首页 > 最新文献

International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II最新文献

英文 中文
Online gaming cheating and security issue 网络游戏作弊和安全问题
Ying-Chieh Chen, Jing-Jang Hwang, R. Song, George Yee, L. Korba
Along with the development of multimedia, animation, and network bandwidth, online gaming has become a very successful and outstanding industry recently, especially in Asia Pacific. However, due to the lack of security consideration, legal regulation, management, auditing and related legislation, more and more players have violated the law or become the victims while they are indulging in the virtual world. Virtual properties are getting more and more valuable in the real-world marketplace, and trade or exchange of virtual properties between players have become prevalent. Unfortunately, using illegal fraudulent means or programs to grab others' UserID or password are increasing as well. This paper provides a detailed overview of the online cheating threat and the associated security flaws, examines its consequences for online businesses, and outlines technical solutions and implications.
随着多媒体、动画和网络带宽的发展,网络游戏最近已经成为一个非常成功和突出的行业,特别是在亚太地区。然而,由于缺乏安全考虑、法律监管、管理、审计和相关立法,越来越多的玩家在沉迷于虚拟世界的过程中违法或成为受害者。虚拟财产在现实世界的市场中变得越来越有价值,玩家之间的虚拟财产交易或交换变得越来越普遍。不幸的是,使用非法欺诈手段或程序获取他人的UserID或密码也在增加。本文详细概述了在线作弊威胁和相关的安全漏洞,研究了其对在线业务的影响,并概述了技术解决方案和影响。
{"title":"Online gaming cheating and security issue","authors":"Ying-Chieh Chen, Jing-Jang Hwang, R. Song, George Yee, L. Korba","doi":"10.1109/ITCC.2005.215","DOIUrl":"https://doi.org/10.1109/ITCC.2005.215","url":null,"abstract":"Along with the development of multimedia, animation, and network bandwidth, online gaming has become a very successful and outstanding industry recently, especially in Asia Pacific. However, due to the lack of security consideration, legal regulation, management, auditing and related legislation, more and more players have violated the law or become the victims while they are indulging in the virtual world. Virtual properties are getting more and more valuable in the real-world marketplace, and trade or exchange of virtual properties between players have become prevalent. Unfortunately, using illegal fraudulent means or programs to grab others' UserID or password are increasing as well. This paper provides a detailed overview of the online cheating threat and the associated security flaws, examines its consequences for online businesses, and outlines technical solutions and implications.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126692063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Integration of digital rights management into learning content management system 将数字版权管理集成到学习内容管理系统中
Zongkai Yang, Qingtang Liu, Kun Yan, Wanting Deng, Jing Jin
With the rapid increase of learning resources, the contradiction between learning content intelligent properties and its share and reuse becomes an outstanding event. In order to solve the problem, the authors probed into a way that is to integrate the DRM technologies and learning technology standards into the development of learning content management system. The authors also designed a novel online management system for broadcasting environments of virtual classroom or courseware on demand based on a browser/server framework, which carries out learning content management for reuse, share, interoperation and security. Particular emphases was placed on the strategies of integration of digital rights management and flexible commercial model by license services into applications, management, exchange and trade of Web-based learning content and try to solve the problem between reuse and protection.
