首页 > 最新文献

2009 International Conference on Future Computer and Communication最新文献

英文 中文
A Comparison of UWB Communication Characteristics for Different Distribution of People and Various Materials of Walls 不同人群分布和不同墙体材料的超宽带通信特性比较
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.129
Min-Hui Ho, Shu-Han Liao, Chien-Hung Chen, C. Chiu
A comparison of UWB communication characteristics for different distribution of people and various materials of walls in real environments are investigated. By using the impulse response of these multi-path channels, the mean excess delay, root mean square delay spread, and the number of multi-path arrivals within 10 dB of the peak multi-path arrival (NP10dB), and the number of paths required to meet the 85% energy capture threshold (NP(85%)) for these cases have been obtained. Numerical results have shown that the multi-path effect by people is an important factor for bit error rate (BER) and outage probability performance.
比较了真实环境中不同人群分布和不同墙体材料下的超宽带通信特性。利用这些多径通道的脉冲响应,得到了平均超额延迟、均方根延迟扩展、多径到达峰值10dB内的多径到达数(NP10dB),以及满足这些情况下85%能量捕获阈值(NP(85%))所需的路径数。数值结果表明,人的多径效应是影响误码率和中断概率性能的重要因素。
{"title":"A Comparison of UWB Communication Characteristics for Different Distribution of People and Various Materials of Walls","authors":"Min-Hui Ho, Shu-Han Liao, Chien-Hung Chen, C. Chiu","doi":"10.1109/ICFCC.2009.129","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.129","url":null,"abstract":"A comparison of UWB communication characteristics for different distribution of people and various materials of walls in real environments are investigated. By using the impulse response of these multi-path channels, the mean excess delay, root mean square delay spread, and the number of multi-path arrivals within 10 dB of the peak multi-path arrival (NP10dB), and the number of paths required to meet the 85% energy capture threshold (NP(85%)) for these cases have been obtained. Numerical results have shown that the multi-path effect by people is an important factor for bit error rate (BER) and outage probability performance.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"48 3-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123412039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Secure Mobile Payment System in Wireless Environment 无线环境下的安全移动支付系统
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.125
S. Manvi, L. B. Bhajantri, M. Vijayakumar
Mobile payments are payments that are carried out through mobile devices in wireless environment. Mobile payment is considered as the accelerator of e-commerce and m-commerce. Currently mobile payments deal with several problems to improve requirements of m-commerce such as: simplifying the mobile payment processes for consumers, improving the security of payment, especially the application of digital signing in mobile payment. The proposed work introduces alternative ways for providing mobile banking services aimed at J2ME enabled mobile phones over Bluetooth communication. The scope of the proposed solution is the combination of J2EE and J2ME capabilities, means of overcoming the API and technical limitations, as well as security consideration. This paper defines the secure mobile payment system to allow mobile users to conduct mobile transactions over Bluetooth communications but also supports the related secured transactions between the payment server and mobile clients. Finally, we have discussed some of the performance parameters such as: time required to password hack for various character lengths, delay and probability error rate.
