首页 > 最新文献

2012 Fourth International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage ET-DMD:分布式存储中检测恶意文件删除的容错方案
Jian Mao, Yan Zhang, Xiandong Xu, Jianwei Liu, Tao Wei
Distributed storage is a scheme to store data in networked storage services, which is the basis of popular cloud storage solutions. Although this scheme has huge benefits in reducing maintenance and operation cost, it has several security concerns. Among them, malicious file deletion by the storage providers is a top concern. In this paper, we develop a novel error-tolerant solution, ET-DME, to effectively detect malicious file deletion behaviors in distributed storage services. Our approach prevents malicious servers from forging evidence to bypass data auditing test. In addition, our approach does not limit the number of challenges made by the client. Our approach also has low computation and communication overhead.
分布式存储是一种将数据存储在网络存储服务中的方案,是流行的云存储解决方案的基础。虽然该方案在降低维护和运行成本方面具有巨大的优势,但也存在一些安全问题。其中,存储提供商恶意删除文件是最受关注的问题。在本文中,我们开发了一种新的容错解决方案ET-DME,以有效地检测分布式存储服务中的恶意文件删除行为。我们的方法可以防止恶意服务器伪造证据绕过数据审计测试。此外,我们的方法不会限制客户提出挑战的数量。我们的方法还具有较低的计算和通信开销。
{"title":"ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage","authors":"Jian Mao, Yan Zhang, Xiandong Xu, Jianwei Liu, Tao Wei","doi":"10.1109/iNCoS.2012.67","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.67","url":null,"abstract":"Distributed storage is a scheme to store data in networked storage services, which is the basis of popular cloud storage solutions. Although this scheme has huge benefits in reducing maintenance and operation cost, it has several security concerns. Among them, malicious file deletion by the storage providers is a top concern. In this paper, we develop a novel error-tolerant solution, ET-DME, to effectively detect malicious file deletion behaviors in distributed storage services. Our approach prevents malicious servers from forging evidence to bypass data auditing test. In addition, our approach does not limit the number of challenges made by the client. Our approach also has low computation and communication overhead.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131031945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed Image Encoding Scheme Using LDPC Codes over GF(q) on Wireless Sensor Networks 无线传感器网络中基于GF(q)的LDPC码分布式图像编码方案
P. N. Huu, Vinh Tran-Quang, T. Miyoshi
This work reports an image encoding scheme that distributes low-density parity-check (LDPC) encoding over a prime field of order q, GF(q), on a wireless sensor network (WSN). In the scheme, we divide the input data into several small parts, which are then distributed to multiple nodes to perform a LDPC encoding task in a cluster. We conducted extensive computational simulations to verify our method and found that the LDPC codes over GF(4) achieve a fair trade off between the bit error rate (BER) and power consumption criteria. As a result, the proposed scheme of using LDPC codes over GF(4) not only solves the energy balance problem by sharing processing tasks but also increases the data quality.