随着学习资源的快速增长,学习内容的智能属性与其共享和重用之间的矛盾成为一个突出问题。为了解决这一问题,笔者探讨了将DRM技术和学习技术标准集成到学习内容管理系统开发中的方法。作者还设计了一种基于浏览器/服务器框架的虚拟课堂或课件点播环境在线管理系统,实现了学习内容的复用、共享、互操作和安全管理。重点研究了将数字版权管理和许可服务的灵活商业模式与网络学习内容的应用、管理、交流和交易相结合的策略,并试图解决重用与保护之间的问题。
{"title":"Integration of digital rights management into learning content management system","authors":"Zongkai Yang, Qingtang Liu, Kun Yan, Wanting Deng, Jing Jin","doi":"10.1109/ITCC.2005.176","DOIUrl":"https://doi.org/10.1109/ITCC.2005.176","url":null,"abstract":"With the rapid increase of learning resources, the contradiction between learning content intelligent properties and its share and reuse becomes an outstanding event. In order to solve the problem, the authors probed into a way that is to integrate the DRM technologies and learning technology standards into the development of learning content management system. The authors also designed a novel online management system for broadcasting environments of virtual classroom or courseware on demand based on a browser/server framework, which carries out learning content management for reuse, share, interoperation and security. Particular emphases was placed on the strategies of integration of digital rights management and flexible commercial model by license services into applications, management, exchange and trade of Web-based learning content and try to solve the problem between reuse and protection.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127048618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Web services for information retrieval 用于信息检索的Web服务
J. Ferreira, A. Silva, J. Delgado
The idea developed in this paper is the creation of standard information retrieval modules in a distributed manner in order to create testing systems to validate methods and algorithms. An investigator in information retrieval can construct a retrieval test system just by integrating different modules and manipulating the input variables of each module.
本文提出的思想是以分布式方式创建标准信息检索模块,以便创建测试系统来验证方法和算法。信息检索研究者只需将不同的模块集成起来,对每个模块的输入变量进行操作,就可以构建一个检索测试系统。
{"title":"Web services for information retrieval","authors":"J. Ferreira, A. Silva, J. Delgado","doi":"10.1109/ITCC.2005.297","DOIUrl":"https://doi.org/10.1109/ITCC.2005.297","url":null,"abstract":"The idea developed in this paper is the creation of standard information retrieval modules in a distributed manner in order to create testing systems to validate methods and algorithms. An investigator in information retrieval can construct a retrieval test system just by integrating different modules and manipulating the input variables of each module.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125686322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Inversion-free arithmetic on genus 3 hyperelliptic curves and its implementations 属3超椭圆曲线的无反转算法及其实现
Xinxin Fan, T. Wollinger, Yumin Wang
Recently, a lot of effort has been done to investigate all kinds of explicit formulae for speeding up group operation of hyperelliptic curve cryptosystem (HECC). In this paper, explicit formulae without using inversion for genus 3 HECC are given for the first time. When genus 3 HECC is defined over a prime field, our explicit formulae will cost respectively 122M + 9S, 105M + 8S and 110M + 11S to perform a group addition, mixed addition and doubling. If we use special genus 3 hyperelliptic curves with h(x) = 1 over a binary field, our explicit formulae will need only 119M + 9S, 102M + 8S and 42M + 15S for a group addition, mixed addition and doubling, respectively. In the second part of our contribution, we implement inversion-free arithmetic on genus 3 hyperelliptic curves defined over one prime field and three binary fields on a Pentium-M processor and compare the speed of explicit formulae in affine and projective coordinate system. The proposed explicit formulae show excellent performance on Pentium-M processors. We were able to get an increase in performance of over 40% compared to the affine coordinate case. Hence, our newly derived formulae are another step towards the use of HECC in practical applications.
