首页 > 最新文献

2010 Second International Conference on Communication Software and Networks最新文献

英文 中文
MMS Routing for Wireless Sensor Networks 无线传感器网络的MMS路由
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.67
M. Premi, K. S. Shaji
In recent days the advancement in the wireless communication is with that of wireless sensor networks. In Wireless Sensor Networks (WSNs) the data are collected from many sensor nodes by the base station which is the goal of the network. In this type of WSNs, the major constraints are low energy, limited bandwidth and less memory. With these constraints in mind we propose a method to reduce the energy consumption with maximum data collection. In this new method we use multiple mobile sinks (MMS) instead of a single mobile sink. Here we have considered three scenarios. In the first scenario, all nodes are interested to send data to only one sink. In the second and third scenario all nodes are interested to send the data to any other mobile sink among the selected group of mobile sinks. We have simulated using MATLAB and the simulated results show that the update energy cost is reduced when two or more number of sinks are used.
近年来,无线通信的发展伴随着无线传感器网络的发展。在无线传感器网络(WSNs)中,基站从多个传感器节点收集数据,这是网络的目标。在这种类型的无线传感器网络中,主要的限制是低能量、有限的带宽和较少的内存。考虑到这些限制,我们提出了一种通过最大限度地收集数据来减少能耗的方法。在这种新方法中,我们使用多个移动接收器(MMS)而不是单个移动接收器。这里我们考虑了三种场景。在第一个场景中,所有节点只对将数据发送到一个接收器感兴趣。在第二个和第三个场景中,所有节点都有兴趣将数据发送到选定的移动接收器组中的任何其他移动接收器。利用MATLAB进行了仿真,仿真结果表明,使用两个或两个以上的集散点可以降低更新能耗。
{"title":"MMS Routing for Wireless Sensor Networks","authors":"M. Premi, K. S. Shaji","doi":"10.1109/ICCSN.2010.67","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.67","url":null,"abstract":"In recent days the advancement in the wireless communication is with that of wireless sensor networks. In Wireless Sensor Networks (WSNs) the data are collected from many sensor nodes by the base station which is the goal of the network. In this type of WSNs, the major constraints are low energy, limited bandwidth and less memory. With these constraints in mind we propose a method to reduce the energy consumption with maximum data collection. In this new method we use multiple mobile sinks (MMS) instead of a single mobile sink. Here we have considered three scenarios. In the first scenario, all nodes are interested to send data to only one sink. In the second and third scenario all nodes are interested to send the data to any other mobile sink among the selected group of mobile sinks. We have simulated using MATLAB and the simulated results show that the update energy cost is reduced when two or more number of sinks are used.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126914721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance of UWB MIMO Systems with Rake Receive Processing 采用Rake接收处理的UWB MIMO系统性能研究
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.11
J. An, Sangchoon Kim
In this paper, a rake diversity combining scheme for detection of a single data stream in ultra-wideband (UWB) multiple input multiple output (MIMO) systems is considered as an extension of single input multiple output (SIMO) systems. The BER performance of a linear receive rake diversity scheme is presented in a log-normal multipath fading channel. It is shown that the increase of an antenna dimension happens to degrade the performance in the range of high SNRs. It is seen that as the number of transmit and receive antennas increases, the rake diversity combining system improves the performance at low SNRs or in the case of large antenna dimension at high SNRs.
