Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1626961
Celia Li, Cungang Yang
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. Even though strong anonymity and privacy guarantees are critical for many applications, current Internet networking protocols provide no support for masking the identity of communication endpoints. In this paper, we proposed an enhanced IPSec protocol (EIPSec). It supports secure and anonymous communication on the Internet. In addition, the anonymity Internet communication provides high resistance against various attacks.
{"title":"An Enhanced IPSec for Anonymous Internet Communication","authors":"Celia Li, Cungang Yang","doi":"10.1109/EIT.2005.1626961","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626961","url":null,"abstract":"Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. Even though strong anonymity and privacy guarantees are critical for many applications, current Internet networking protocols provide no support for masking the identity of communication endpoints. In this paper, we proposed an enhanced IPSec protocol (EIPSec). It supports secure and anonymous communication on the Internet. In addition, the anonymity Internet communication provides high resistance against various attacks.","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125572104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1626985
A. Krings, Jean-Louis Roch, S. Jafar
This research addresses certification of large distributed applications executing in hostile environments, where tasks or the results they produce may have been corrupted due to benign or malicious act. We extend recent results addressing applications with task dependencies and introduce new probabilistic certification algorithms that establish whether the computations have been massively attacked. The probabilistic approach does not make any assumptions about task behavior as the result of an attack and certification errors are only due to unlucky random choices. Bounds associated with certification are provided for general graphs and for out-trees found in medical image analysis applications of the French ragtime project
{"title":"Certification of large distributed computations with task dependencies in hostile environments","authors":"A. Krings, Jean-Louis Roch, S. Jafar","doi":"10.1109/EIT.2005.1626985","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626985","url":null,"abstract":"This research addresses certification of large distributed applications executing in hostile environments, where tasks or the results they produce may have been corrupted due to benign or malicious act. We extend recent results addressing applications with task dependencies and introduce new probabilistic certification algorithms that establish whether the computations have been massively attacked. The probabilistic approach does not make any assumptions about task behavior as the result of an attack and certification errors are only due to unlucky random choices. Bounds associated with certification are provided for general graphs and for out-trees found in medical image analysis applications of the French ragtime project","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134034521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1627042
Dietmar P. F. Moeller
The paper presents the application of soft computing methodology in medicine. Applied to micro array data analysis one may introduce soft computing as part of sensitive networks and classifiers. While sensitized nets enable the conditioning of case study specific classifiers, scientists are able using specific linguistic IF-THEN rules to create appropriate fuzzy sets that can be helpful for use in micro array data analysis. Henceforth, scientists are empowered handling these classifiers in situ, phased to their measuring equipment and/or case study specific parameters, under case investigation
{"title":"Business objects as part of a preprocessing based micro array data analysis","authors":"Dietmar P. F. Moeller","doi":"10.1109/EIT.2005.1627042","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627042","url":null,"abstract":"The paper presents the application of soft computing methodology in medicine. Applied to micro array data analysis one may introduce soft computing as part of sensitive networks and classifiers. While sensitized nets enable the conditioning of case study specific classifiers, scientists are able using specific linguistic IF-THEN rules to create appropriate fuzzy sets that can be helpful for use in micro array data analysis. Henceforth, scientists are empowered handling these classifiers in situ, phased to their measuring equipment and/or case study specific parameters, under case investigation","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132335745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1626959
Guoping Wang
Computer arithmetic operations based on the binary sign-digit (BSD) numbers and carry-save addition (CSA) representation systems provide them with high-speed computations due to carry-propagation free features. However, in the previous researches, these two representations are treated respectively. In this paper, the algorithms and implementation structures are proposed for the conversion between them, thus, the arithmetic developed for one representation can be easily adapted to the other. The conversion overheads in the area and speed are also studied
{"title":"Carry-save and binary sign-digit representations conversion","authors":"Guoping Wang","doi":"10.1109/EIT.2005.1626959","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626959","url":null,"abstract":"Computer arithmetic operations based on the binary sign-digit (BSD) numbers and carry-save addition (CSA) representation systems provide them with high-speed computations due to carry-propagation free features. However, in the previous researches, these two representations are treated respectively. In this paper, the algorithms and implementation structures are proposed for the conversion between them, thus, the arithmetic developed for one representation can be easily adapted to the other. The conversion overheads in the area and speed are also studied","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"96 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114026558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1627031
Honglin Li, S. Aahlt
The omnipresent multimedia data calls for efficient and flexible methodologies to annotate, organize, store, and access video resources. Video annotation data, or video meta-data, plays an important role in the future annotation-driven video systems. Although the importance of the video annotation data is widely recognized and a considerable amount of research has been conducted on its various aspects, there is no consistent framework on which to structure video annotation data. In this paper, we have focused on investigating the nature of the video annotation data, and accordingly proposed one hierarchical structure for video annotations. Additionally, we have studied the techniques needed to hierarchically organize video annotations and proposed VideoML - an XML-based language - to organize the hierarchical video annotation data. VideoML is built upon the video part of MPEG-7 with special consideration of the video annotation data's hierarchical structure