近年来,人们对加速超椭圆曲线密码系统群运算的各种显式公式进行了大量的研究。本文首次给出了不使用反演的3属HECC的显式公式。当在素数域上定义属3 HECC时,我们的显式公式分别需要花费122M + 9S、105M + 8S和110M + 11S进行群加法、混合加法和加倍。如果我们在二元域上使用h(x) = 1的特殊格3超椭圆曲线,我们的显式公式将只需要119M + 9S, 102M + 8S和42M + 15S分别用于群加法,混合加法和加倍。在论文的第二部分,我们在Pentium-M处理器上实现了在一个素数域和三个二进制域上定义的格3超椭圆曲线的无反转算法,并比较了仿射和射影坐标系下显式公式的速度。所提出的显式公式在Pentium-M处理器上表现出优异的性能。与仿射坐标的情况相比,我们能够获得超过40%的性能提升。因此,我们新导出的公式是在实际应用中使用HECC的又一步。
{"title":"Inversion-free arithmetic on genus 3 hyperelliptic curves and its implementations","authors":"Xinxin Fan, T. Wollinger, Yumin Wang","doi":"10.1109/ITCC.2005.179","DOIUrl":"https://doi.org/10.1109/ITCC.2005.179","url":null,"abstract":"Recently, a lot of effort has been done to investigate all kinds of explicit formulae for speeding up group operation of hyperelliptic curve cryptosystem (HECC). In this paper, explicit formulae without using inversion for genus 3 HECC are given for the first time. When genus 3 HECC is defined over a prime field, our explicit formulae will cost respectively 122M + 9S, 105M + 8S and 110M + 11S to perform a group addition, mixed addition and doubling. If we use special genus 3 hyperelliptic curves with h(x) = 1 over a binary field, our explicit formulae will need only 119M + 9S, 102M + 8S and 42M + 15S for a group addition, mixed addition and doubling, respectively. In the second part of our contribution, we implement inversion-free arithmetic on genus 3 hyperelliptic curves defined over one prime field and three binary fields on a Pentium-M processor and compare the speed of explicit formulae in affine and projective coordinate system. The proposed explicit formulae show excellent performance on Pentium-M processors. We were able to get an increase in performance of over 40% compared to the affine coordinate case. Hence, our newly derived formulae are another step towards the use of HECC in practical applications.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125693133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Abstract state machine based next generation IPv6 network 基于下一代IPv6网络的抽象状态机
D. Guha, Qonita M. Shahab, J. Choi
We show the design of a network processing system in an IPv6 based media gateway based on abstract state machine (ASM) logic and show how the design features may help in scalability realization for end-to-end QoS issues in next generation networks. The novelty of the approach lies in the formal algorithmic definition of the processing hardware and generation of physical design unit from the data-driven algorithm function computation at compile time. The design in this paper is used to build an implementation prototype of an IPv6 media gateway with a feature of MPEG4 BIFS-MPEG4 LASeR transcoding, standardization activities of which are being currently pursued at the ISO MPEG MDS.
我们展示了基于抽象状态机(ASM)逻辑的基于IPv6的媒体网关的网络处理系统的设计,并展示了设计特征如何有助于下一代网络中端到端QoS问题的可扩展性实现。该方法的新颖之处在于对处理硬件进行了形式化的算法定义,并在编译时通过数据驱动的算法函数计算生成物理设计单元。本文的设计用于构建具有MPEG4 bfs -MPEG4激光转码功能的IPv6媒体网关的实现原型,目前ISO MPEG MDS正在进行该功能的标准化工作。
{"title":"Abstract state machine based next generation IPv6 network","authors":"D. Guha, Qonita M. Shahab, J. Choi","doi":"10.1109/ITCC.2005.56","DOIUrl":"https://doi.org/10.1109/ITCC.2005.56","url":null,"abstract":"We show the design of a network processing system in an IPv6 based media gateway based on abstract state machine (ASM) logic and show how the design features may help in scalability realization for end-to-end QoS issues in next generation networks. The novelty of the approach lies in the formal algorithmic definition of the processing hardware and generation of physical design unit from the data-driven algorithm function computation at compile time. The design in this paper is used to build an implementation prototype of an IPv6 media gateway with a feature of MPEG4 BIFS-MPEG4 LASeR transcoding, standardization activities of which are being currently pursued at the ISO MPEG MDS.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125303752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conversion and proxy functions for symmetric key ciphers 对称密钥密码的转换和代理函数
Debra L. Cook, A. Keromytis
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are scenarios in which this property is desirable and can be obtained without reducing the security of a cipher by increasing the computational workload of the cipher. We expand the idea of a symmetric key cipher being closed under functional composition to a more general scenario where there exists a function that converts the ciphertext resulting from encryption under a specific key to the ciphertext corresponding to encryption with another key. We show how to perform such a conversion without exposing the plaintext. We discuss the tradeoff between the computational workload and security, and the relationship between such conversions and proxy cryptography. We conclude with a description of some practical applications of our results.