移动支付是在无线环境下通过移动设备进行的支付。移动支付被认为是电子商务和移动商务的加速器。目前移动支付解决了几个问题,以提高移动商务的要求,如:简化消费者的移动支付流程,提高支付的安全性,特别是数字签名在移动支付中的应用。提议的工作介绍了通过蓝牙通信为支持J2ME的移动电话提供移动银行服务的替代方法。所建议的解决方案的范围是J2EE和J2ME功能的组合,克服API和技术限制的方法,以及安全性考虑。本文定义了安全移动支付系统,允许移动用户通过蓝牙通信进行移动交易,同时支持支付服务器与移动客户端之间的相关安全交易。最后,我们讨论了一些性能参数,如:针对不同字符长度的密码破解所需的时间、延迟和概率错误率。
{"title":"Secure Mobile Payment System in Wireless Environment","authors":"S. Manvi, L. B. Bhajantri, M. Vijayakumar","doi":"10.1109/ICFCC.2009.125","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.125","url":null,"abstract":"Mobile payments are payments that are carried out through mobile devices in wireless environment. Mobile payment is considered as the accelerator of e-commerce and m-commerce. Currently mobile payments deal with several problems to improve requirements of m-commerce such as: simplifying the mobile payment processes for consumers, improving the security of payment, especially the application of digital signing in mobile payment. The proposed work introduces alternative ways for providing mobile banking services aimed at J2ME enabled mobile phones over Bluetooth communication. The scope of the proposed solution is the combination of J2EE and J2ME capabilities, means of overcoming the API and technical limitations, as well as security consideration. This paper defines the secure mobile payment system to allow mobile users to conduct mobile transactions over Bluetooth communications but also supports the related secured transactions between the payment server and mobile clients. Finally, we have discussed some of the performance parameters such as: time required to password hack for various character lengths, delay and probability error rate.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128905867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Computational Calculations of Islamic Prayer Times - Issues and Solutions 伊斯兰礼拜时间的计算——问题和解决办法
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.85
Z. Ismaail, Zulhizam Sanip, Norashikin Yahaya, Ereneyanti Husmin, R. Kaspin, Noor Fazilatulakma Mohd Zaini, F. Bakar
This paper aims to describe the computational calculation of prayer times that will be applied to IMS application for a Location-based Content Utility Service Terminal. In order to calculate the prayer time, a number of properties that relate to the sun such as declination of angle should be taking in consideration. The solar declination reading is used to determine the time begins and time ends of each prayer times. The descriptions for start and end times for Salats is different according to different school.
本文旨在描述将应用于基于位置的内容实用服务终端的IMS应用中的祈祷时间的计算方法。为了计算祈祷时间,应考虑与太阳有关的一些属性,如角度赤纬。太阳赤纬读数用于确定每个祈祷时间的开始和结束时间。开学和结束时间的描述根据不同的学校是不同的。
{"title":"Computational Calculations of Islamic Prayer Times - Issues and Solutions","authors":"Z. Ismaail, Zulhizam Sanip, Norashikin Yahaya, Ereneyanti Husmin, R. Kaspin, Noor Fazilatulakma Mohd Zaini, F. Bakar","doi":"10.1109/ICFCC.2009.85","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.85","url":null,"abstract":"This paper aims to describe the computational calculation of prayer times that will be applied to IMS application for a Location-based Content Utility Service Terminal. In order to calculate the prayer time, a number of properties that relate to the sun such as declination of angle should be taking in consideration. The solar declination reading is used to determine the time begins and time ends of each prayer times. The descriptions for start and end times for Salats is different according to different school.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128963401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Adaptive Network Fuzzy Inference System (ANFIS) Handoff Algorithm 自适应网络模糊推理系统(ANFIS)切换算法
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.95
K. C. Foong, ChuahTeong Chee, L. Wei
Mobility management in the heterogeneous environment demands different design approach, especially in the handoff decision. This is to fulfill the different requirements of different segments especially in the hybrid satellite and terrestrial scenario. There are many works done to replace the traditional handoff algorithm such as hysteresis and fuzzy logic based handoff algorithm. The fuzzy handoff algorithm proposed by earlier work is not optimized and required constant attention from the human experts. This paper proposes a newer approach using Adaptive Network Fuzzy Inference System (ANFIS) where the training element is incorporated into the existing fuzzy handoff algorithm.