本研究报告了一种在无线传感器网络(WSN)上,将低密度奇偶校验(LDPC)编码分布在q阶素域GF(q)上的图像编码方案。在该方案中,我们将输入数据分成几个小部分,然后将这些小部分分发到多个节点,在集群中执行LDPC编码任务。我们进行了大量的计算模拟来验证我们的方法,并发现GF(4)上的LDPC码在误码率(BER)和功耗标准之间实现了公平的权衡。因此,本文提出的在GF(4)上使用LDPC码的方案不仅通过共享处理任务解决了能量平衡问题,而且提高了数据质量。
{"title":"Distributed Image Encoding Scheme Using LDPC Codes over GF(q) on Wireless Sensor Networks","authors":"P. N. Huu, Vinh Tran-Quang, T. Miyoshi","doi":"10.1109/iNCoS.2012.34","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.34","url":null,"abstract":"This work reports an image encoding scheme that distributes low-density parity-check (LDPC) encoding over a prime field of order q, GF(q), on a wireless sensor network (WSN). In the scheme, we divide the input data into several small parts, which are then distributed to multiple nodes to perform a LDPC encoding task in a cluster. We conducted extensive computational simulations to verify our method and found that the LDPC codes over GF(4) achieve a fair trade off between the bit error rate (BER) and power consumption criteria. As a result, the proposed scheme of using LDPC codes over GF(4) not only solves the energy balance problem by sharing processing tasks but also increases the data quality.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127868446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy-Preserving Affinity Propagation Clustering over Vertically Partitioned Data 垂直分区数据上保持隐私的亲和传播聚类
Xiao-yan Zhu, Mo-meng Liu, Min Xie
Data mining has been well-studied in academia and widely applied to many fields. As a significant mining means, clustering algorithm has been successfully used in facility location, image categorization and bioinformatics. K-means and affinity propagation (AP) are two effective clustering algorithms, in which the former has involved in privacy preserving data mining, but the latter does not. Considering the unparalleled advantages of AP over k-means, we firstly propose a secure scheme for AP clustering in this paper. Our scheme runs over a partitioned database that different parties contain different attributes for a common set of entities. This scheme guarantees no disclosure of parties' private information by means of the cryptographic tools which have been successfully applied in privacy preserving k-means clustering. The final result for each party is the assignment of each entity, but gives nothing about the attributes held by other parties. In the end, we make a brief security discussion under the semi-honest model and analyze the communication cost to show that our scheme does have good performance.
数据挖掘在学术界得到了很好的研究,并广泛应用于许多领域。聚类算法作为一种重要的挖掘手段,已成功地应用于设施定位、图像分类和生物信息学等领域。K-means和亲和传播(affinity propagation, AP)是两种有效的聚类算法,其中K-means涉及保护隐私的数据挖掘,而AP不涉及。考虑到AP相对于k-means的无可比拟的优势,本文首先提出了一种安全的AP聚类方案。我们的方案在一个分区数据库上运行,其中不同的各方包含一组公共实体的不同属性。该方案利用已成功应用于保护隐私的k-means聚类的加密工具,保证了各方隐私信息的不泄露。各方的最终结果是每个实体的分配,但没有给出其他各方持有的属性。最后,对半诚实模型下的安全性进行了简要的讨论,并对其通信成本进行了分析,证明了该方案具有良好的性能。
{"title":"Privacy-Preserving Affinity Propagation Clustering over Vertically Partitioned Data","authors":"Xiao-yan Zhu, Mo-meng Liu, Min Xie","doi":"10.1109/iNCoS.2012.71","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.71","url":null,"abstract":"Data mining has been well-studied in academia and widely applied to many fields. As a significant mining means, clustering algorithm has been successfully used in facility location, image categorization and bioinformatics. K-means and affinity propagation (AP) are two effective clustering algorithms, in which the former has involved in privacy preserving data mining, but the latter does not. Considering the unparalleled advantages of AP over k-means, we firstly propose a secure scheme for AP clustering in this paper. Our scheme runs over a partitioned database that different parties contain different attributes for a common set of entities. This scheme guarantees no disclosure of parties' private information by means of the cryptographic tools which have been successfully applied in privacy preserving k-means clustering. The final result for each party is the assignment of each entity, but gives nothing about the attributes held by other parties. In the end, we make a brief security discussion under the semi-honest model and analyze the communication cost to show that our scheme does have good performance.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127546151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Unsupervised Human Action Categorization Using Latent Dirichlet Markov Clustering 基于潜狄利克雷马尔可夫聚类的无监督人类行为分类
Xudong Zhu, Hui Li
We present a novel unsupervised learning method for human action categories from video sequences using Latent Dirichlet Markov Clustering (LDMC). Video sequences are represented by a novel "bag-of-words" representation, where each frame corresponds to a "word". The algorithm automatically learns the probability distributions of the words and the intermediate topics corresponding to human action categories, and correlates actions over time. This is achieved by using Latent Dirichlet Markov Clustering (LDMC). Our approach builds on Hidden Markov Models (HMMs) and Latent Dirichlet Allocation (LDA), and overcomes their drawbacks on accuracy, robustness and computational efficiency. A collapsed Gibbs sampler is derived for offline learning with unlabeled training data, and significantly, a new approximation to online Bayesian inference is formulated to enable human action classification in new video data online in real-time. The strength of this mothod is demonstrated by unsupervised learning of human action categories and detecting irregular actions in different datasets.