作为一般设计准则,对称密钥密码在功能组合下不应关闭,这将影响密码的安全性。然而,在某些情况下,这种特性是需要的,并且可以在不通过增加密码的计算工作量来降低密码的安全性的情况下获得。我们将对称密钥密码在功能组合下封闭的思想扩展到更一般的场景,其中存在一个函数,该函数将在特定密钥下加密产生的密文转换为与另一个密钥加密对应的密文。我们将展示如何在不暴露明文的情况下执行这样的转换。我们将讨论计算工作量和安全性之间的权衡,以及此类转换与代理加密之间的关系。最后,我们描述了我们的结果的一些实际应用。
{"title":"Conversion and proxy functions for symmetric key ciphers","authors":"Debra L. Cook, A. Keromytis","doi":"10.1109/ITCC.2005.115","DOIUrl":"https://doi.org/10.1109/ITCC.2005.115","url":null,"abstract":"As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are scenarios in which this property is desirable and can be obtained without reducing the security of a cipher by increasing the computational workload of the cipher. We expand the idea of a symmetric key cipher being closed under functional composition to a more general scenario where there exists a function that converts the ciphertext resulting from encryption under a specific key to the ciphertext corresponding to encryption with another key. We show how to perform such a conversion without exposing the plaintext. We discuss the tradeoff between the computational workload and security, and the relationship between such conversions and proxy cryptography. We conclude with a description of some practical applications of our results.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126515187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A mobile commerce framework based on Web services architecture 基于Web服务体系结构的移动商务框架
Yao-Chung Chang, Jiann-Liang Chen, Wen-Ming Tseng
"Mobile Internet" arguably means more than just a new technique for communication; many analysts believe that it revolutionized the business world and innovate the way individuals live. This study concentrates on switching existing e-commerce applications from the wired Internet to the mobile Internet. Web services technologies are currently the most appropriate technologies to realize e-commerce applications. This study develops a mobile commerce application framework based on Web services technologies and mobile Internet functions. To investigate the feasibility of the proposed framework, an m-store implementation is deployed in a laboratory and simulated using HTTP transactions with secure sockets layer connections in a multi-user access environment. The minimum response time is stable (0.170 seconds for 5 users, 0.196 seconds for 50 users); the maximum throughput is invariable (0.365 Mbps for 5 users, 0.317 Mbps for 50 users), and the maximum transaction rate has little variation (5.882 per seconds for 5 users, 5.102 per seconds for 50 users). Results of this study demonstrate that the proposed framework is flexible, stable and scalable.