异构环境下的移动性管理需要不同的设计方法,特别是在切换决策方面。这是为了满足不同段的不同需求,特别是在卫星和地面混合场景下。为了取代传统的切换算法,人们做了很多工作,如基于滞后和模糊逻辑的切换算法。先前提出的模糊切换算法没有经过优化,需要人类专家的持续关注。本文提出了一种新的方法,使用自适应网络模糊推理系统(ANFIS),将训练元素合并到现有的模糊切换算法中。
{"title":"Adaptive Network Fuzzy Inference System (ANFIS) Handoff Algorithm","authors":"K. C. Foong, ChuahTeong Chee, L. Wei","doi":"10.1109/ICFCC.2009.95","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.95","url":null,"abstract":"Mobility management in the heterogeneous environment demands different design approach, especially in the handoff decision. This is to fulfill the different requirements of different segments especially in the hybrid satellite and terrestrial scenario. There are many works done to replace the traditional handoff algorithm such as hysteresis and fuzzy logic based handoff algorithm. The fuzzy handoff algorithm proposed by earlier work is not optimized and required constant attention from the human experts. This paper proposes a newer approach using Adaptive Network Fuzzy Inference System (ANFIS) where the training element is incorporated into the existing fuzzy handoff algorithm.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124531641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
New Factor of Authentication: Something You Process 新的认证因素:你处理的东西
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.79
S. Shah, Fazl-e-Hadi Riphah, A. A. Minhas
In traditional computing system, user Authentication is dependent on four authentication factors i.e., Something You have (e.g., a hardware token/credit card), Something You are (e.g., a fingerprint), and Something You know (e.g., a password/PIN code) and Somebody You know. In this paper we explore new factor of Authentication, that is, Something You process. Valid user identification is the demand of computing society and it plays a very key role in the arena of security. This study explores a new factor of authentication, human cognitive level of authentication for access control, and proposes new model of multilevel security. This study explores its usage in providing primary mode of authentication in a new and simplified way and discusses its pros and cons.
在传统的计算机系统中,用户认证依赖于四个认证因素,即:你拥有的东西(例如,硬件令牌/信用卡),你是什么(例如,指纹),你知道的东西(例如,密码/PIN码)和你认识的人。本文探索了一种新的认证因素,即“你处理的东西”。有效的用户身份识别是计算机社会的需求,在安全领域起着非常关键的作用。本文探讨了一个新的认证因素,即人对访问控制认证的认知水平,并提出了多层次安全的新模型。本文探讨了它在以一种新的、简化的方式提供主认证模式中的应用,并讨论了它的利弊。
{"title":"New Factor of Authentication: Something You Process","authors":"S. Shah, Fazl-e-Hadi Riphah, A. A. Minhas","doi":"10.1109/ICFCC.2009.79","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.79","url":null,"abstract":"In traditional computing system, user Authentication is dependent on four authentication factors i.e., Something You have (e.g., a hardware token/credit card), Something You are (e.g., a fingerprint), and Something You know (e.g., a password/PIN code) and Somebody You know. In this paper we explore new factor of Authentication, that is, Something You process. Valid user identification is the demand of computing society and it plays a very key role in the arena of security. This study explores a new factor of authentication, human cognitive level of authentication for access control, and proposes new model of multilevel security. This study explores its usage in providing primary mode of authentication in a new and simplified way and discusses its pros and cons.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"59 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121007966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The Theoretic and Empirical Analysis on the Impact of Network Virtual Money on Real Money Supply 网络虚拟货币对现实货币供给影响的理论与实证分析
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.45
Hui Peng, Yanli Sun
Existing literatures took network virtual money as a prepaid method which has no effects on real money supply. We argue that, the phenomenon that virtual money acts as a medium of exchange in the real goods trade and that real GDP affected by the virtual community should be taken into consideration when studying the effects of virtual money on real money supply. This paper classified the effect of virtual economy on real economy into three types: no substitution effect, positive substitution effect and negative substitution effect. The impact of virtual money on real money supply is mainly reflected in two aspects: First, the substitution effect of virtual economy on real economy affects the volume of real monetary base; Second, the net effect of crowding-out effect of virtual money and the behavior effect of issuers changes the internal monetary base structure of cash and reserve, leading to the cash-deposit ratio reduction and real monetary multiplier increase. Based on the analysis of data in China, we found that the effect of virtual economy on real economy is negative substitute currently, we also calculated the intensity of the crowding-out effect of virtual money to real money, verified that the crowding-out effect is greater than the behavior effect recently. Finally, new monetary statistical and monitoring indicator is advanced for Central Bank under the influence of virtual money, and the marginal substitution propensity of virtual money is advised to measure whether the volume of virtual money should be monitored and integrated into the amount of money supply.
