首页 > 最新文献

Future Generation Communication and Networking (FGCN 2007)最新文献

英文 中文
A Dynamic Network Access Identifier Used for Location Privacy 用于位置隐私的动态网络访问标识符
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.10
C. Wan, A. Hu
Current wireless access authentication mechanisms are mostly based on the network access identifier. It may lead to the location privacy problem. This paper brings out the concept of dynamically generated network access identifier, and gives an example of authentication using the dynamically generated network access identifier. Also this paper proves the security of the authentication procedure using the BAN logic and analyzes the performance of the authentication mechanism based on DNAI.
目前的无线接入认证机制大多基于网络接入标识符。这可能会导致位置隐私问题。提出了动态生成的网络接入标识的概念,并给出了一个使用动态生成的网络接入标识进行认证的实例。本文还利用BAN逻辑证明了认证过程的安全性,并分析了基于dai的认证机制的性能。
{"title":"A Dynamic Network Access Identifier Used for Location Privacy","authors":"C. Wan, A. Hu","doi":"10.1109/FGCN.2007.10","DOIUrl":"https://doi.org/10.1109/FGCN.2007.10","url":null,"abstract":"Current wireless access authentication mechanisms are mostly based on the network access identifier. It may lead to the location privacy problem. This paper brings out the concept of dynamically generated network access identifier, and gives an example of authentication using the dynamically generated network access identifier. Also this paper proves the security of the authentication procedure using the BAN logic and analyzes the performance of the authentication mechanism based on DNAI.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131825297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Alamouti STC through Amplify-Forward Cooperative Relay Network over Nakagami-m Fading Channels Nakagami-m衰落信道上Alamouti STC的前扩协同中继网络性能评价
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.181
S. Atapattu, Nandana Rajatheva
The performance of a cooperative communication wireless network with a single relay system is studied over Nakagami-m fading channels. The simplest Alamouti space-time block code is transmitted through an amplify- and-forward (AF) relay terminal in a two-hop network. The exact symbol error rates (SER) are analyzed using the moment generating function (MGF) of the total signal to noise ratio (SNR) for a particular signal in the case of M-ary phase shift keying (M-PSK) modulation schemes. Subsequently, numerical and simulation results are provided to verify the accuracy of the formulation.
研究了在Nakagami-m衰落信道下具有单中继系统的无线协作通信网络的性能。最简单的Alamouti空时分组码通过两跳网络中的放大转发(AF)中继终端传输。利用总信噪比(SNR)的矩生成函数(MGF)分析了M-ary相移键控(M-PSK)调制方案下特定信号的精确符号误码率(SER)。最后,通过数值和仿真结果验证了该公式的准确性。
{"title":"Performance Evaluation of Alamouti STC through Amplify-Forward Cooperative Relay Network over Nakagami-m Fading Channels","authors":"S. Atapattu, Nandana Rajatheva","doi":"10.1109/FGCN.2007.181","DOIUrl":"https://doi.org/10.1109/FGCN.2007.181","url":null,"abstract":"The performance of a cooperative communication wireless network with a single relay system is studied over Nakagami-m fading channels. The simplest Alamouti space-time block code is transmitted through an amplify- and-forward (AF) relay terminal in a two-hop network. The exact symbol error rates (SER) are analyzed using the moment generating function (MGF) of the total signal to noise ratio (SNR) for a particular signal in the case of M-ary phase shift keying (M-PSK) modulation schemes. Subsequently, numerical and simulation results are provided to verify the accuracy of the formulation.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115326599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Web Anomaly Detection System for Mobile Web Client 面向移动Web客户端的Web异常检测系统
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.232
Sung-Min Jang, Yoo-Hun Won
Careless development of Web applications has often caused occurrence of new Web-based attacks. The signature-based intrusion detection system cannot detect these attacks as it seems to lack the capability to deal with such various new intrusions. As a result, it is necessary to research and develop new types of detection methods that can detect new intrusions as well as protect the system from previous well-known attacks. In this paper, we propose a web anomaly detection system. This system can detect suspicious Web traffic using an HTTP traffic pattern analysis and the URI field information analysis of the HTTP packet. We also demonstrate the feasibility of the proposed system by implementing the system and showing some reasonable results.