本文提出了一种用于超宽带(UWB)多输入多输出(MIMO)系统中单个数据流检测的rake分集组合方案,作为单输入多输出(SIMO)系统的扩展。研究了对数正态多径衰落信道下线性接收rake分集方案的误码率性能。结果表明,在高信噪比范围内,天线尺寸的增大会导致性能下降。可以看出,随着发射和接收天线数量的增加,rake分集组合系统在低信噪比或高信噪比下天线尺寸较大的情况下,性能得到了提高。
{"title":"Performance of UWB MIMO Systems with Rake Receive Processing","authors":"J. An, Sangchoon Kim","doi":"10.1109/ICCSN.2010.11","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.11","url":null,"abstract":"In this paper, a rake diversity combining scheme for detection of a single data stream in ultra-wideband (UWB) multiple input multiple output (MIMO) systems is considered as an extension of single input multiple output (SIMO) systems. The BER performance of a linear receive rake diversity scheme is presented in a log-normal multipath fading channel. It is shown that the increase of an antenna dimension happens to degrade the performance in the range of high SNRs. It is seen that as the number of transmit and receive antennas increases, the rake diversity combining system improves the performance at low SNRs or in the case of large antenna dimension at high SNRs.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116428810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testability Models for Structured Programs 结构化程序的可测试性模型
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.112
Chhattar Singh Lamba
In this paper I investigate factors of the testability of structured programs. The starting point is given by a study of the literature to obtain both an initial model of testability and existing models related to testability. The main objective of this paper is to propose models for the estimation of testability (Tb), on the basis of various affecting attributes. The values of the attributes were estimated for programs under consideration with the help of software developed for this purpose. The models proposed conform to our intuitive reasoning
本文研究了影响结构化程序可测试性的因素。本文的出发点是通过对文献的研究,得到可测性的初始模型和现有的可测性相关模型。本文的主要目的是在各种影响属性的基础上,提出可测性(Tb)的估计模型。在为此目的开发的软件的帮助下,对所考虑的程序的属性值进行了估计。提出的模型符合我们的直觉推理
{"title":"Testability Models for Structured Programs","authors":"Chhattar Singh Lamba","doi":"10.1109/ICCSN.2010.112","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.112","url":null,"abstract":"In this paper I investigate factors of the testability of structured programs. The starting point is given by a study of the literature to obtain both an initial model of testability and existing models related to testability. The main objective of this paper is to propose models for the estimation of testability (Tb), on the basis of various affecting attributes. The values of the attributes were estimated for programs under consideration with the help of software developed for this purpose. The models proposed conform to our intuitive reasoning","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113954279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Evaluation of Index Poisoning in BitTorrent BitTorrent中索引中毒的评价
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.39
Jie Kong, Wandong Cai, Lei Wang
In recent year, some popular P2P file-sharing systems have been identified to be polluted by the copyright Industry to control the unauthorized distribution of content. As one of the most common P2P pollution methods, the index poisoning controls the P2P file-sharing by inserting massive numbers of bogus records into the index of the P2P file-sharing system. In this paper, the index poisoning in the structured P2P file-sharing system is introduced firstly. A term “poison multiplication” is defined to describe the level of the poisoning and the probability model that a peer receives valid peer information on the condition of the index poisoning in BitTorrent is proposed. We run index poisoning in BitTorrent and evaluate the effect of it. The result of the evaluation shows that with the poison multiplication increases, the connection time and the randomness of the connection time increases. To our knowledge, this is the first study to employ BitTorrent as the platform to evaluate the effectiveness of the index poisoning.
近年来,一些流行的P2P文件共享系统被版权行业认定为污染,以控制未经授权的内容分发。索引中毒是一种最常见的P2P污染方法,它通过在P2P文件共享系统的索引中插入大量的虚假记录来控制P2P文件共享。本文首先介绍了结构化P2P文件共享系统中的索引中毒问题。定义了“中毒倍增”一词来描述中毒的程度,并提出了BitTorrent中索引中毒情况下,对等体接收到有效对等体信息的概率模型。我们在BitTorrent中运行索引中毒并评估它的效果。评价结果表明,随着毒乘的增加,连接时间和连接时间的随机性增加。据我们所知,这是第一次使用BitTorrent作为平台来评估索引中毒效果的研究。
{"title":"The Evaluation of Index Poisoning in BitTorrent","authors":"Jie Kong, Wandong Cai, Lei Wang","doi":"10.1109/ICCSN.2010.39","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.39","url":null,"abstract":"In recent year, some popular P2P file-sharing systems have been identified to be polluted by the copyright Industry to control the unauthorized distribution of content. As one of the most common P2P pollution methods, the index poisoning controls the P2P file-sharing by inserting massive numbers of bogus records into the index of the P2P file-sharing system. In this paper, the index poisoning in the structured P2P file-sharing system is introduced firstly. A term “poison multiplication” is defined to describe the level of the poisoning and the probability model that a peer receives valid peer information on the condition of the index poisoning in BitTorrent is proposed. We run index poisoning in BitTorrent and evaluate the effect of it. The result of the evaluation shows that with the poison multiplication increases, the connection time and the randomness of the connection time increases. To our knowledge, this is the first study to employ BitTorrent as the platform to evaluate the effectiveness of the index poisoning.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130365115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A BFSK Neural Network Demodulator with Fast Training Hints 具有快速训练提示的BFSK神经网络解调器
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.123
M. Amini, Mohammad Moghadasi, Iman Fatehi
In this paper an artificial neural network demodulator to demodulate binary frequency shift keying signal is proposed. This demodulator has some important features compared with conventional method such as coherent and non-coherent demodulator and also other proposed neural network demodulators. In contrast with conventional demodulator, this demodulator (which uses a tapped delayed line in its two layers) does not need any band pass filter (to select the desired frequency band), any pulse shaping filter (to worry about its output sharpness) and any synchronous local oscillator and the other usual demodulator components. it is just a neural network implementation demodulator, that should be called soft demodulator, because once it is trained properly for a special kind of modulation, it works well for that kind of modulation and it is easy to train it for another modulation scheme without changing hardware, i.e., train it and then use it ! Compared with the other ANN demodulators proposed before it can be trained faster (or with less training data bits), it has more efficient BER curve and also has a better performance (MSE or SSE).
