Theorists agree that embedded mobile database are an interesting new topic in the field of theory, and leading analysts concur. In our research, we confirm the implementation of embedded mobile database based on mobile agent, which embodies the confusing principles of mobile database. In order to achieve this aim, we use virtual modalities (HURLER) to validate that the acclaimed concurrent algorithm for the embedded mobile database based on mobile agent.
{"title":"Implementation of Embedded Mobile Database Based on Mobile Agent","authors":"Yan Yu, Jian-Hua Wang","doi":"10.1109/ICCSN.2010.80","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.80","url":null,"abstract":"Theorists agree that embedded mobile database are an interesting new topic in the field of theory, and leading analysts concur. In our research, we confirm the implementation of embedded mobile database based on mobile agent, which embodies the confusing principles of mobile database. In order to achieve this aim, we use virtual modalities (HURLER) to validate that the acclaimed concurrent algorithm for the embedded mobile database based on mobile agent.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"72 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116657871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a new channel estimation method for IEEE802.11a and HIPERLAN/2 wireless LANs. Based on the frequency coherence of the channel for wireless LANs, the absent frequency channel responds at virtual subcarriers and DC subcarrier are reconstructed by linear interpolation firstly, then channel estimation with time domain truncation is fulfilled. Simulation results show that the proposed method achieves a slightly better performance than the conventional iterative method and LS method while keeping less complexity.
{"title":"A Low-Complexity Channel Estimation Method for IEEE802.11a and HIPERLAN/2 WLANs","authors":"Feng Shi, Dengpeng Hu, E. Zhang","doi":"10.1109/ICCSN.2010.101","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.101","url":null,"abstract":"In this paper, we propose a new channel estimation method for IEEE802.11a and HIPERLAN/2 wireless LANs. Based on the frequency coherence of the channel for wireless LANs, the absent frequency channel responds at virtual subcarriers and DC subcarrier are reconstructed by linear interpolation firstly, then channel estimation with time domain truncation is fulfilled. Simulation results show that the proposed method achieves a slightly better performance than the conventional iterative method and LS method while keeping less complexity.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125108108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For improving throughput and energy efficiency in wireless sensor networks, multi-channel media access control has been proposed. Existing multi-channel MAC protocols are mainly focus on channel assignment and media access, it means that a senor node is bound with one channel, which makes the whole network inflexible and cannot be adapted to the variations of environment. In this paper, we proposed a Dynamic Multi-radio Multi-channel media Access control (DMMA) for wireless sensor networks, it can chose the channel dynamically according to the changing of spectrum environment, and make the network more robust to the interferences from external surroundings, meanwhile, take into account the energy efficiency, DMMA use a sleeping-based mechanism to reduce energy consumption. We also invent an ARM9 based four radios wireless sensor node to evaluate our solution on a real sensor network. Through our experiments, DMMA can avoid the impact of interference effectively, and also it achieves good fairness for multiple channel access.
{"title":"A Dynamic Multi-radio Multi-channel MAC Protocol for Wireless Sensor Networks","authors":"Zhiwu Liu, Wei Wu","doi":"10.1109/ICCSN.2010.19","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.19","url":null,"abstract":"For improving throughput and energy efficiency in wireless sensor networks, multi-channel media access control has been proposed. Existing multi-channel MAC protocols are mainly focus on channel assignment and media access, it means that a senor node is bound with one channel, which makes the whole network inflexible and cannot be adapted to the variations of environment. In this paper, we proposed a Dynamic Multi-radio Multi-channel media Access control (DMMA) for wireless sensor networks, it can chose the channel dynamically according to the changing of spectrum environment, and make the network more robust to the interferences from external surroundings, meanwhile, take into account the energy efficiency, DMMA use a sleeping-based mechanism to reduce energy consumption. We also invent an ARM9 based four radios wireless sensor node to evaluate our solution on a real sensor network. Through our experiments, DMMA can avoid the impact of interference effectively, and also it achieves good fairness for multiple channel access.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125231266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jungyu Lee, Jiho Kim, Sukhwan Song, Kyung-tae Kim, Ohyoung Song
Nowadays convergence of digital appliances meet both economic and practical demands of users. And current UI of the appliances not only provides interesting to users but also enhances convenience and accessibility. In this paper, we propose FRETEL (Face Recognition-Based Convergence Communicator with Internet Telephony) that is a new digital home appliance that satisfies these requirements properly. Therefore, we have designed simple and interesting UI using touch screen and face recognition. And convergence with Internet telephone that is spread rapidly today improves usefulness.