Web应用程序的粗心开发经常导致新的基于Web的攻击的发生。基于签名的入侵检测系统无法检测到这些攻击,因为它似乎缺乏处理这些新入侵的能力。因此,有必要研究和开发新型的检测方法,既能检测到新的入侵,又能保护系统免受以前已知的攻击。在本文中,我们提出了一个web异常检测系统。本系统通过HTTP流量模式分析和HTTP报文的URI字段信息分析来检测可疑的Web流量。通过对系统的实际应用,验证了系统的可行性,并给出了一些合理的结果。
{"title":"Web Anomaly Detection System for Mobile Web Client","authors":"Sung-Min Jang, Yoo-Hun Won","doi":"10.1109/FGCN.2007.232","DOIUrl":"https://doi.org/10.1109/FGCN.2007.232","url":null,"abstract":"Careless development of Web applications has often caused occurrence of new Web-based attacks. The signature-based intrusion detection system cannot detect these attacks as it seems to lack the capability to deal with such various new intrusions. As a result, it is necessary to research and develop new types of detection methods that can detect new intrusions as well as protect the system from previous well-known attacks. In this paper, we propose a web anomaly detection system. This system can detect suspicious Web traffic using an HTTP traffic pattern analysis and the URI field information analysis of the HTTP packet. We also demonstrate the feasibility of the proposed system by implementing the system and showing some reasonable results.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114572723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic Call Admission Control for QoS Provisioning in Multimedia Wireless Networks 多媒体无线网络中QoS提供的动态呼叫接纳控制
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.108
G. Kousalya, P. Narayanasamy, J. Park, Y. Kim, Heau-Jo Kang
Next generation wireless networks require guaranteed quality of service (QoS). The proposed dynamic call admission control (DCAC) architecture provides the guaranteed quality of service for real-time and non-real time traffic. DCAC architecture supports future generation wireless networks because it implements a traffic based on different type of call (ToC) with admission control. The bandwidth provisioning model provides bandwidth reallocation and reservation for different ToC. The proposed architecture tries to accomplish the minimum call blocking and handoff dropping rates based on the capacity of the neighboring base stations, current base station and ToC. The system is expected to achieve the required QoS requirements in terms of handoff call dropping probability and new call blocking probability while maintaining efficient bandwidth utilization. The minimal required bandwidth is assigned during the lifetime of high priority calls.
下一代无线网络需要保证服务质量(QoS)。提出的动态呼叫接纳控制(DCAC)体系结构为实时和非实时业务提供了有保证的服务质量。DCAC架构支持下一代无线网络,因为它实现了基于不同类型呼叫(ToC)的流量,并具有准入控制。带宽分配模型为不同的ToC提供带宽的重新分配和预留。所提出的架构尝试基于邻近基站、当前基站和ToC的容量来实现最小的呼叫阻塞和切换丢失率。在保持高效的带宽利用率的同时,期望系统在切换呼叫丢弃概率和新呼叫阻塞概率方面达到所需的QoS要求。在高优先级呼叫的生命周期内分配所需的最小带宽。
{"title":"Dynamic Call Admission Control for QoS Provisioning in Multimedia Wireless Networks","authors":"G. Kousalya, P. Narayanasamy, J. Park, Y. Kim, Heau-Jo Kang","doi":"10.1109/FGCN.2007.108","DOIUrl":"https://doi.org/10.1109/FGCN.2007.108","url":null,"abstract":"Next generation wireless networks require guaranteed quality of service (QoS). The proposed dynamic call admission control (DCAC) architecture provides the guaranteed quality of service for real-time and non-real time traffic. DCAC architecture supports future generation wireless networks because it implements a traffic based on different type of call (ToC) with admission control. The bandwidth provisioning model provides bandwidth reallocation and reservation for different ToC. The proposed architecture tries to accomplish the minimum call blocking and handoff dropping rates based on the capacity of the neighboring base stations, current base station and ToC. The system is expected to achieve the required QoS requirements in terms of handoff call dropping probability and new call blocking probability while maintaining efficient bandwidth utilization. The minimal required bandwidth is assigned during the lifetime of high priority calls.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115910106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Layered Structure and Management in Internet of Things 物联网中的分层结构与管理
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.158
Huansheng Ning, Na Ning, Shenfeng Qu, Yan Zhang, Huiping Yang
The development for Internet of Things and RFID technology is described in this paper. A feasible scheme and layered structure is proposed for Internet of Things. Its management is presented according to the demand for Internet of Things in China. The general system contains two parts: computer information subsystem and RFID terminal subsystem, the latter of which is the main focus. The management protocol for Internet of Things explored in the paper includes SNMP and RFID managing protocol (RFID- MP).