提出了一种基于潜狄利克雷马尔可夫聚类(LDMC)的视频序列人类动作分类的无监督学习方法。视频序列由一种新颖的“词袋”表示法表示,其中每帧对应一个“词”。该算法自动学习与人类动作类别相对应的单词和中间主题的概率分布,并随时间将动作关联起来。这是通过使用潜狄利克雷马尔可夫聚类(LDMC)实现的。我们的方法建立在隐马尔可夫模型(hmm)和潜狄利克雷分配(LDA)的基础上,克服了它们在准确性、鲁棒性和计算效率方面的缺点。推导了一个用于未标记训练数据离线学习的折叠Gibbs采样器,并且重要的是,制定了一个新的近似在线贝叶斯推理,以便实时在线新视频数据中的人类动作分类。通过对人类动作类别的无监督学习和检测不同数据集中的不规则动作,证明了该方法的强度。
{"title":"Unsupervised Human Action Categorization Using Latent Dirichlet Markov Clustering","authors":"Xudong Zhu, Hui Li","doi":"10.1109/iNCoS.2012.114","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.114","url":null,"abstract":"We present a novel unsupervised learning method for human action categories from video sequences using Latent Dirichlet Markov Clustering (LDMC). Video sequences are represented by a novel \"bag-of-words\" representation, where each frame corresponds to a \"word\". The algorithm automatically learns the probability distributions of the words and the intermediate topics corresponding to human action categories, and correlates actions over time. This is achieved by using Latent Dirichlet Markov Clustering (LDMC). Our approach builds on Hidden Markov Models (HMMs) and Latent Dirichlet Allocation (LDA), and overcomes their drawbacks on accuracy, robustness and computational efficiency. A collapsed Gibbs sampler is derived for offline learning with unlabeled training data, and significantly, a new approximation to online Bayesian inference is formulated to enable human action classification in new video data online in real-time. The strength of this mothod is demonstrated by unsupervised learning of human action categories and detecting irregular actions in different datasets.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114440478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Rule Based Expert Systems Running over the Cloud 基于规则的专家系统在云端运行
Traian-Lucian Militaru, G. Suciu, G. Todoran, A. Florescu, V. Poenaru, Laurentiu Nae, C. Cernat
This paper proposes a prototype of a rule based expert system running over cloud, showing the advantages compared with traditional expert systems and also how to avoid any problems that may arise in such an environment of use.
本文提出了一个运行在云上的基于规则的专家系统的原型,展示了与传统专家系统相比的优势,以及如何避免在这种使用环境中可能出现的任何问题。
{"title":"Rule Based Expert Systems Running over the Cloud","authors":"Traian-Lucian Militaru, G. Suciu, G. Todoran, A. Florescu, V. Poenaru, Laurentiu Nae, C. Cernat","doi":"10.1109/iNCoS.2012.93","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.93","url":null,"abstract":"This paper proposes a prototype of a rule based expert system running over cloud, showing the advantages compared with traditional expert systems and also how to avoid any problems that may arise in such an environment of use.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115557984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Networking Tactics for Online eHealth Campaigns and Intervention Studies: Preliminary Results from a Case Study on Nutritional Support for Cancer Patients 在线电子健康运动和干预研究的网络策略:癌症患者营养支持案例研究的初步结果
D. Akoumianakis, Giannis Milolidakis, P. Gnagnarella, A. Misotti, N. Bessis
The present work is concerned with a particular type of online collaborative engagements, namely the management of e-Health campaigns and online intervention studies. In order to establish the baseline, the paper critically reviews prominent tactics facilitated by Social Networking Services (SNS) and social web sites and contrasts them against the specific requirements of targeted online e-Health campaigns and intervention studies. Based on this analysis, the paper describes a web-based system that accommodates functionality and services to enable expert-patient collaboration and co-engagement in building online campaigns and conducting intervention studies. The value and benefits of this approach are illustrated using a case study of cancer patients searching for online nutritional support and collaborating with healthcare providers and other patients.