可以说,“移动互联网”不仅仅意味着一种新的通信技术;许多分析人士认为,它彻底改变了商业世界,革新了个人的生活方式。本研究的重点是将现有的电子商务应用从有线互联网转向移动互联网。Web服务技术是目前实现电子商务应用最合适的技术。本研究开发了一个基于Web服务技术和移动互联网功能的移动商务应用框架。为了研究所提出框架的可行性,在实验室中部署了m-store实现,并在多用户访问环境中使用带有安全套接字层连接的HTTP事务进行了模拟。最小响应时间稳定(5个用户0.170秒,50个用户0.196秒);最大吞吐量不变(5个用户为0.365 Mbps, 50个用户为0.317 Mbps),最大事务速率变化不大(5个用户为5.882每秒,50个用户为5.102每秒)。研究结果表明,该框架具有灵活性、稳定性和可扩展性。
{"title":"A mobile commerce framework based on Web services architecture","authors":"Yao-Chung Chang, Jiann-Liang Chen, Wen-Ming Tseng","doi":"10.1109/ITCC.2005.16","DOIUrl":"https://doi.org/10.1109/ITCC.2005.16","url":null,"abstract":"\"Mobile Internet\" arguably means more than just a new technique for communication; many analysts believe that it revolutionized the business world and innovate the way individuals live. This study concentrates on switching existing e-commerce applications from the wired Internet to the mobile Internet. Web services technologies are currently the most appropriate technologies to realize e-commerce applications. This study develops a mobile commerce application framework based on Web services technologies and mobile Internet functions. To investigate the feasibility of the proposed framework, an m-store implementation is deployed in a laboratory and simulated using HTTP transactions with secure sockets layer connections in a multi-user access environment. The minimum response time is stable (0.170 seconds for 5 users, 0.196 seconds for 50 users); the maximum throughput is invariable (0.365 Mbps for 5 users, 0.317 Mbps for 50 users), and the maximum transaction rate has little variation (5.882 per seconds for 5 users, 5.102 per seconds for 50 users). Results of this study demonstrate that the proposed framework is flexible, stable and scalable.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128784887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A new approach of color quantization based on ant colony clustering algorithm 一种基于蚁群聚类算法的颜色量化新方法
Xinrong Hu, Tianzhen Wang, Dehua Li
Color quantization is wildly exploited for many applications especially in the fields of computer graphics and image processing. After studying the approaches of color clustering, a new approach based on ant colony clustering algorithm applied in color image quantization is proposed in the paper. According to the picking up-dropping theory, a promoted ant algorithm is applied to group colors into certain clusters in RGB space. It finishes color quantization after colors mapping of every pixel. Our experiment shows that the algorithm proposed in this paper has rather good performance with an excellent robustness, a less time consumption, and a simple realization.
颜色量化在计算机图形学和图像处理领域有着广泛的应用。在研究颜色聚类方法的基础上,提出了一种基于蚁群聚类算法的彩色图像量化方法。根据拾取-丢弃理论,采用改进的蚁群算法在RGB空间中对颜色进行聚类。对每个像素进行颜色映射后,完成颜色量化。实验表明,本文提出的算法鲁棒性好、耗时少、实现简单,具有较好的性能。
{"title":"A new approach of color quantization based on ant colony clustering algorithm","authors":"Xinrong Hu, Tianzhen Wang, Dehua Li","doi":"10.1109/ITCC.2005.18","DOIUrl":"https://doi.org/10.1109/ITCC.2005.18","url":null,"abstract":"Color quantization is wildly exploited for many applications especially in the fields of computer graphics and image processing. After studying the approaches of color clustering, a new approach based on ant colony clustering algorithm applied in color image quantization is proposed in the paper. According to the picking up-dropping theory, a promoted ant algorithm is applied to group colors into certain clusters in RGB space. It finishes color quantization after colors mapping of every pixel. Our experiment shows that the algorithm proposed in this paper has rather good performance with an excellent robustness, a less time consumption, and a simple realization.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133529925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An improved polling scheme for voice support in IEEE 802.11 wireless network 一种改进的ieee802.11无线网络语音支持轮询方案
Jun Zheng, E. Regentova
In this paper, we present a polling scheme, which allows for augmenting the support of voice communications in point co-ordination function (PCF) of IEEE 802.11 wireless networks. In this scheme, the access point (AP) of the basic service set (BSS) maintains two polling lists, i.e. the talking list and the silence list. Based on the talking status of the stations identified via silence detection, the two lists are dynamically adjusted by the AP. Temporary removal is applied to the stations in the silence list to further upgrade the performance. The conducted study based on simulation has shown that the proposed scheme is able to support more voice stations and has a lower packet loss rate compared to that obtained by four reference polling algorithms.
