into special containers according to their path from the root attribute, and the containers are compressed using the same fixed-point technique. Using different types of XML documents and different styles of user queries, the XQPoint has been experimented to test its effectiveness in both the compression ratio and the querying performance.
XML已经成为在万维网上表示和转换数据的标准方式。XML文档的恼人问题是它们具有非常高的冗余比率,这使得这些文档的存储要求很高,并且需要很大的网络带宽进行传输。为了解决这个问题,已经采用了许多方法来压缩XML文档。其中一些方法提供对压缩文档的查询,而另一些方法则压缩XML文档以用于存档。在本文中,我们提出了一种新的XML压缩技术,该技术遵循XML文档的结构,并提供了以内容和结构(CAS)查询类型查询压缩文档的能力。XML元素和属性名通过使用基于定点字典的技术进行编码。其他XML数据根据其从根属性开始的路径组织到特殊的容器中,并且使用相同的定点技术压缩容器。使用不同类型的XML文档和不同样式的用户查询,对XQPoint进行了实验,以测试其在压缩比和查询性能方面的有效性。
{"title":"XQPoint: A queriable homomorphic XML compressor","authors":"Baydaa T. Al-Hamadani1, R. Alwan, Joan Lu","doi":"10.1109/IIT.2009.5413789","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413789","url":null,"abstract":"XML has becoming the standard way for representing and transforming data over the World Wide Web. The annoying problem with XML documents is that they have a very high ratio of redundancy, which makes these documents storage demanding and require a large network band-width for transmission. To remedy this problem, a lot of approaches had been conducted in order to compress XML documents. Some of these approaches supply querying the compressed documents, while others compress the XML documents for archival purposes. In this paper we propose a new XML compression technique that obeys the structure of the XML documents and provides the ability to querying the compressed document with both content and structure (CAS) queries type. XML elements and attributes names are encoded by using fixed-point dictionary-based technique. Other XML data are organized into special containers according to their path from the root attribute, and the containers are compressed using the same fixed-point technique. Using different types of XML documents and different styles of user queries, the XQPoint has been experimented to test its effectiveness in both the compression ratio and the querying performance.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance evaluation of Mobile IPv6 fast Handover 移动IPv6快速切换的性能评估
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413366
Mohamed Alnas, I. Awan, D. Holton
Handover latency is the primary cause of packet loss resulting in performance degradation of the standard Mobile IPv6. Mobile IPv6 with fast Handover enables a Mobile Node (MN) to quickly detect at that IP layer it has moved to a new subnet by receiving link-related information from the link-layer; furthermore it gathers anticipative information about the new Access Point (AP) and the associated subnet prefix when the MN is still connected to the previous Corresponding Node (CN). This paper proposes an enhancement to Fast Mobile IPv6 Handover (FMIPv6), based on link layer information, we also present performance evaluations in terms of the packet loss and Handover latency using evaluation models.
切换延迟是导致丢包导致标准移动IPv6性能下降的主要原因。具有快速切换功能的移动IPv6使移动节点(MN)能够通过接收来自链路层的链路相关信息,在该IP层快速检测到自己已移动到新的子网;此外,当MN仍然连接到先前的对应节点(CN)时,它收集有关新接入点(AP)和相关子网前缀的预期信息。本文提出了基于链路层信息的快速移动IPv6切换(FMIPv6)的改进方案,并利用评估模型对丢包和切换延迟进行了性能评估。
{"title":"Performance evaluation of Mobile IPv6 fast Handover","authors":"Mohamed Alnas, I. Awan, D. Holton","doi":"10.1109/IIT.2009.5413366","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413366","url":null,"abstract":"Handover latency is the primary cause of packet loss resulting in performance degradation of the standard Mobile IPv6. Mobile IPv6 with fast Handover enables a Mobile Node (MN) to quickly detect at that IP layer it has moved to a new subnet by receiving link-related information from the link-layer; furthermore it gathers anticipative information about the new Access Point (AP) and the associated subnet prefix when the MN is still connected to the previous Corresponding Node (CN). This paper proposes an enhancement to Fast Mobile IPv6 Handover (FMIPv6), based on link layer information, we also present performance evaluations in terms of the packet loss and Handover latency using evaluation models.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115828299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new FFT architecture for 4 × 4 MIMO-OFDMA systems with variable symbol lengths 一种新的可变符号长度的4 × 4 MIMO-OFDMA系统FFT架构
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413367
A. Karachalios, K. Nakos, D. Reisis, H. Alnuweiri
We present a new FFT architecture for multi-input multi-output (MIMO) OFDMA wireless systems that require processing variable symbol lengths, ranging from 128 to 2048 complex points. The organization is based on 16 concurrent butterfly processing elements with each element computing a 128-point FFT by implementing an in-place technique. A novel processor-memory interconnection scheme allows the processing elements to operate in sets of k, 1 ≤ k ≤ 16, for completing FFT computations of size 128 × k, up to 2048 points. The architecture scales to support 4 × 4 MIMO-OFDMA operation. An FPGA implementation shows that the proposed organization requires 9995 slices on Xilinx Virtex-4 compared to 21624 slices of four parallel FFT architectures accomplishing the same task.