本文介绍了物联网和RFID技术的发展。提出了一种可行的物联网方案和分层结构。它的管理是根据中国物联网的需求提出的。总体系统包括计算机信息子系统和RFID终端子系统两部分,其中RFID终端子系统是重点。本文探讨的物联网管理协议包括SNMP和RFID管理协议(RFID- MP)。
{"title":"Layered Structure and Management in Internet of Things","authors":"Huansheng Ning, Na Ning, Shenfeng Qu, Yan Zhang, Huiping Yang","doi":"10.1109/FGCN.2007.158","DOIUrl":"https://doi.org/10.1109/FGCN.2007.158","url":null,"abstract":"The development for Internet of Things and RFID technology is described in this paper. A feasible scheme and layered structure is proposed for Internet of Things. Its management is presented according to the demand for Internet of Things in China. The general system contains two parts: computer information subsystem and RFID terminal subsystem, the latter of which is the main focus. The management protocol for Internet of Things explored in the paper includes SNMP and RFID managing protocol (RFID- MP).","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122941902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
U-Storage: A New On-line Storage System for Ubiquitous Environment U-Storage:一种面向泛在环境的新型在线存储系统
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.227
Seokil Song, Y. Kwak
In this paper, we propose a new storage system architecture called as U-Storage (ubiquitous storage system). U-Storage allows a user to access an on-line storage with any type of information devices that are able to connect to Internet. The on-line storage is virtualized to the user's information devices as a local hard disk or a memory card by our U-Storage. With devices supporting U-Storage, users can read and write their data anytime and anywhere without downloading and uploading operation.
本文提出了一种新的存储系统架构,称为U-Storage (ubiquitous storage system)。U-Storage允许用户使用能够连接到Internet的任何类型的信息设备访问在线存储。在线存储通过U-Storage虚拟化到用户的信息设备上,作为本地硬盘或存储卡。通过支持U-Storage的设备,用户可以随时随地读写数据,无需下载和上传操作。
{"title":"U-Storage: A New On-line Storage System for Ubiquitous Environment","authors":"Seokil Song, Y. Kwak","doi":"10.1109/FGCN.2007.227","DOIUrl":"https://doi.org/10.1109/FGCN.2007.227","url":null,"abstract":"In this paper, we propose a new storage system architecture called as U-Storage (ubiquitous storage system). U-Storage allows a user to access an on-line storage with any type of information devices that are able to connect to Internet. The on-line storage is virtualized to the user's information devices as a local hard disk or a memory card by our U-Storage. With devices supporting U-Storage, users can read and write their data anytime and anywhere without downloading and uploading operation.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122725119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study of Spam and Spam Vulnerable email Accounts 垃圾邮件和易受垃圾邮件攻击的电子邮件账户的实证研究
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.61
B. Dhinakaran, Cheol-Joo Chae, Jae-Kwang Lee
Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread malware. Our goal is to present a definite figure about the characteristics of spam and spam vulnerable email accounts. These evaluations help us to enhance the existing technology to combat spam effectively. We collected 400 thousand spam mails from a spam trap set up in a corporate mail server for a period of 14 months form January 2006 to February 2007. Spammers use common techniques to spam end users regardless of corporate server and public mail server. So we believe that our spam collection is a sample of world wide spam traffic. Studying the characteristics of this sample helps us to better understand the features of spam and spam vulnerable e-mail accounts. We believe that this analysis is highly useful to develop more efficient anti spam techniques. In our analysis we classified spam based on attachment and contents. According to our study the four years old heavy users email accounts attract more spam than four years old light users mail accounts. The 14 months old relatively new email accounts don't receive spam. In some special cases like DDoS attacks, the new email accounts receive spam. During DDoS attack 14 months old heavy users email accounts have attracted more number of spam than 14 months old light users mail accounts.