本文提出了一种人工神经网络解调器,用于解调二进制移频键控信号。与传统的相干解调和非相干解调方法以及其他神经网络解调方法相比,该解调方法具有一些重要的特点。与传统解调器相比,这种解调器(在其两层中使用抽头延迟线)不需要任何带通滤波器(选择所需的频带),任何脉冲整形滤波器(担心其输出清晰度)和任何同步本地振荡器和其他通常的解调器组件。它只是一个神经网络实现解调器,应该被称为软解调器,因为一旦它被适当地训练用于一种特殊的调制,它就能很好地适应这种调制,并且很容易训练它用于另一种调制方案,而不需要改变硬件,即训练它然后使用它!与之前提出的其他人工神经网络解调器相比,它可以更快地训练(或使用更少的训练数据位),具有更有效的误码率曲线,并且具有更好的性能(MSE或SSE)。
{"title":"A BFSK Neural Network Demodulator with Fast Training Hints","authors":"M. Amini, Mohammad Moghadasi, Iman Fatehi","doi":"10.1109/ICCSN.2010.123","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.123","url":null,"abstract":"In this paper an artificial neural network demodulator to demodulate binary frequency shift keying signal is proposed. This demodulator has some important features compared with conventional method such as coherent and non-coherent demodulator and also other proposed neural network demodulators. In contrast with conventional demodulator, this demodulator (which uses a tapped delayed line in its two layers) does not need any band pass filter (to select the desired frequency band), any pulse shaping filter (to worry about its output sharpness) and any synchronous local oscillator and the other usual demodulator components. it is just a neural network implementation demodulator, that should be called soft demodulator, because once it is trained properly for a special kind of modulation, it works well for that kind of modulation and it is easy to train it for another modulation scheme without changing hardware, i.e., train it and then use it ! Compared with the other ANN demodulators proposed before it can be trained faster (or with less training data bits), it has more efficient BER curve and also has a better performance (MSE or SSE).","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128221580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Enhanced Media-Independent Pre-authentication Framework for Preventing Packet Loss 一种增强的防止丢包的独立于媒体的预认证框架
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.52
Lun-Huo Yeh, Shun-Neng Yang, Wei-Kuo Chiang
Media-Independent Pre-Authentication (MPA) is used as a secure handover optimization scheme working over any link layer. With MPA, a mobile node (the MN) can establish a security association with a candidate target network (CTN), obtain an IP address and other parameters from the CTN, and complete the binding update of any mobility management protocol with the new care-of address (nCoA) before performing a handover at the link layer. This can significantly reduce handover delay. However, the packets transmitted to the MN may be lost if a link layer handover occurs due to the link going down before the MN completes the binding update. The possible simultaneous mobility problem also gives rise to undesirable handover delay. In this paper, we design a framework called enhanced MPA (eMPA) by improving handover execution procedures of MPA. When a MN decides to perform handover at the link layer, it will request to create an IPSec tunnel between its nCoA and old access router (oAR) before deleting the proactive handover tunnel (PHT) that created between the MN and new access router (nAR). Then data packets sent to the oAR will be forwarded to the MN with the nCoA via nAR. Then the nAR will start to buffer those packets until the MN sends an explicit signal to stop buffering and flushes the packets after completing handover at the link layer. In addition, we present a binding update retransmission mechanism in the eMPA to resolve control plane packet timeout problem. With this mechanism, we can prevent packet loss during the handover.