目前的工作涉及一种特殊类型的在线协作参与,即电子卫生运动和在线干预研究的管理。为了建立基线,本文批判性地回顾了社交网络服务(SNS)和社交网站促进的突出策略,并将它们与有针对性的在线电子卫生运动和干预研究的具体要求进行了对比。基于这一分析,本文描述了一个基于网络的系统,该系统提供功能和服务,使专家-患者协作和共同参与建立在线活动和开展干预研究。通过一个癌症患者搜索在线营养支持并与医疗保健提供者和其他患者合作的案例研究,说明了这种方法的价值和好处。
{"title":"Networking Tactics for Online eHealth Campaigns and Intervention Studies: Preliminary Results from a Case Study on Nutritional Support for Cancer Patients","authors":"D. Akoumianakis, Giannis Milolidakis, P. Gnagnarella, A. Misotti, N. Bessis","doi":"10.1109/iNCoS.2012.23","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.23","url":null,"abstract":"The present work is concerned with a particular type of online collaborative engagements, namely the management of e-Health campaigns and online intervention studies. In order to establish the baseline, the paper critically reviews prominent tactics facilitated by Social Networking Services (SNS) and social web sites and contrasts them against the specific requirements of targeted online e-Health campaigns and intervention studies. Based on this analysis, the paper describes a web-based system that accommodates functionality and services to enable expert-patient collaboration and co-engagement in building online campaigns and conducting intervention studies. The value and benefits of this approach are illustrated using a case study of cancer patients searching for online nutritional support and collaborating with healthcare providers and other patients.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128068213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Virtual Drums Based on Natural Interaction 基于自然交互的虚拟鼓
Jacob Wilschrey, Cristian Rusu, Iván Mercado, R. Inostroza, Cristhy Jiménez Granizo
The paper presents the development of a virtual drums prototype, based on natural interaction, trough a Kinect device. Results of early tests are encouraging, but the prototype can definitively be improved. The project aims to serve as basis for future developments, and several projects are already undergoing at the School of Informatics Engineering of the Pontifical Catholic University of Valparaiso -- Chile.
本文介绍了一个基于自然交互的虚拟鼓原型的开发,通过Kinect设备。早期测试的结果令人鼓舞,但原型机肯定还有待改进。该项目旨在作为未来发展的基础,智利瓦尔帕莱索天主教大学信息工程学院已经在进行几个项目。
{"title":"Virtual Drums Based on Natural Interaction","authors":"Jacob Wilschrey, Cristian Rusu, Iván Mercado, R. Inostroza, Cristhy Jiménez Granizo","doi":"10.1109/iNCoS.2012.78","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.78","url":null,"abstract":"The paper presents the development of a virtual drums prototype, based on natural interaction, trough a Kinect device. Results of early tests are encouraging, but the prototype can definitively be improved. The project aims to serve as basis for future developments, and several projects are already undergoing at the School of Informatics Engineering of the Pontifical Catholic University of Valparaiso -- Chile.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131321354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption 基于密文-策略属性加密实现个人健康记录云平台
Chang-ji Wang, Xuan Liu, Wentao Li
Work on designing and implementing a patient-centric, personal health record cloud platform based on open-source Indivo X system. We adopt cipher text-policy attribute-based encryption to provide privacy protection and fine-grained access control.