现有文献将网络虚拟货币作为一种预付方式,对真实货币供给没有影响。我们认为,在研究虚拟货币对真实货币供给的影响时,应该考虑虚拟货币在真实商品交易中充当交换媒介的现象,以及虚拟社区对实际GDP的影响。本文将虚拟经济对实体经济的影响分为三种类型:无替代效应、正替代效应和负替代效应。虚拟货币对实体货币供给的影响主要体现在两个方面:一是虚拟经济对实体经济的替代效应影响实体货币基数的体量;第二,虚拟货币的挤出效应和发行人的行为效应的净效应改变了现金和准备金的内部货币基础结构,导致现金存款比率降低,实际货币乘数增加。通过对中国数据的分析,我们发现目前虚拟经济对实体经济的影响是负替代的,我们还计算了虚拟货币对真实货币的挤出效应强度,验证了最近的挤出效应大于行为效应。最后,为央行在虚拟货币的影响下提出了新的货币统计监测指标,建议用虚拟货币的边际替代倾向来衡量是否应该对虚拟货币的数量进行监测,并将其纳入货币供应量。
{"title":"The Theoretic and Empirical Analysis on the Impact of Network Virtual Money on Real Money Supply","authors":"Hui Peng, Yanli Sun","doi":"10.1109/ICFCC.2009.45","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.45","url":null,"abstract":"Existing literatures took network virtual money as a prepaid method which has no effects on real money supply. We argue that, the phenomenon that virtual money acts as a medium of exchange in the real goods trade and that real GDP affected by the virtual community should be taken into consideration when studying the effects of virtual money on real money supply. This paper classified the effect of virtual economy on real economy into three types: no substitution effect, positive substitution effect and negative substitution effect. The impact of virtual money on real money supply is mainly reflected in two aspects: First, the substitution effect of virtual economy on real economy affects the volume of real monetary base; Second, the net effect of crowding-out effect of virtual money and the behavior effect of issuers changes the internal monetary base structure of cash and reserve, leading to the cash-deposit ratio reduction and real monetary multiplier increase. Based on the analysis of data in China, we found that the effect of virtual economy on real economy is negative substitute currently, we also calculated the intensity of the crowding-out effect of virtual money to real money, verified that the crowding-out effect is greater than the behavior effect recently. Finally, new monetary statistical and monitoring indicator is advanced for Central Bank under the influence of virtual money, and the marginal substitution propensity of virtual money is advised to measure whether the volume of virtual money should be monitored and integrated into the amount of money supply.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127293587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Extensive Empirical Study for the Impact of Increasing Data Hidden on the Images Texture 增加隐藏数据对图像纹理影响的广泛实证研究
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.154
Fazidah Othman, Laiha Maktom, A. Taqa, B. Zaidan, A. A. Zaidan
Steganography is the art of hidden important information inside other innocuous media in an imperceptible way. In this paper we will overview the use of data hidden techniques in digital images. In particular we will describe on how can use the human vision system and pure Steganography to increase the size of the data that want to embed in the image. This paper will focused on the property of human vision system that help to increase the size of data hidden in the bitmap (.bmp) and (.JPG) image practically and improve the work by given result and make a brief discussion on this result. Image processing is involved in the texture analysis, it is important to quantitatively evaluate such differences using texture features. This paper also discuss the impact of increasing data hidden on the images texture for colour image and gray level image.