MPA (Media-Independent Pre-Authentication)是一种适用于任何链路层的安全切换优化方案。通过MPA,移动节点(MN)可以与候选目标网络(CTN)建立安全关联,从候选目标网络(CTN)获取IP地址等参数,并在执行链路层切换之前,将任何移动管理协议与新的看护地址(nCoA)完成绑定更新。这可以显著减少切换延迟。但是,如果在MN完成绑定更新之前,由于链路断开而发生链路层切换,则发送到MN的数据包可能会丢失。同时可能出现的机动性问题也会导致不希望出现的交接延迟。本文通过改进MPA的移交执行流程,设计了一个增强MPA (enhanced MPA)框架。当MN决定在链路层进行切换时,它会请求在其nCoA和旧接入路由器(oAR)之间创建IPSec隧道,然后删除在MN和新接入路由器(nAR)之间创建的主动切换隧道(PHT)。然后发送到oAR的数据包将通过nAR与nCoA一起转发到MN。然后,nAR将开始缓冲这些数据包,直到MN发送明确的信号停止缓冲,并在链路层完成切换后刷新数据包。此外,我们提出了一种绑定更新重传机制来解决控制平面数据包超时问题。通过这种机制,我们可以防止在切换过程中丢包。
{"title":"An Enhanced Media-Independent Pre-authentication Framework for Preventing Packet Loss","authors":"Lun-Huo Yeh, Shun-Neng Yang, Wei-Kuo Chiang","doi":"10.1109/ICCSN.2010.52","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.52","url":null,"abstract":"Media-Independent Pre-Authentication (MPA) is used as a secure handover optimization scheme working over any link layer. With MPA, a mobile node (the MN) can establish a security association with a candidate target network (CTN), obtain an IP address and other parameters from the CTN, and complete the binding update of any mobility management protocol with the new care-of address (nCoA) before performing a handover at the link layer. This can significantly reduce handover delay. However, the packets transmitted to the MN may be lost if a link layer handover occurs due to the link going down before the MN completes the binding update. The possible simultaneous mobility problem also gives rise to undesirable handover delay. In this paper, we design a framework called enhanced MPA (eMPA) by improving handover execution procedures of MPA. When a MN decides to perform handover at the link layer, it will request to create an IPSec tunnel between its nCoA and old access router (oAR) before deleting the proactive handover tunnel (PHT) that created between the MN and new access router (nAR). Then data packets sent to the oAR will be forwarded to the MN with the nCoA via nAR. Then the nAR will start to buffer those packets until the MN sends an explicit signal to stop buffering and flushes the packets after completing handover at the link layer. In addition, we present a binding update retransmission mechanism in the eMPA to resolve control plane packet timeout problem. With this mechanism, we can prevent packet loss during the handover.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122208896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
QoS-Satisfied Dynamic Routing Based on Overlay Service Network 基于覆盖业务网络的qos满足动态路由
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.99
Amir Karamoozian, Mostafa Erfani, A. Abdullah
In recent years, overlay networks have emerged as an approach to provide a general framework for new applications and services to be implemented without significant changes in the IP-layer network infrastructure. Overlay Service Network (OSN) is a unified framework which acts as a top layer over the IP-layer network and makes overlay routing feasible. This paper mainly focuses on designing a QoS-satisfied dynamic overlay routing protocol based on OSN framework. While satisfying the QoS requirements, being a dynamic routing protocol enhances the reliability and performance of the routing. So the proposed algorithm not only satisfies the application QoS requirements, but also improves the routing performance. The goals are: (1) to discover an overlay path which fulfills the QoS requirements, as well as (2) balancing the computational capacity of the resources and at the same time, (3) enhance the performance of the overlay network. To achieve these goals, we propose a path selection algorithm called Modified Least-Cost Path (MLCP) algorithm. Our simulation experiments have shown that the proposed algorithm performs well in achieving QoS-satisfied overlay routing while maintaining the performance.