如今,数字家电的融合满足了用户的经济和实用需求。当前设备的UI不仅为用户提供了趣味性,还增强了便利性和可访问性。本文提出的基于人脸识别的网络电话融合通信器FRETEL (Face Recognition-Based Convergence Communicator with Internet Telephony)是一种很好地满足这些要求的新型数字家电。因此,我们利用触摸屏和人脸识别设计了简单有趣的UI。并且与今天迅速普及的互联网电话的融合提高了实用性。
{"title":"Face Recognition-Based Convergence Communicator with Internet Telephony","authors":"Jungyu Lee, Jiho Kim, Sukhwan Song, Kyung-tae Kim, Ohyoung Song","doi":"10.1109/ICCSN.2010.119","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.119","url":null,"abstract":"Nowadays convergence of digital appliances meet both economic and practical demands of users. And current UI of the appliances not only provides interesting to users but also enhances convenience and accessibility. In this paper, we propose FRETEL (Face Recognition-Based Convergence Communicator with Internet Telephony) that is a new digital home appliance that satisfies these requirements properly. Therefore, we have designed simple and interesting UI using touch screen and face recognition. And convergence with Internet telephone that is spread rapidly today improves usefulness.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122853969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ant Colony Optimization (ACO) metaheuristic is a recent population-based approach inspired by the observation of real ants colony and based upon their collective foraging behavior. In ACO, solutions of the problem are constructed within a stochastic iterative process, by adding solution components to partial solutions. Each individual ant constructs a part of the solution using an artificial pheromone, which reflects its experience accumulated while solving the problem, and heuristic information dependent on the problem. In this paper, the proposed technique ACO hybrid with Fuzzy and Hybrid Self Organizing Hybrid with Fuzzy describe segmentation consists of two steps. In the first step, the MRI brain image is Segmented using HSOM Hybrid with Fuzzy and the second step ACO Hybrid with Fuzzy method to extract the suspicious region Both techniques are compared and performance evaluation is evaluated.
{"title":"An Improved Implementation of Brain Tumor Detection Using Soft Computing","authors":"T. Logeswari, M. Karnan","doi":"10.1109/ICCSN.2010.10","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.10","url":null,"abstract":"Ant Colony Optimization (ACO) metaheuristic is a recent population-based approach inspired by the observation of real ants colony and based upon their collective foraging behavior. In ACO, solutions of the problem are constructed within a stochastic iterative process, by adding solution components to partial solutions. Each individual ant constructs a part of the solution using an artificial pheromone, which reflects its experience accumulated while solving the problem, and heuristic information dependent on the problem. In this paper, the proposed technique ACO hybrid with Fuzzy and Hybrid Self Organizing Hybrid with Fuzzy describe segmentation consists of two steps. In the first step, the MRI brain image is Segmented using HSOM Hybrid with Fuzzy and the second step ACO Hybrid with Fuzzy method to extract the suspicious region Both techniques are compared and performance evaluation is evaluated.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132734070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main objective of the research is to propose an execution framework for workflow systems under threat. When the threat (intrusion) is detected, the workflow system needs to be stopped immediately to avoid any possible loss of enterprise data. The system becomes active again, once it is completely recovered from the threat. This proposed framework overcomes the problem of discontinuity of services as a result of threat detection by enabling the execution of the workflow on an alternate path, keeping the security and integrity of the asset information intact. Hence the system remains available all the time in a secured fashion making it possible for the end user to access the services and data even in the vulnerable state. To achieve the specified goals, the special authentication mechanism has been adopted to authorize the users after threat is detected. Then the data is hibernated that is transferred to the designed dimensions and the connectivity and access to the hibernated data is provided by the chameleon agent. These three core components enable the workflow to execute in a secured and robust manner during system’s unsafe state.
{"title":"Framework for Alternate Execution of Workflows Under Threat","authors":"S. Safdar, M. Hassan, M. Qureshi, R. Akbar","doi":"10.1109/ICCSN.2010.79","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.79","url":null,"abstract":"The main objective of the research is to propose an execution framework for workflow systems under threat. When the threat (intrusion) is detected, the workflow system needs to be stopped immediately to avoid any possible loss of enterprise data. The system becomes active again, once it is completely recovered from the threat. This proposed framework overcomes the problem of discontinuity of services as a result of threat detection by enabling the execution of the workflow on an alternate path, keeping the security and integrity of the asset information intact. Hence the system remains available all the time in a secured fashion making it possible for the end user to access the services and data even in the vulnerable state. To achieve the specified goals, the special authentication mechanism has been adopted to authorize the users after threat is detected. Then the data is hibernated that is transferred to the designed dimensions and the connectivity and access to the hibernated data is provided by the chameleon agent. These three core components enable the workflow to execute in a secured and robust manner during system’s unsafe state.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"522 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133698929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes the utilization of mobile agents to increase the performance in maintaining the consistency of web caches. Most popular browsers like Internet Explorer and Netscape are providing options to cache the frequently used web pages in the client sites itself in order to provide faster access to the clients and to reduce the network overhead due to the reduction in number of messages transferred. In this environment, the difficulty is in maintaining the web caches in a consistent state by updating the web pages that are cached. This paper addresses this issue by exploiting the potential benefits of agent technology over this domain and analyzes its usage in increasing the performance. The performance is optimized in terms of reduction in the network load and reduction in the response time to the clients.
