This research attempts to analyze the attention effects of PPL, which is being acclaimed as the new beneficiary model in multimedia, appearing on the screen of multimedia contents. For the purpose of analysis, the screen of multimedia contents was divided into 9 squares and in each of the square area a number image or a brand image was placed. 105 subjects participated in the questionnaire and their responses were analyzed to find out how the exposure types and locations of images on the screen affect attention effects. As the results of the analysis showed, the subjects reported paying the highest attention to the square 5, the center area of the screen, regardless of contents of the message. The respondents preferred moving image to stationary image and were more attentive on a certain area on which extra emphasis was put. The research results may help finding out the optimal place for the message on the screen and also the best exposure type.
{"title":"The Analysis of PPL Attention Effects in the Screen of Multimedia Contents","authors":"Young Jae Lee, Y. Lee","doi":"10.1109/FGCN.2007.211","DOIUrl":"https://doi.org/10.1109/FGCN.2007.211","url":null,"abstract":"This research attempts to analyze the attention effects of PPL, which is being acclaimed as the new beneficiary model in multimedia, appearing on the screen of multimedia contents. For the purpose of analysis, the screen of multimedia contents was divided into 9 squares and in each of the square area a number image or a brand image was placed. 105 subjects participated in the questionnaire and their responses were analyzed to find out how the exposure types and locations of images on the screen affect attention effects. As the results of the analysis showed, the subjects reported paying the highest attention to the square 5, the center area of the screen, regardless of contents of the message. The respondents preferred moving image to stationary image and were more attentive on a certain area on which extra emphasis was put. The research results may help finding out the optimal place for the message on the screen and also the best exposure type.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129631501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taketoshi Mori, C. Siridanupath, H. Noguchi, Tomomasa Sato
In this paper, we proposed the object location estimation method in sensor-embedded environment using active Radio Frequency Identification (RFID) technology. Based on the proposed method, we have developed the indoor object management system, which provides users with three main functionalities: the ability to access and manage targeted objects in the environment, real-timely monitor their locations, record and later search the particular information from historical database. The estimation of object's location is based on the analysis of RF signal strength retrieved from RFID system and position tracking of a person in the room using floor-distributed pressure sensors. The experiment result has shown that the integration of sensors significantly reduce the effects from external interferences in the analysis of RF signal strength, and improve the accuracy of object location sensing.
{"title":"Active RFID-Based Object Management System in Sensor-Embedded Environment","authors":"Taketoshi Mori, C. Siridanupath, H. Noguchi, Tomomasa Sato","doi":"10.1109/FGCN.2007.48","DOIUrl":"https://doi.org/10.1109/FGCN.2007.48","url":null,"abstract":"In this paper, we proposed the object location estimation method in sensor-embedded environment using active Radio Frequency Identification (RFID) technology. Based on the proposed method, we have developed the indoor object management system, which provides users with three main functionalities: the ability to access and manage targeted objects in the environment, real-timely monitor their locations, record and later search the particular information from historical database. The estimation of object's location is based on the analysis of RF signal strength retrieved from RFID system and position tracking of a person in the room using floor-distributed pressure sensors. The experiment result has shown that the integration of sensors significantly reduce the effects from external interferences in the analysis of RF signal strength, and improve the accuracy of object location sensing.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130044210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the Internet's rapid development, government agencies and other private companies are setting up websites for providing information and marketing. However, computer viruses and hackers are omnipresent on Internet. The injection attacks grew exponentially recently. SQL Injection, ASP Injection, PHP Injection are methods of attacks used. The nation's largest Blog website "Wretch" and the international largest friend's community website "MySpace" were attacked in recent years by Cross-Site Script (XSS) attacks. In this paper, we provide a scheme to know how to collect evidence after suffering XSS attacks from network systems. Furthermore, we give the management strategies to prevent XSS attacks from network intrusions.
{"title":"Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions","authors":"Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang","doi":"10.1109/FGCN.2007.156","DOIUrl":"https://doi.org/10.1109/FGCN.2007.156","url":null,"abstract":"With the Internet's rapid development, government agencies and other private companies are setting up websites for providing information and marketing. However, computer viruses and hackers are omnipresent on Internet. The injection attacks grew exponentially recently. SQL Injection, ASP Injection, PHP Injection are methods of attacks used. The nation's largest Blog website \"Wretch\" and the international largest friend's community website \"MySpace\" were attacked in recent years by Cross-Site Script (XSS) attacks. In this paper, we provide a scheme to know how to collect evidence after suffering XSS attacks from network systems. Furthermore, we give the management strategies to prevent XSS attacks from network intrusions.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132423691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a cross-layer approach introducing new design parameters is developed for multi-rate wireless links. The novel design jointly exploits the finite-length queuing at the data link layer and the adaptation capability of the adaptive modulation and coding (AMC) scheme at the physical layer to optimize system performance for a wireless link. The analytical framework is based on discrete time Markov chain. The performance metrics such as packet drop probability, channel packet error rate and packet loss rate are derived. Using these metrics, a constrained optimization problem is solved numerically to maximize the overall system throughput.