{"title":"Hierarchical organization for video annotation","authors":"Honglin Li, S. Aahlt","doi":"10.1109/EIT.2005.1627031","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627031","url":null,"abstract":"The omnipresent multimedia data calls for efficient and flexible methodologies to annotate, organize, store, and access video resources. Video annotation data, or video meta-data, plays an important role in the future annotation-driven video systems. Although the importance of the video annotation data is widely recognized and a considerable amount of research has been conducted on its various aspects, there is no consistent framework on which to structure video annotation data. In this paper, we have focused on investigating the nature of the video annotation data, and accordingly proposed one hierarchical structure for video annotations. Additionally, we have studied the techniques needed to hierarchically organize video annotations and proposed VideoML - an XML-based language - to organize the hierarchical video annotation data. VideoML is built upon the video part of MPEG-7 with special consideration of the video annotation data's hierarchical structure","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128655135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1626983
Chung-Yen Chang
The most important asset in any computing environment is the data that is being processed. Lost information can be disastrous to any enterprise or corporate. Therefore, data protection is one of the most important tasks performed on any computer systems on a regular basis. The mechanisms used by data protection vary depending on the kind of data to be protected and the type of media used. Traditionally, data protection focuses mainly on backup applications which copies data to removable media that can be shelved and protected. By putting the copy on removable media, they are isolated from the problems that can cause data loss or corruption on the live system. Recent development and cost reduction in hard disk technologies and the growing concern over data safety have made it more attractive to perform data protections using online disk-based media. The author of this paper takes a broader view of data protection and surveys different technologies that are used at different places in a computer system to guard against data loss. Pros and cons of these technologies were analyzed and some best practice guidelines were provided for implementing data protection strategies
{"title":"A survey of data protection technologies","authors":"Chung-Yen Chang","doi":"10.1109/EIT.2005.1626983","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626983","url":null,"abstract":"The most important asset in any computing environment is the data that is being processed. Lost information can be disastrous to any enterprise or corporate. Therefore, data protection is one of the most important tasks performed on any computer systems on a regular basis. The mechanisms used by data protection vary depending on the kind of data to be protected and the type of media used. Traditionally, data protection focuses mainly on backup applications which copies data to removable media that can be shelved and protected. By putting the copy on removable media, they are isolated from the problems that can cause data loss or corruption on the live system. Recent development and cost reduction in hard disk technologies and the growing concern over data safety have made it more attractive to perform data protections using online disk-based media. The author of this paper takes a broader view of data protection and surveys different technologies that are used at different places in a computer system to guard against data loss. Pros and cons of these technologies were analyzed and some best practice guidelines were provided for implementing data protection strategies","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128759019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1626960
Yunqian Ma
Accurate link delivery ratio prediction is crucial to routing protocols in wireless mesh network. Since predicting delivery ratio directly usually requires excessive probing packets, it has been suggested to use packet SNR to predict delivery ratio, as SNR is a measure easy to obtain and "free" with every received packet. Unfortunately, several previous studies have shown that a simple direct mapping between SNR and delivery ratio values is often impossible. In this paper, we formulate the delivery ratio prediction problem as a classification problem (predicting link to be "good" or "bad), and apply various statistical classification algorithms (k-NN, kernel methods, and support vector machines) to it. We obtain the temporal data of link delivery ratios and SNR's from a measurement trace of a live wireless mesh network, and analyze the effectiveness of using SNR to enhance delivery ratio classification. Contrary to the pessimistic conclusion of previous works, we find that by incorporating SNR information in addition to historical delivery ratio data, the classification accuracy is improved in all the algorithms we used, with an average reduction of 8-10% of errors compared with using delivery ratio data alone. We therefore conclude that adding SNR can be an attractive alternative when designing a wireless link delivery ratio prediction protocol
{"title":"Improving wireless link delivery ratio classification with packet SNR","authors":"Yunqian Ma","doi":"10.1109/EIT.2005.1626960","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626960","url":null,"abstract":"Accurate link delivery ratio prediction is crucial to routing protocols in wireless mesh network. Since predicting delivery ratio directly usually requires excessive probing packets, it has been suggested to use packet SNR to predict delivery ratio, as SNR is a measure easy to obtain and \"free\" with every received packet. Unfortunately, several previous studies have shown that a simple direct mapping between SNR and delivery ratio values is often impossible. In this paper, we formulate the delivery ratio prediction problem as a classification problem (predicting link to be \"good\" or \"bad), and apply various statistical classification algorithms (k-NN, kernel methods, and support vector machines) to it. We obtain the temporal data of link delivery ratios and SNR's from a measurement trace of a live wireless mesh network, and analyze the effectiveness of using SNR to enhance delivery ratio classification. Contrary