垃圾邮件扰乱用户的收件箱,消耗网络资源,并建立DDoS攻击,传播恶意软件。我们的目标是提出一个明确的数字关于垃圾邮件和垃圾邮件易受攻击的电子邮件帐户的特点。这些评估有助于我们加强现有的技术,有效地打击垃圾邮件。在2006年1月至2007年2月的14个月期间,我们从公司邮件服务器上设置的垃圾邮件陷阱中收集了40万封垃圾邮件。垃圾邮件发送者使用通用技术向终端用户发送垃圾邮件,而不考虑公司服务器和公共邮件服务器。因此,我们相信我们的垃圾邮件收集是全球垃圾邮件流量的一个样本。研究此样本的特征有助于我们更好地理解垃圾邮件和易受垃圾邮件攻击的电子邮件帐户的特征。我们相信这种分析对开发更有效的反垃圾邮件技术非常有用。在我们的分析中,我们根据附件和内容对垃圾邮件进行分类。根据我们的研究,4岁的重度用户的电子邮件帐户比4岁的轻度用户的电子邮件帐户吸引更多的垃圾邮件。14个月大的相对较新的电子邮件帐户不会收到垃圾邮件。在一些特殊情况下,如DDoS攻击,新的电子邮件帐户收到垃圾邮件。在DDoS攻击期间,14个月的重度用户的电子邮件帐户比14个月的轻度用户的电子邮件帐户吸引了更多的垃圾邮件。
{"title":"An Empirical Study of Spam and Spam Vulnerable email Accounts","authors":"B. Dhinakaran, Cheol-Joo Chae, Jae-Kwang Lee","doi":"10.1109/FGCN.2007.61","DOIUrl":"https://doi.org/10.1109/FGCN.2007.61","url":null,"abstract":"Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread malware. Our goal is to present a definite figure about the characteristics of spam and spam vulnerable email accounts. These evaluations help us to enhance the existing technology to combat spam effectively. We collected 400 thousand spam mails from a spam trap set up in a corporate mail server for a period of 14 months form January 2006 to February 2007. Spammers use common techniques to spam end users regardless of corporate server and public mail server. So we believe that our spam collection is a sample of world wide spam traffic. Studying the characteristics of this sample helps us to better understand the features of spam and spam vulnerable e-mail accounts. We believe that this analysis is highly useful to develop more efficient anti spam techniques. In our analysis we classified spam based on attachment and contents. According to our study the four years old heavy users email accounts attract more spam than four years old light users mail accounts. The 14 months old relatively new email accounts don't receive spam. In some special cases like DDoS attacks, the new email accounts receive spam. During DDoS attack 14 months old heavy users email accounts have attracted more number of spam than 14 months old light users mail accounts.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125165699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Novel 3-5GHz Distributed Amplifier Structure Based Matched Filter for UWB Receiver 一种基于匹配滤波器的超宽带接收机3-5GHz分布式放大器结构
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.26
Jisu Jiang, C. Law, Chao Fang
Matched filter is an important component in the Ultra wideband front-end of receiver. This paper proposed an analogue matched filter for 6th -order Gaussian derivative pulse in 3-5 GHz UWB receiver by using pHEMT technology. Simulation results confirm the matched filter function and achieve 11 dB in amplitude gain with 7.4 dB signal-to-noise ratio improvement. The power consumption of the matched filter is 62 mW with a 3-V power supply.
匹配滤波器是接收机超宽带前端的重要组成部分。提出了一种基于pHEMT技术的3- 5ghz UWB接收机六阶高斯导数脉冲模拟匹配滤波器。仿真结果证实了滤波器的功能匹配,实现了11 dB的幅值增益,信噪比提高了7.4 dB。匹配滤波器的功耗为62 mW,电源为3v。
{"title":"A Novel 3-5GHz Distributed Amplifier Structure Based Matched Filter for UWB Receiver","authors":"Jisu Jiang, C. Law, Chao Fang","doi":"10.1109/FGCN.2007.26","DOIUrl":"https://doi.org/10.1109/FGCN.2007.26","url":null,"abstract":"Matched filter is an important component in the Ultra wideband front-end of receiver. This paper proposed an analogue matched filter for 6th -order Gaussian derivative pulse in 3-5 GHz UWB receiver by using pHEMT technology. Simulation results confirm the matched filter function and achieve 11 dB in amplitude gain with 7.4 dB signal-to-noise ratio improvement. The power consumption of the matched filter is 62 mW with a 3-V power supply.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116027857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Role of Annotation in Electronic Process Guide (EPG) 注释在电子工艺指南(EPG)中的作用
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.196
A. Ibrahim, Ho‐Jin Choi
Annotations play a major part in our daily life. Similarly electronic process guide or EPG plays an important role in software development in an organization. An EPG can guide the developers about the process used or followed in an environment. The paper describes the annotation in electronic process guide for developers. We first introduced the background of the topic and some of the related researched done in the area of annotation systems. Some of the annotation systems for the Web are available either free or commercially. We then focus on the literature survey on the use of annotation tools and technique in different areas along with the usage of EPG in different scenarios. We also focus on Web based annotation for Jasmine EPG and conclusion is given with the future work.