{"title":"A New Cross Layer Design of Adaptive Modulation and Coding in Finite Buffer Wireless Links","authors":"Abouzar Ghavami, Farid Ashtiani","doi":"10.1109/FGCN.2007.22","DOIUrl":"https://doi.org/10.1109/FGCN.2007.22","url":null,"abstract":"In this paper, a cross-layer approach introducing new design parameters is developed for multi-rate wireless links. The novel design jointly exploits the finite-length queuing at the data link layer and the adaptation capability of the adaptive modulation and coding (AMC) scheme at the physical layer to optimize system performance for a wireless link. The analytical framework is based on discrete time Markov chain. The performance metrics such as packet drop probability, channel packet error rate and packet loss rate are derived. Using these metrics, a constrained optimization problem is solved numerically to maximize the overall system throughput.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130239702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Road transportation systems are traditionally characterized by how efficient they direct traffic in a non-congested manner towards their destinations. Improvement in car electronics, sensors, and navigation systems all help in realizing this goal of "destination-driven" and "no-hassle" driving. With the advent of wireless communications and networking technologies, the future transportation highway would be one that is "information-driven" and "wirelessly- enabled". In this paper, several potential applications of car-to-car networking are revealed and discussed.
{"title":"Future Application Scenarios for MANET-Based Intelligent Transportation Systems","authors":"C. Toh","doi":"10.1109/FGCN.2007.131","DOIUrl":"https://doi.org/10.1109/FGCN.2007.131","url":null,"abstract":"Road transportation systems are traditionally characterized by how efficient they direct traffic in a non-congested manner towards their destinations. Improvement in car electronics, sensors, and navigation systems all help in realizing this goal of \"destination-driven\" and \"no-hassle\" driving. With the advent of wireless communications and networking technologies, the future transportation highway would be one that is \"information-driven\" and \"wirelessly- enabled\". In this paper, several potential applications of car-to-car networking are revealed and discussed.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125502080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cell sectorization and improvement of the Ec/Io are technologies to offer good quality of services (QoS) and coverage for new and sophisticated power control to achieve high capacity in CDMA cellular mobile communication networks. In this paper, in order to efficient cell sector and to improve the Ec/Io of the pilot channel in CDMA mobile communication systems, I analyze and compare the wide- beam three sector cell (WTSC) with the narrow-beam three sector cell (NTSC) as a method for cell sectorization. The NTSC method was compared with the WTSC method, using the results of both a theoretical analysis and a simulation, in order to examine its effectiveness and validity. As a result, I confirm that efficient cell sector method to minimize interference from adjacent base stations and to increase cell coverage.
{"title":"A Study on the Cell Sectorization Using the Wide-beam and Narrow-beam for CDMA Mobile Communication Systems","authors":"Dong-You Choi, J. Park","doi":"10.1109/FGCN.2007.42","DOIUrl":"https://doi.org/10.1109/FGCN.2007.42","url":null,"abstract":"Cell sectorization and improvement of the Ec/Io are technologies to offer good quality of services (QoS) and coverage for new and sophisticated power control to achieve high capacity in CDMA cellular mobile communication networks. In this paper, in order to efficient cell sector and to improve the Ec/Io of the pilot channel in CDMA mobile communication systems, I analyze and compare the wide- beam three sector cell (WTSC) with the narrow-beam three sector cell (NTSC) as a method for cell sectorization. The NTSC method was compared with the WTSC method, using the results of both a theoretical analysis and a simulation, in order to examine its effectiveness and validity. As a result, I confirm that efficient cell sector method to minimize interference from adjacent base stations and to increase cell coverage.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122192684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We present in this paper an analytical model that accounts for the back-off suspension in DCF mode while evaluating delay performance of IEEE 802.11 MAC layer. Our work is based on the Bianchi's model where the performance of 802.11 MAC layer is computed using a discrete time Markov chain. The contribution of this work is to take the back-off suspensions into considerations and derive a more accurate delay analysis model of the IEEE 802.11 MAC protocol based on Markov model. We evaluate our analysis model through simulation compared to P. Chatzimisios' model. Simulation result shows that without considering the back-off suspension as specified in the current standard, current major models have super-estimated the saturation delay performance of the IEEE 802.11 MAC protocol, especially when the number of stations in a basic service set is increasing.