to the pessimistic conclusion of previous works, we find that by incorporating SNR information in addition to historical delivery ratio data, the classification accuracy is improved in all the algorithms we used, with an average reduction of 8-10% of errors compared with using delivery ratio data alone. We therefore conclude that adding SNR can be an attractive alternative when designing a wireless link delivery ratio prediction protocol","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129281756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carrier interferometry (CI) may be used to spread OFDM symbols over all N subcarriers to exploit frequency diversity without loss in throughput. In this paper, we implement the OFDM (uncoded and coded) system incorporated with the carrier interferometry and VBLAST (Vertical Bell Laboratories layered Space-Time) to undertake performance comparison in frequency selective fading channel. It is shown that the novel systems, offer considerable high throughput provided by VBLAST architecture. The novel systems simultaneously achieve dramatic performance gains by taking advantage of large frequency diversity inherent in the CI/OFDM technique. The proposed VBLAST-CI/OFDM system outperforms the VBLAST-OFDM system by 5 dB at a BER of 10-2 and 8 dB at BER of 10-3. The VBLAST-CI/COFDM system demonstrates a 4 dB performance gain at a BER of 10-3 over the VBLAST-COFDM system. VBLAST-CI/COFDM system offers a performance 2dB better than COFDM at a BER of 10-3 and simultaneously provides a throughput P(the number of transmit antennas) times that of COFDM at the expense of receiver complexity
{"title":"High-throughput high-performance VBLAST-OFDM via carrier interferometry","authors":"Peng Liang, Shaopeng Feng, Chuan-gang Zhao, Weilin Wu","doi":"10.1109/EIT.2005.1627026","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627026","url":null,"abstract":"Carrier interferometry (CI) may be used to spread OFDM symbols over all N subcarriers to exploit frequency diversity without loss in throughput. In this paper, we implement the OFDM (uncoded and coded) system incorporated with the carrier interferometry and VBLAST (Vertical Bell Laboratories layered Space-Time) to undertake performance comparison in frequency selective fading channel. It is shown that the novel systems, offer considerable high throughput provided by VBLAST architecture. The novel systems simultaneously achieve dramatic performance gains by taking advantage of large frequency diversity inherent in the CI/OFDM technique. The proposed VBLAST-CI/OFDM system outperforms the VBLAST-OFDM system by 5 dB at a BER of 10-2 and 8 dB at BER of 10-3. The VBLAST-CI/COFDM system demonstrates a 4 dB performance gain at a BER of 10-3 over the VBLAST-COFDM system. VBLAST-CI/COFDM system offers a performance 2dB better than COFDM at a BER of 10-3 and simultaneously provides a throughput P(the number of transmit antennas) times that of COFDM at the expense of receiver complexity","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116099831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1626975
K. Veeraraghavan, D. Peng, H. Sharif
Visual surveillance with a distributed ad hoc sensor network enable reliable monitoring and control of a variety of applications that range from civil to military. However, due to the large volume of multimedia data associated with visual sensors, the surveillance scheme has to be architected with a goal of energy conservation and extending life expectancy. In this paper, we briefly discuss the computation and communication energy costs associated with a sensor node and explore the possibilities of extending battery life by choosing to perform local processing. We propose a discrete wavelet transform (DWT) based multi-resolution surveillance schema designed to reduce power requirement. We then compare and contrast the computational and communication power expended by a traditionally used JPEG-based scheme and illustrate the significant power savings achieved by the proposed surveillance system
{"title":"Energy efficient multi-resolution visual surveillance on wireless sensor networks","authors":"K. Veeraraghavan, D. Peng, H. Sharif","doi":"10.1109/EIT.2005.1626975","DOIUrl":"https://doi.org/10.1109/EIT.2005.1626975","url":null,"abstract":"Visual surveillance with a distributed ad hoc sensor network enable reliable monitoring and control of a variety of applications that range from civil to military. However, due to the large volume of multimedia data associated with visual sensors, the surveillance scheme has to be architected with a goal of energy conservation and extending life expectancy. In this paper, we briefly discuss the computation and communication energy costs associated with a sensor node and explore the possibilities of extending battery life by choosing to perform local processing. We propose a discrete wavelet transform (DWT) based multi-resolution surveillance schema designed to reduce power requirement. We then compare and contrast the computational and communication power expended by a traditionally used JPEG-based scheme and illustrate the significant power savings achieved by the proposed surveillance system","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126797943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-05-22DOI: 10.1109/EIT.2005.1627027
D. Overbye
This paper presents a new method of compensating for complex multipath channel fading in blind multiuser detection for long-code DS-CDMA communication. The system employs detectors that incorporate methods of independent component analysis (ICA). Such detectors are subject to performance degradation as the length of the user spreading code increases. When compensated through a class of sparse priors, the long-code ICA neural network detectors displayed significantly better bit error rate performance. Performance of the long-code detectors approached that of the short-code detectors in some cases
{"title":"Incorporation of sparse priors in long-code blind multiuser detection for DS-CDMA communication","authors":"D. Overbye","doi":"10.1109/EIT.2005.1627027","DOIUrl":"https://doi.org/10.1109/EIT.2005.1627027","url":null,"abstract":"This paper presents a new method of compensating for complex multipath channel fading in blind multiuser detection for long-code DS-CDMA communication. The system employs detectors that incorporate methods of independent component analysis (ICA). Such detectors are subject to performance degradation as the length of the user spreading code increases. When compensated through a class of sparse priors, the long-code ICA neural network detectors displayed significantly better bit error rate performance. Performance of the long-code detectors approached that of the short-code detectors in some cases","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115124575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}