我们提出了一种新的FFT架构,用于多输入多输出(MIMO) OFDMA无线系统,该系统需要处理可变符号长度,范围从128到2048个复杂点。该组织基于16个并发蝶形处理元素,每个元素通过实现就地技术计算128点FFT。一种新颖的处理器-存储器互连方案允许处理元件在k的集合中操作,1≤k≤16,以完成大小为128 × k的FFT计算,最多可达2048个点。该架构可扩展到支持4 × 4 MIMO-OFDMA操作。FPGA实现表明,所提出的组织在Xilinx Virtex-4上需要9995片,而完成相同任务的四个并行FFT架构需要21624片。
{"title":"A new FFT architecture for 4 × 4 MIMO-OFDMA systems with variable symbol lengths","authors":"A. Karachalios, K. Nakos, D. Reisis, H. Alnuweiri","doi":"10.1109/IIT.2009.5413367","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413367","url":null,"abstract":"We present a new FFT architecture for multi-input multi-output (MIMO) OFDMA wireless systems that require processing variable symbol lengths, ranging from 128 to 2048 complex points. The organization is based on 16 concurrent butterfly processing elements with each element computing a 128-point FFT by implementing an in-place technique. A novel processor-memory interconnection scheme allows the processing elements to operate in sets of k, 1 ≤ k ≤ 16, for completing FFT computations of size 128 × k, up to 2048 points. The architecture scales to support 4 × 4 MIMO-OFDMA operation. An FPGA implementation shows that the proposed organization requires 9995 slices on Xilinx Virtex-4 compared to 21624 slices of four parallel FFT architectures accomplishing the same task.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124389034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Struggling with misbehaviours in trust systems 与信任系统中的不当行为作斗争
Pub Date : 2009-12-15 DOI: 10.1109/IIT.2009.5413765
V. Carchiolo, A. Longheu, M. Malgeri, G. Mangioni
The growing of networks and the success of fully distributed mechanisms and protocols to exchange data - as peer-to-peer networks - emphasise the need of trustworthiness. Usually both trust and reputation are taken into account: the former expresses the direct experience, whereas the latter represents the common opinion of the whole network. Their applicability and usefulness however could become uncertain when some node of the network is fraudulent, i.e. reports false opinion in order to enhance/reduce the reputation of someone else. In this paper we argue an algorithm - that takes inspiration from the secure Eigen-Trust - aiming at reducing the impact of such fraudulent nodes. We report some preliminary results of simulations performed on Advogato and SqueakFoundation datasets.
网络的发展和完全分布式机制和数据交换协议的成功——作为点对点网络——强调了可信度的必要性。通常,信任和声誉都被考虑在内:前者表达了直接的经验,而后者代表了整个网络的共同意见。然而,当网络的某些节点是欺诈性的,即为了提高/降低其他人的声誉而报告错误的意见时,它们的适用性和有用性可能会变得不确定。在本文中,我们提出了一种算法——从安全的Eigen-Trust中获得灵感——旨在减少此类欺诈性节点的影响。我们报告了在Advogato和SqueakFoundation数据集上进行的一些初步模拟结果。
{"title":"Struggling with misbehaviours in trust systems","authors":"V. Carchiolo, A. Longheu, M. Malgeri, G. Mangioni","doi":"10.1109/IIT.2009.5413765","DOIUrl":"https://doi.org/10.1109/IIT.2009.5413765","url":null,"abstract":"The growing of networks and the success of fully distributed mechanisms and protocols to exchange data - as peer-to-peer networks - emphasise the need of trustworthiness. Usually both trust and reputation are taken into account: the former expresses the direct experience, whereas the latter represents the common opinion of the whole network. Their applicability and usefulness however could become uncertain when some node of the network is fraudulent, i.e. reports false opinion in order to enhance/reduce the reputation of someone else. In this paper we argue an algorithm - that takes inspiration from the secure Eigen-Trust - aiming at reducing the impact of such fraudulent nodes. We report some preliminary results of simulations performed on Advogato and SqueakFoundation datasets.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126524889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 International Conference on Innovations in Information Technology (IIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1