{"title":"Delay Analysis of IEEE 802.11 DCF with Back-off Suspension","authors":"Guolin Sun, Bo Hu","doi":"10.1109/FGCN.2007.95","DOIUrl":"https://doi.org/10.1109/FGCN.2007.95","url":null,"abstract":"We present in this paper an analytical model that accounts for the back-off suspension in DCF mode while evaluating delay performance of IEEE 802.11 MAC layer. Our work is based on the Bianchi's model where the performance of 802.11 MAC layer is computed using a discrete time Markov chain. The contribution of this work is to take the back-off suspensions into considerations and derive a more accurate delay analysis model of the IEEE 802.11 MAC protocol based on Markov model. We evaluate our analysis model through simulation compared to P. Chatzimisios' model. Simulation result shows that without considering the back-off suspension as specified in the current standard, current major models have super-estimated the saturation delay performance of the IEEE 802.11 MAC protocol, especially when the number of stations in a basic service set is increasing.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"35 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116536226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The ipv6 security architecture, IPSec, plays a positive role in the protection of IPv6 networks. To some special attacks, especially DDoS attacks, IPSec appears relatively weak, because IPSec can only defend against DDoS attacks that spoof their source addresses. In cases where attackers launch DDoS attacks with their real identity, IPSec is helpless. This paper proposes a link signature based DDoS attacker tracing algorithm. It can immediately reconstruct the entire attack path after suffering a DDoS attack whether or not the source addresses are spoofed. To verify the validity of our algorithm, we implemented it under a simulated IPv6 environment with the OMNeT++ IPv6Suite.
{"title":"A Link Signature Based DDoS Attacker Tracing Algorithm under IPv6","authors":"Xinyu Yang, Ting Ma","doi":"10.1109/FGCN.2007.15","DOIUrl":"https://doi.org/10.1109/FGCN.2007.15","url":null,"abstract":"The ipv6 security architecture, IPSec, plays a positive role in the protection of IPv6 networks. To some special attacks, especially DDoS attacks, IPSec appears relatively weak, because IPSec can only defend against DDoS attacks that spoof their source addresses. In cases where attackers launch DDoS attacks with their real identity, IPSec is helpless. This paper proposes a link signature based DDoS attacker tracing algorithm. It can immediately reconstruct the entire attack path after suffering a DDoS attack whether or not the source addresses are spoofed. To verify the validity of our algorithm, we implemented it under a simulated IPv6 environment with the OMNeT++ IPv6Suite.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121813886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The necessity to secure the communication between wireless sensor networks nodes becomes important with the system nodes are being deployed for a wide variety of applications. In this paper, we propose a new approach for session key management among group sensor nodes. We use initial trust node to build a small set of shared keys, low-cost protocols enable neighboring sensors to authenticate and establish secure local links. Each shared key used only once after the set of shared keys are built. Our session scheme exhibits a nice power efficient and excellent updating communications keys. At the same time our scheme updating keys go with exchanging message. Extensive analyses and simulations are conducted to evaluate the proposed schemes, and the results show that the proposed management schemes can achieve a good level of security.
{"title":"Lightweight Session Key Management Scheme in Sensor Networks","authors":"Huishang Jin, Haiguang Chen","doi":"10.1109/FGCN.2007.159","DOIUrl":"https://doi.org/10.1109/FGCN.2007.159","url":null,"abstract":"The necessity to secure the communication between wireless sensor networks nodes becomes important with the system nodes are being deployed for a wide variety of applications. In this paper, we propose a new approach for session key management among group sensor nodes. We use initial trust node to build a small set of shared keys, low-cost protocols enable neighboring sensors to authenticate and establish secure local links. Each shared key used only once after the set of shared keys are built. Our session scheme exhibits a nice power efficient and excellent updating communications keys. At the same time our scheme updating keys go with exchanging message. Extensive analyses and simulations are conducted to evaluate the proposed schemes, and the results show that the proposed management schemes can achieve a good level of security.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124940097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kyung-Yup Kim, John-Tark Lee, Dong-Kuk Yu, Young-Sik Park
In this paper, a noisy passive telemetry sensor system using Unscented Kalman Filter (UKF) is proposed. To overcome these trouble problems such as a power limitation and a estimation complexity that the general passive telemetry sensor system including IC chip has, the principle of inductive coupling was applied to the modelling of a passive telemetry sensor system (PTSS) and its noisy capacitive parameter was estimated by the UKF algorithm. Specially, to show the effective tracking performance of the UKF, we compared with the tracking performance of Recursive Least Square Estimation (RLSE) using linearization.
{"title":"Parameter Estimation of Noisy Passive Telemetry Sensor System Using Unscented Kalman Filter","authors":"Kyung-Yup Kim, John-Tark Lee, Dong-Kuk Yu, Young-Sik Park","doi":"10.1109/FGCN.2007.176","DOIUrl":"https://doi.org/10.1109/FGCN.2007.176","url":null,"abstract":"In this paper, a noisy passive telemetry sensor system using Unscented Kalman Filter (UKF) is proposed. To overcome these trouble problems such as a power limitation and a estimation complexity that the general passive telemetry sensor system including IC chip has, the principle of inductive coupling was applied to the modelling of a passive telemetry sensor system (PTSS) and its noisy capacitive parameter was estimated by the UKF algorithm. Specially, to show the effective tracking performance of the UKF, we compared with the tracking performance of Recursive Least Square Estimation (RLSE) using linearization.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122493845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}