注释在我们的日常生活中扮演着重要的角色。类似地,电子过程指南或EPG在组织的软件开发中起着重要的作用。EPG可以指导开发人员在环境中使用或遵循的过程。本文介绍了开发人员电子流程指南中的注释。我们首先介绍了选题的背景以及在标注系统领域所做的一些相关研究。Web上的一些注释系统是免费的或有商业价值的。然后,我们重点介绍了在不同领域使用标注工具和技术的文献综述,以及EPG在不同场景中的使用情况。本文还对茉莉EPG的Web标注进行了研究,并对今后的工作进行了总结。
{"title":"Role of Annotation in Electronic Process Guide (EPG)","authors":"A. Ibrahim, Ho‐Jin Choi","doi":"10.1109/FGCN.2007.196","DOIUrl":"https://doi.org/10.1109/FGCN.2007.196","url":null,"abstract":"Annotations play a major part in our daily life. Similarly electronic process guide or EPG plays an important role in software development in an organization. An EPG can guide the developers about the process used or followed in an environment. The paper describes the annotation in electronic process guide for developers. We first introduced the background of the topic and some of the related researched done in the area of annotation systems. Some of the annotation systems for the Web are available either free or commercially. We then focus on the literature survey on the use of annotation tools and technique in different areas along with the usage of EPG in different scenarios. We also focus on Web based annotation for Jasmine EPG and conclusion is given with the future work.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124238930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive Application-specific Cooperative Relay for Wireless Video Sensor Networks 无线视频传感器网络的自适应应用协同中继
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.49
Xiaoli Wang, Daqing Gu, Tao Shu
In this paper, we propose an adaptive application-specific cooperative relaying mechanism for delivering layered coded multimedia data over wireless sensor networks. The proposed approach is to optimally map source data layers of different perceptual importance to relay nodes, so that the most important data layer can be transmitted in high quality. Each relay node only needs to detect and forward the assigned sub-streams (layers) of multimedia data. The distinctive benefit of this approach is to minimize the video distortion induced by buffer overflow and delay violation, while reducing transmission processing requirements on each relay node and providing significant savings in transmit and receive energy. Experimental results show that, compared with other cooperative methods, the proposed algorithm achieves significant performance improvement.
在本文中,我们提出了一种自适应特定应用的协作中继机制,用于在无线传感器网络上传输分层编码多媒体数据。该方法将不同感知重要度的源数据层最优映射到中继节点上,使最重要的数据层能够高质量地传输。每个中继节点只需要检测和转发指定的多媒体数据子流(层)。这种方法的独特优点是最大限度地减少了由缓冲区溢出和延迟冲突引起的视频失真,同时减少了每个中继节点的传输处理要求,并大大节省了发送和接收能量。实验结果表明,与其他协作方法相比,该算法的性能得到了显著提高。
{"title":"Adaptive Application-specific Cooperative Relay for Wireless Video Sensor Networks","authors":"Xiaoli Wang, Daqing Gu, Tao Shu","doi":"10.1109/FGCN.2007.49","DOIUrl":"https://doi.org/10.1109/FGCN.2007.49","url":null,"abstract":"In this paper, we propose an adaptive application-specific cooperative relaying mechanism for delivering layered coded multimedia data over wireless sensor networks. The proposed approach is to optimally map source data layers of different perceptual importance to relay nodes, so that the most important data layer can be transmitted in high quality. Each relay node only needs to detect and forward the assigned sub-streams (layers) of multimedia data. The distinctive benefit of this approach is to minimize the video distortion induced by buffer overflow and delay violation, while reducing transmission processing requirements on each relay node and providing significant savings in transmit and receive energy. Experimental results show that, compared with other cooperative methods, the proposed algorithm achieves significant performance improvement.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128971289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Future Generation Communication and Networking (FGCN 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1