近年来,覆盖网络作为一种方法出现,它为新应用和服务的实现提供了一个通用框架,而无需对ip层网络基础设施进行重大更改。OSN (Overlay Service Network)是一个统一的框架,它作为ip层网络的顶层,使覆盖路由成为可能。本文主要研究了一种基于OSN框架的满足qos的动态覆盖路由协议的设计。动态路由协议在满足QoS要求的同时,提高了路由的可靠性和性能。因此,该算法既满足了应用对QoS的要求,又提高了路由性能。目标是:(1)发现一条满足QoS要求的覆盖路径;(2)平衡资源的计算能力;同时(3)提高覆盖网络的性能。为了实现这些目标,我们提出了一种路径选择算法,称为修正最小代价路径(MLCP)算法。仿真实验表明,该算法在保持性能的同时,能够很好地实现满足qos的覆盖路由。
{"title":"QoS-Satisfied Dynamic Routing Based on Overlay Service Network","authors":"Amir Karamoozian, Mostafa Erfani, A. Abdullah","doi":"10.1109/ICCSN.2010.99","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.99","url":null,"abstract":"In recent years, overlay networks have emerged as an approach to provide a general framework for new applications and services to be implemented without significant changes in the IP-layer network infrastructure. Overlay Service Network (OSN) is a unified framework which acts as a top layer over the IP-layer network and makes overlay routing feasible. This paper mainly focuses on designing a QoS-satisfied dynamic overlay routing protocol based on OSN framework. While satisfying the QoS requirements, being a dynamic routing protocol enhances the reliability and performance of the routing. So the proposed algorithm not only satisfies the application QoS requirements, but also improves the routing performance. The goals are: (1) to discover an overlay path which fulfills the QoS requirements, as well as (2) balancing the computational capacity of the resources and at the same time, (3) enhance the performance of the overlay network. To achieve these goals, we propose a path selection algorithm called Modified Least-Cost Path (MLCP) algorithm. Our simulation experiments have shown that the proposed algorithm performs well in achieving QoS-satisfied overlay routing while maintaining the performance.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122769517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Application of Service-Oriented Architecture in E-complaint System 面向服务体系结构在电子投诉系统中的应用
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.107
A. Najar, Hassan Awad Hassan Al-Sukhni, Navid Aghakhani
in this study researcher tried to improve relation between citizens and government by presenting a new model based on Service Oriented Architecture (SOA). With utilizing the presented model in government body on one hand governments will have the ability to minimize citizens’ dissatisfaction and on the other hand it can encourage citizens to participate in controlling government body such as governments’ staffs and organizations. This study can also be helpful in other fields of e-government in terms of citizen adoption and citizen loyalty. Results of this study can be a good reference to find out users needs from e-complaint and the importance of complaint in the body of government.
在本研究中,研究者试图通过提出一个基于面向服务的体系结构(SOA)的新模型来改善公民与政府之间的关系。通过在政府机构中使用所提出的模型,一方面政府将有能力最大限度地减少公民的不满,另一方面它可以鼓励公民参与控制政府机构,如政府工作人员和组织。本研究对电子政务其他领域的公民采纳和公民忠诚也有一定的借鉴意义。本研究结果可为了解用户对电子投诉的需求及投诉在政府机构中的重要性提供良好的参考。
{"title":"The Application of Service-Oriented Architecture in E-complaint System","authors":"A. Najar, Hassan Awad Hassan Al-Sukhni, Navid Aghakhani","doi":"10.1109/ICCSN.2010.107","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.107","url":null,"abstract":"in this study researcher tried to improve relation between citizens and government by presenting a new model based on Service Oriented Architecture (SOA). With utilizing the presented model in government body on one hand governments will have the ability to minimize citizens’ dissatisfaction and on the other hand it can encourage citizens to participate in controlling government body such as governments’ staffs and organizations. This study can also be helpful in other fields of e-government in terms of citizen adoption and citizen loyalty. Results of this study can be a good reference to find out users needs from e-complaint and the importance of complaint in the body of government.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117104402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Network Traffic Analysis and Intrusion Detection Using Packet Sniffer 基于数据包嗅探器的网络流量分析与入侵检测
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.104
M. Qadeer, A. Iqbal, Mohammad Zahid, M. Siddiqui
Computer software that can intercept and log traffic passing over a digital network or part of a network is better known as packet sniffer. The sniffer captures these packets by setting the NIC card in the promiscuous mode and eventually decodes them. The decoded information can be used in any way depending upon the intention of the person concerned who decodes the data (i.e. malicious or beneficial purpose). Depending on the network structure one can sniff all or just parts of the traffic from a single machine within the network. However, there are some methods to avoid traffic narrowing by switches to gain access to traffic from other systems on the network. This paper focuses on the basics of packet sniffer and its working, development of the tool on Linux platform and its use for Intrusion Detection. It also discusses ways to detect the presence of such software on the network and to handle them in an efficient way. Focus has also been laid to analyze the bottleneck scenario arising in the network, using this self developed packet sniffer. Before the development of this indigenous software, minute observation has been made on the working behavior of already existing sniffer software such as wireshark (formerly known as ethereal), tcpdump, and snort, which serve as the base for the development of our sniffer software. For the capture of the packets, a library known as libpcap has been used. The development of such software gives a chance to the developer to incorporate the additional features that are not in the existing one.