在本文中,我们提出了一种轮询方案,该方案允许在IEEE 802.11无线网络的点协调功能(PCF)中增加对语音通信的支持。在该方案中,基本服务集(BSS)的接入点(AP)维护两个轮询列表,即通话列表和沉默列表。AP根据静默检测识别出的站点的通话状态,对两个列表进行动态调整,对静默列表中的站点进行临时移除,进一步提升性能。基于仿真的研究表明,与四种参考轮询算法相比,该方案能够支持更多的语音站,并且丢包率更低。
{"title":"An improved polling scheme for voice support in IEEE 802.11 wireless network","authors":"Jun Zheng, E. Regentova","doi":"10.1109/ITCC.2005.80","DOIUrl":"https://doi.org/10.1109/ITCC.2005.80","url":null,"abstract":"In this paper, we present a polling scheme, which allows for augmenting the support of voice communications in point co-ordination function (PCF) of IEEE 802.11 wireless networks. In this scheme, the access point (AP) of the basic service set (BSS) maintains two polling lists, i.e. the talking list and the silence list. Based on the talking status of the stations identified via silence detection, the two lists are dynamically adjusted by the AP. Temporary removal is applied to the stations in the silence list to further upgrade the performance. The conducted study based on simulation has shown that the proposed scheme is able to support more voice stations and has a lower packet loss rate compared to that obtained by four reference polling algorithms.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130330152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fuzzy image segmentation combining ring and elliptic shaped clustering algorithms 结合环形和椭圆形聚类算法的模糊图像分割
Mohammed Ameer Ali, L. Dooley, G. Karmakar
Results from any existing clustering algorithm that are used for segmentation are highly sensitive to features that limit their generalization. Shape is one important attribute of an object. The detection and separation of an object using fuzzy ring-shaped clustering (FKR) and elliptic ring-shaped clustering (FKE) already exists in the literature. Not all real objects however, are ring or elliptical in shape, so to address these issues, this paper introduces a new shape-based algorithm, called fuzzy image segmentation combining ring and elliptic shaped clustering algorithms (FCRE) by merging the initial segmented results produced by FKR and FKE. The distribution of unclassified pixels is performed by connectedness and fuzzy c-means (FCM) using a combination of pixel intensity and normalized pixel location. Both qualitative and quantitative analysis of the results for different varieties of images proves the superiority of the proposed FCRE algorithm compared with both FKR and FKE.
任何现有的用于分割的聚类算法的结果都对限制其泛化的特征高度敏感。形状是物体的一个重要属性。利用模糊环形聚类(FKR)和椭圆环形聚类(FKE)对目标进行检测和分离的方法已有文献。然而,并不是所有的真实物体都是环形或椭圆形的,因此为了解决这些问题,本文通过合并FKR和FKE的初始分割结果,引入了一种新的基于形状的算法,称为模糊图像分割结合环形和椭圆形聚类算法(FCRE)。通过连通性和模糊c均值(FCM),结合像素强度和归一化像素位置,实现未分类像素的分布。对不同类型图像的定性和定量分析结果都证明了fre算法相对于FKR和FKE算法的优越性。
{"title":"Fuzzy image segmentation combining ring and elliptic shaped clustering algorithms","authors":"Mohammed Ameer Ali, L. Dooley, G. Karmakar","doi":"10.1109/ITCC.2005.157","DOIUrl":"https://doi.org/10.1109/ITCC.2005.157","url":null,"abstract":"Results from any existing clustering algorithm that are used for segmentation are highly sensitive to features that limit their generalization. Shape is one important attribute of an object. The detection and separation of an object using fuzzy ring-shaped clustering (FKR) and elliptic ring-shaped clustering (FKE) already exists in the literature. Not all real objects however, are ring or elliptical in shape, so to address these issues, this paper introduces a new shape-based algorithm, called fuzzy image segmentation combining ring and elliptic shaped clustering algorithms (FCRE) by merging the initial segmented results produced by FKR and FKE. The distribution of unclassified pixels is performed by connectedness and fuzzy c-means (FCM) using a combination of pixel intensity and normalized pixel location. Both qualitative and quantitative analysis of the results for different varieties of images proves the superiority of the proposed FCRE algorithm compared with both FKR and FKE.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116903147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1