{"title":"Web Cache Consistency Maintenance Through Agents","authors":"A. Kannammal, Rema Padmanabhan, N. Iyengar","doi":"10.1109/ICCSN.2010.84","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.84","url":null,"abstract":"This paper proposes the utilization of mobile agents to increase the performance in maintaining the consistency of web caches. Most popular browsers like Internet Explorer and Netscape are providing options to cache the frequently used web pages in the client sites itself in order to provide faster access to the clients and to reduce the network overhead due to the reduction in number of messages transferred. In this environment, the difficulty is in maintaining the web caches in a consistent state by updating the web pages that are cached. This paper addresses this issue by exploiting the potential benefits of agent technology over this domain and analyzes its usage in increasing the performance. The performance is optimized in terms of reduction in the network load and reduction in the response time to the clients.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133896737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An open problem about tweakable blockcipher proposed by Liskov et al. is how to construct tweakable blockciphers without using pre-existing blockcipher. In this paper, on the basis of MISTY-Type transformation, we perform a systematic study of the open problem. We analyze the approach of including a tweak by XORing the tweak value into one place in the dataflow of the MISTY-Type structure. We mainly discuss the super-pseudo randomness of the structure. We conclude that the 5 round MISTY-Type tweakable blockciphers are not CCA-secure and there exists CCA-secure 6 round MISTY-Type tweakable blockciphers. Finally, we give the concrete cryptanalysis for the CCA-secure 6 round MISTY-Type tweakable blockciphers.
{"title":"On Super-Psudorandomness of MISTY-Type Tweakable Blockciphers","authors":"Fengtong Wen","doi":"10.1109/ICCSN.2010.49","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.49","url":null,"abstract":"An open problem about tweakable blockcipher proposed by Liskov et al. is how to construct tweakable blockciphers without using pre-existing blockcipher. In this paper, on the basis of MISTY-Type transformation, we perform a systematic study of the open problem. We analyze the approach of including a tweak by XORing the tweak value into one place in the dataflow of the MISTY-Type structure. We mainly discuss the super-pseudo randomness of the structure. We conclude that the 5 round MISTY-Type tweakable blockciphers are not CCA-secure and there exists CCA-secure 6 round MISTY-Type tweakable blockciphers. Finally, we give the concrete cryptanalysis for the CCA-secure 6 round MISTY-Type tweakable blockciphers.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134201697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A frame based audio watermarking scheme using Discrete Wavelet Transformation (DWT) is presented in this paper. The algorithm embeds the copyright information into the consecutive levels of approximate coefficients of the DWT transformed audio signal. To increase the robustness of the proposed scheme, the information bits are embedded multiple times at the different levels. Embedding of redundant bits results in degradation of SNR and PSNR values; however, experimental results show that the degradation are within acceptable range. Extraction of the watermarked audio signal is carried out by considering the majority of the watermark bits extracted from different levels. The proposed scheme demonstrates results which tend to resist infiltration against many signal processing manipulations, like MP3 compression, re-sampling, quantization and noise addition.
{"title":"A Redundant Audio Watermarking Technique Using Discrete Wavelet Transformation","authors":"K. Datta, I. Sengupta","doi":"10.1109/ICCSN.2010.57","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.57","url":null,"abstract":"A frame based audio watermarking scheme using Discrete Wavelet Transformation (DWT) is presented in this paper. The algorithm embeds the copyright information into the consecutive levels of approximate coefficients of the DWT transformed audio signal. To increase the robustness of the proposed scheme, the information bits are embedded multiple times at the different levels. Embedding of redundant bits results in degradation of SNR and PSNR values; however, experimental results show that the degradation are within acceptable range. Extraction of the watermarked audio signal is carried out by considering the majority of the watermark bits extracted from different levels. The proposed scheme demonstrates results which tend to resist infiltration against many signal processing manipulations, like MP3 compression, re-sampling, quantization and noise addition.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123110500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For the virus signature matching time of traditional the eigenvalue is too long, which can’t meet the need of the information security, a method of fast virus signature matching on the GPU is compelled. The system uses the GPU as a fast filter to quickly identify possible virus signatures for thousands of data objects in parallel. The performance of their library suggests that the GPU is now a viable platform for cost-effective, high-performance network security processing. And it shows that the computing speed of the eigenvalue based on GPU is obviously higher than the eigenvalue based on CPU by the experiment.
{"title":"Fast Virus Signature Matching Based on the High Performance Computing of GPU","authors":"Yang Cheng","doi":"10.1109/ICCSN.2010.72","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.72","url":null,"abstract":"For the virus signature matching time of traditional the eigenvalue is too long, which can’t meet the need of the information security, a method of fast virus signature matching on the GPU is compelled. The system uses the GPU as a fast filter to quickly identify possible virus signatures for thousands of data objects in parallel. The performance of their library suggests that the GPU is now a viable platform for cost-effective, high-performance network security processing. And it shows that the computing speed of the eigenvalue based on GPU is obviously higher than the eigenvalue based on CPU by the experiment.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121174476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}