设计并实现基于开源Indivo X系统的以患者为中心的个人健康记录云平台。我们采用基于密文-策略属性的加密来提供隐私保护和细粒度的访问控制。
{"title":"Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption","authors":"Chang-ji Wang, Xuan Liu, Wentao Li","doi":"10.1109/iNCoS.2012.65","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.65","url":null,"abstract":"Work on designing and implementing a patient-centric, personal health record cloud platform based on open-source Indivo X system. We adopt cipher text-policy attribute-based encryption to provide privacy protection and fine-grained access control.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133146509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Context Based Access Control in Pervasive Environments 普适环境中基于上下文的访问控制
Alexandru Petculescu
As current trends show, the Semantic Web is the future interaction environment used in data exchange and integration among homogenous applications. This trend raises new challenges in security models used for access control, and the only acceptable model is to take into account the semantic relations of the interacting entities. In this article we present the access control module used by the Mobile services framework presented in our previous paper: "Web services applied to mobile environments". Finally we present results obtained in the implementation of this module and our conclusions.
正如目前的趋势所示,语义Web是同质应用程序之间用于数据交换和集成的未来交互环境。这一趋势对访问控制使用的安全模型提出了新的挑战,唯一可接受的模型是考虑交互实体的语义关系。在本文中,我们介绍了在我们之前的论文“应用于移动环境的Web服务”中提出的移动服务框架所使用的访问控制模块。最后给出了本模块实施过程中所取得的成果和结论。
{"title":"Context Based Access Control in Pervasive Environments","authors":"Alexandru Petculescu","doi":"10.1109/iNCoS.2012.57","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.57","url":null,"abstract":"As current trends show, the Semantic Web is the future interaction environment used in data exchange and integration among homogenous applications. This trend raises new challenges in security models used for access control, and the only acceptable model is to take into account the semantic relations of the interacting entities. In this article we present the access control module used by the Mobile services framework presented in our previous paper: \"Web services applied to mobile environments\". Finally we present results obtained in the implementation of this module and our conclusions.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network 无线多跳网络中物理层网络编码和基于连通支配集的路由协议
Li Xu, Penggui Pan, Xiaoding Wang, Wei Wu
Physical-layer network coding (PNC) employs interactive communication among neighbor nodes by using a proper modulation-and-demodulation technique to improve the communication ability. Most traditional routing protocols in wireless network are designed to reduce or avoid signal interference but do not have the merit of the physical-layer network coding. As a result, the throughout of network can hardly be improved. In this paper we propose a routing protocol based on physical-layer network coding by introducing cross layer coordinated strategy for clustered wireless multi-hop network. Our approach can achieve better improvement of network throughput by comparing with non-coding and other existing network coding strategies.
物理层网络编码(PNC)采用适当的调制解调技术,实现相邻节点间的交互通信,提高通信能力。无线网络中传统的路由协议大多是为了减少或避免信号干扰而设计的,但不具备物理层网络编码的优点。因此,网络的通用性很难得到提高。本文通过引入跨层协调策略,提出了一种基于物理层网络编码的无线多跳网络路由协议。与非编码和其他现有的网络编码策略相比,我们的方法可以更好地提高网络吞吐量。
{"title":"Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network","authors":"Li Xu, Penggui Pan, Xiaoding Wang, Wei Wu","doi":"10.1109/iNCoS.2012.38","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.38","url":null,"abstract":"Physical-layer network coding (PNC) employs interactive communication among neighbor nodes by using a proper modulation-and-demodulation technique to improve the communication ability. Most traditional routing protocols in wireless network are designed to reduce or avoid signal interference but do not have the merit of the physical-layer network coding. As a result, the throughout of network can hardly be improved. In this paper we propose a routing protocol based on physical-layer network coding by introducing cross layer coordinated strategy for clustered wireless multi-hop network. Our approach can achieve better improvement of network throughput by comparing with non-coding and other existing network coding strategies.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2012 Fourth International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1