隐写术是以一种难以察觉的方式将重要信息隐藏在其他无害媒体中的艺术。在本文中,我们将概述数据隐藏技术在数字图像中的应用。特别是,我们将描述如何使用人类视觉系统和纯隐写术来增加想要嵌入图像中的数据的大小。本文将重点讨论人类视觉系统的特性,它有助于实际地增加位图(.bmp)和。jpg图像中隐藏的数据的大小,并通过给定的结果改进工作,并对该结果进行简要的讨论。图像处理涉及到纹理分析,利用纹理特征定量评价这些差异是很重要的。本文还讨论了彩色图像和灰度图像中数据隐藏量的增加对图像纹理的影响。
{"title":"An Extensive Empirical Study for the Impact of Increasing Data Hidden on the Images Texture","authors":"Fazidah Othman, Laiha Maktom, A. Taqa, B. Zaidan, A. A. Zaidan","doi":"10.1109/ICFCC.2009.154","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.154","url":null,"abstract":"Steganography is the art of hidden important information inside other innocuous media in an imperceptible way. In this paper we will overview the use of data hidden techniques in digital images. In particular we will describe on how can use the human vision system and pure Steganography to increase the size of the data that want to embed in the image. This paper will focused on the property of human vision system that help to increase the size of data hidden in the bitmap (.bmp) and (.JPG) image practically and improve the work by given result and make a brief discussion on this result. Image processing is involved in the texture analysis, it is important to quantitatively evaluate such differences using texture features. This paper also discuss the impact of increasing data hidden on the images texture for colour image and gray level image.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133617416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Performance Analysis of a General Tree Structure for Target Detection in Wireless Sensor Networks 一种用于无线传感器网络目标检测的通用树状结构性能分析
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.105
H. Varaee, G. Mirjalily, A. Tadaion
One of the basic tasks of a wireless sensor network is target detection, and one of the main issues must be addressed in a detection sensor network is its active topology. Here, we assume a simple hierarchical topology, where sensors that are close to each other will form a cluster and each cluster has its own cluster head, which serves as the local fusion center. Based on decisions received from sensors located within a specific cluster, the corresponding cluster head will make a decision about target presence/absence within that sub-region. The decisions from cluster heads will be further transmitted to the central fusion node to inform it if there is a target or event in specific sub-regions. In this paper, we propose a general tree structure to fuse decisions within a cluster. The aim is to investigate the effects of using different tree topologies in a cluster on the detection performance and energy consumption in a detection sensor network. We will find a tradeoff between high performance and low energy consumption. For this purpose, a function named energy-error has been defined. By finding the minimum value of this function, it is possible to achieve a tradeoff between performance and energy consumption
无线传感器网络的基本任务之一是目标检测,而检测传感器网络必须解决的主要问题之一是其主动拓扑。在这里,我们假设一个简单的分层拓扑结构,其中彼此接近的传感器将组成一个簇,每个簇都有自己的簇头,簇头作为局部融合中心。根据从位于特定集群内的传感器接收到的决定,相应的集群负责人将对该子区域内目标的存在/不存在做出决定。集群负责人的决定将进一步传输到中央融合节点,以通知它在特定子区域是否存在目标或事件。在本文中,我们提出了一种通用的树结构来融合集群内的决策。目的是研究在集群中使用不同的树拓扑对检测传感器网络的检测性能和能耗的影响。我们将在高性能和低能耗之间找到一个平衡点。为此,定义了一个名为energy-error的函数。通过找到该函数的最小值,可以在性能和能耗之间实现折衷
{"title":"Performance Analysis of a General Tree Structure for Target Detection in Wireless Sensor Networks","authors":"H. Varaee, G. Mirjalily, A. Tadaion","doi":"10.1109/ICFCC.2009.105","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.105","url":null,"abstract":"One of the basic tasks of a wireless sensor network is target detection, and one of the main issues must be addressed in a detection sensor network is its active topology. Here, we assume a simple hierarchical topology, where sensors that are close to each other will form a cluster and each cluster has its own cluster head, which serves as the local fusion center. Based on decisions received from sensors located within a specific cluster, the corresponding cluster head will make a decision about target presence/absence within that sub-region. The decisions from cluster heads will be further transmitted to the central fusion node to inform it if there is a target or event