能够拦截和记录通过数字网络或网络的一部分的通信的计算机软件被称为数据包嗅探器。嗅探器通过将网卡设置为混杂模式来捕获这些数据包,并最终对其进行解码。解码后的信息可以以任何方式使用,这取决于解码数据的有关人员的意图(即恶意或有益的目的)。根据网络结构的不同,可以嗅探来自网络中单个机器的全部或部分流量。但是,有一些方法可以避免交换机缩小流量,以便访问网络上其他系统的流量。本文主要介绍了数据包嗅探器的基本原理、工作原理、在Linux平台上的开发以及在入侵检测中的应用。本文还讨论了如何检测网络上存在的此类软件,并以有效的方式处理它们。重点分析了在网络中出现的瓶颈场景,并使用了自主开发的数据包嗅探器。在开发这个本地软件之前,已经对现有嗅探器软件(如wireshark(以前称为ethereal)、tcpdump和snort)的工作行为进行了详细的观察,这些嗅探器软件是开发我们的嗅探器软件的基础。为了捕获数据包,使用了libpcap库。这种软件的开发为开发人员提供了一个机会,可以将现有软件中没有的附加功能合并在一起。
{"title":"Network Traffic Analysis and Intrusion Detection Using Packet Sniffer","authors":"M. Qadeer, A. Iqbal, Mohammad Zahid, M. Siddiqui","doi":"10.1109/ICCSN.2010.104","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.104","url":null,"abstract":"Computer software that can intercept and log traffic passing over a digital network or part of a network is better known as packet sniffer. The sniffer captures these packets by setting the NIC card in the promiscuous mode and eventually decodes them. The decoded information can be used in any way depending upon the intention of the person concerned who decodes the data (i.e. malicious or beneficial purpose). Depending on the network structure one can sniff all or just parts of the traffic from a single machine within the network. However, there are some methods to avoid traffic narrowing by switches to gain access to traffic from other systems on the network. This paper focuses on the basics of packet sniffer and its working, development of the tool on Linux platform and its use for Intrusion Detection. It also discusses ways to detect the presence of such software on the network and to handle them in an efficient way. Focus has also been laid to analyze the bottleneck scenario arising in the network, using this self developed packet sniffer. Before the development of this indigenous software, minute observation has been made on the working behavior of already existing sniffer software such as wireshark (formerly known as ethereal), tcpdump, and snort, which serve as the base for the development of our sniffer software. For the capture of the packets, a library known as libpcap has been used. The development of such software gives a chance to the developer to incorporate the additional features that are not in the existing one.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121472353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 127
A Temporal Video Segmentation and Summary Generation Method Based on Shots' Abrupt and Gradual Transition Boundary Detecting 基于镜头突变与渐变边界检测的视频分割与摘要生成方法
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.58
Yinzi Chen, Yang Deng, Y. Guo, Wendong Wang, Y. Zou, Kongqiao Wang
A temporal video segmentation method is proposed in this paper. This method is based on the detection of shot abrupt transition and gradual transition, and then takes into account the conditions of user terminals, which could generate different video summarization for each user. The experimental results show that the video summarization is able to meet the user's browsing requirements, and allows user to enjoy better browsing experience.
本文提出了一种时域视频分割方法。该方法在检测镜头突变和渐变的基础上,考虑到用户终端的情况,为每个用户生成不同的视频摘要。实验结果表明,视频摘要能够满足用户的浏览需求,使用户享受到更好的浏览体验。
{"title":"A Temporal Video Segmentation and Summary Generation Method Based on Shots' Abrupt and Gradual Transition Boundary Detecting","authors":"Yinzi Chen, Yang Deng, Y. Guo, Wendong Wang, Y. Zou, Kongqiao Wang","doi":"10.1109/ICCSN.2010.58","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.58","url":null,"abstract":"A temporal video segmentation method is proposed in this paper. This method is based on the detection of shot abrupt transition and gradual transition, and then takes into account the conditions of user terminals, which could generate different video summarization for each user. The experimental results show that the video summarization is able to meet the user's browsing requirements, and allows user to enjoy better browsing experience.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134193718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2010 Second International Conference on Communication Software and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1