in specific sub-regions. In this paper, we propose a general tree structure to fuse decisions within a cluster. The aim is to investigate the effects of using different tree topologies in a cluster on the detection performance and energy consumption in a detection sensor network. We will find a tradeoff between high performance and low energy consumption. For this purpose, a function named energy-error has been defined. By finding the minimum value of this function, it is possible to achieve a tradeoff between performance and energy consumption","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133771277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of the Efficiency of Different Remote User and Server Authentication Schemes 不同远程用户和服务器认证方案的效率分析
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.144
C. Koner, C. Bhunia, U. Maulik
Authentication in sending information is a great research challenge. Many different authentication schemes have been invented to improve the security and efficiency due to increasing of threats and attacks with the increasing volume of traffic. There is a need for analysis the efficiency and security of authentication schemes to apply them in specific application. For this purpose, an analysis of few authentication schemes is made with several parameters of interest in this paper. We observe that no scheme is suitable for all applications neither any application is suitable invariably.
信息发送中的身份验证是一个很大的研究挑战。随着网络流量的增加,威胁和攻击也在不断增加,为了提高安全性和效率,人们发明了许多不同的身份验证方案。为了将认证方案应用到具体的应用中,需要对认证方案的效率和安全性进行分析。为此,本文用几个感兴趣的参数对几种认证方案进行了分析。我们注意到,没有一种方案适用于所有的应用,也没有一种应用总是适用的。
{"title":"Analysis of the Efficiency of Different Remote User and Server Authentication Schemes","authors":"C. Koner, C. Bhunia, U. Maulik","doi":"10.1109/ICFCC.2009.144","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.144","url":null,"abstract":"Authentication in sending information is a great research challenge. Many different authentication schemes have been invented to improve the security and efficiency due to increasing of threats and attacks with the increasing volume of traffic. There is a need for analysis the efficiency and security of authentication schemes to apply them in specific application. For this purpose, an analysis of few authentication schemes is made with several parameters of interest in this paper. We observe that no scheme is suitable for all applications neither any application is suitable invariably.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Rate Video Streaming Steganography 高速率视频流隐写术
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.44
Mohamed Elsadig Eltahir, Laiha Binti Mat Kiah, B. Zaidan, A. Zaidan
Steganography is the idea of hiding private or sensitive data or information within something that appears to be nothing out of the ordinary.In this paper we will overview the use of data hiding techniques in digital video as still images. We will describe how we can use the Least Significant Bit insertion (LSB) method on video images or frames, in addition to the usage of the human vision system to increase the size of the data embedded in digital video streaming.
隐写术是一种将私人或敏感数据或信息隐藏在看似没有什么不同寻常的东西中的想法。在本文中,我们将概述数据隐藏技术在数字视频中作为静止图像的使用。我们将描述如何在视频图像或帧上使用最低有效位插入(LSB)方法,以及如何使用人类视觉系统来增加数字视频流中嵌入的数据的大小。
{"title":"High Rate Video Streaming Steganography","authors":"Mohamed Elsadig Eltahir, Laiha Binti Mat Kiah, B. Zaidan, A. Zaidan","doi":"10.1109/ICFCC.2009.44","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.44","url":null,"abstract":"Steganography is the idea of hiding private or sensitive data or information within something that appears to be nothing out of the ordinary.In this paper we will overview the use of data hiding techniques in digital video as still images. We will describe how we can use the Least Significant Bit insertion (LSB) method on video images or frames, in addition to the usage of the human vision system to increase the size of the data embedded in digital video streaming.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123412581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
期刊
2009 International Conference on Future Computer and Communication
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1