Table of Contents - Part I

Size: px
Start display at page:

Download "Table of Contents - Part I"

Transcription

1 Table of Contents - Part I Workshop on Geographical Analysis, Urban Modeling, Spatial statistics (GEO-AN-MOD 2009) Using Causality Relationships for a Progressive Management of Hazardous Phenomena with Sensor Networks 1 Nafaa Jabeur and Hedi Haddad Design and Development of an Intelligent Extension for Mapping Landslide Susceptibility Using Artificial Neural Network 17 Mohammad H. Vahidnia, Ali A. Alesheikh, Abbas Alimohammadi, and Farhad Hosseinali Integrating Fuzzy Logic and GIS Analysis to Assess Sediment Characterization within a Confined Harbour 33 Nicoletta Gazzea, Andrea Taramelli, Emiliana Valentini, and Maria Elena Piccione Integrated Geological, Geomorphological and Geostatistical Analysis to Study Macroseismic Effects of 1980 Irpinian Earthquake in Urban Areas (Southern Italy) 50 Maria Danese, Maurizio Lazzari, and Beniamino Murgante Using GIS to Develop an Efficient Spatio-temporal Task Allocation Algorithm to Human Groups in an Entirely Dynamic Environment Case Study: Earthquake Rescue Teams 66 Ali Reza Vafaeinezhad, Ali Asghar Alesheikh, Majid Hamrah, Reza Nourjou, and Rouzbeh Shad A GIS-Based SW Prototype for Emergency Preparedness Management Applied to a Real Case Study 79 Marco Scaioni, Mario Alba, Renato Rota, and Simona Caragliano Spatial Analysis of Humidity and Temperature of Iran 94 Amir Kavousi and Mohammad Reza Meshkani An Evaluation of the Performance of the CHIMERE Model over Spain Using Meteorology from MM5 and WRF Models 107 Marta G. Vivanco, Inmaculada Palomino, Fernando Martin, Magdalena Palacios, Oriol Jorba, Pedro Jiménez, José María Baldasano, and Oier Azula Parameter-Less GA Based Crop Parameter Assimilation with Satellite Image 118 Shamim Akhter, Keigo Sakamoto, Yann Chemin, and Kento Aida Bibliografische Informationen digitalisiert durch

2 XIV Table of Contents - Part I Compactness and Flow Minimization Requirements in Reforestation Initiatives: An Integer Programming (IP) Formulation 132 Pablo Vanegas, Dirk Cattrysse, and Jos Van Orshoven Application of the Urban Green Assessment Model for the Korean Newtowns 148 Sangkeun Eom and Seungil Lee Modeling Un-authorized Land Use Sprawl with Integrated Remote Sensing-GIS Technique and Cellular Automata 163 Norzailawati Mohd. Noor and Mazlan Hashim A Study on the Driving Forces of Urban Expansion Using Rough Sets 176 Yong Ge and Feng Cao Assessing the Impact of Individual Attitude towards Otherness on the Structure of Urban Residential Space: A Multi-actor Model 189 André Ourednik Incorporation of Morphological Properties of Buildings' Descriptors Computed from GIS and LIDAR Data on an Urban Multi-agent Vector Based Geo-simulator 205 Claudio Carneiro, Vitor Silva, and François Golay A Spatial Structural and Statistical Approach to Building Classification of Residential Function for City-Scale Impact Assessment Studies 221 Dimitrios P. Triantakonstantis and Stuart L. Barr Spatial Distribution of Social Benefit Given by Urban Attractions: A Test of UrAD Model 237 Luca D'Acci Economic Evaluation and Statistical Methods for Detecting Hot Spots of Social and Housing Difficulties in Urban Policies 253 Silvestro Montrone, Massimo Bilancia, Paola Perchinunno, and Carmelo Maria Torre An Urban Study of Crime and Health Using an Exploratory Spatial Data Analysis Approach 269 Su- Yin Tan and Robert Haining Geospatial Crime Scene Investigation - From Hotspot Analysis to Interactive 3D Visualization 285 Markus Wolff and Hartmut Asche Agent-Based Distributed Component Services in Spatial Modeling 300 Allan J. Brimicom.be, Yang Li, Abdullah Al-Zakwani, and Chao Li

3 Table of Contents - Part I XV A Cellular Automata-Ready GIS Infrastructure for Geosimulation and Territorial Analysis 313 Ivan Blecic, Andrea Borruso, Arnaldo Cecchini, Antonio D'Argenio, Fabio Montagnino, and Giuseppe A. Trunfio An Integrated Methodology for Medieval Landscape Reconstruction: The Case Study of Monte Sérico 328 Maria Danese, Marilisa Biscione, Rossella Coluzzi, Rosa Lasaponara, Beniamino Murgante, and Nicola Masini Neural Network Based Cellular Automata Model for Dynamic Spatial Modeling in GIS 341 Yogesh Mahajan and Parvatham Venkatachalam A Model-Based Scan Statistics for Detecting Geographical Clustering of Disease 353 Massimo Bilancia, Silvestro Montrone, and Paola Perchinunno New Prospects in Territorial Resource Management: The Semantic Web GIS 369 Ernesto Marcheggiani, Michèle Nucci, and Andrea Galli Analysing the Role of Accessibility in Contemporary Urban Development 385 Henning Sten Hansen An Indoor Crowd Simulation Using a 2D-3D Hybrid Data Model 397 Chulmin Jun and Hyeyoung Kim Measuring Effectiveness of Pedestrian Facilities Using a Pedestrian Simulation Model 413 Seunjae Lee, Seunjun Lee, and Shinhae Lee Impact of the Norm on Optimal Locations 426 Marc Ciligot-Travain and Didier Josselin Designing Road Maintenance Data Model Using Dynamic Segmentation Technique 442 Mohammad Reza Jelokhani-Niaraki, AH Asghar Alesheikh, Abbas Alimohammadi, and Abolghasem Sadeghi-Niaraki GeoSOM Suite: A Tool for Spatial Clustering 453 Roberto Henriques, Fernando Baçâo, and Victor Lobo Handling Spatial-Correlated Attribute Values in a Rough Set 467 Hexiang Bai and Yong Ge Rough Qualitative Spatial Reasoning Based on Rough Topology 479 Anahid Bassiri, Mohammad R. Malek, and Ali A. Alesheikh

4 XVI Table of Contents - Part I An Integrative Approach to Geospatial Data Fusion 490 Silvija Stankutè and Hartmut Asche Designing Data Warehouses for Geographic OLAP Querying by Using MDA 505 Octavio Glorio and Juan Trujillo Turning Point Clouds into 3d Models: The Aqueduct of Segovia 520 Juan Mancera-Taboada, Pablo Rodriguez-Gonzálvez, and Diego González-Aguilera Design and Implementation of a GSM Based Automatic Vehicle Location System 533 Ali Mousavi, Mohammad A. Rajabi, and Mohammad Akbari Temporal Relationships between Rough Time Intervals 543 Anahid Bassiri, Mohammad R. Malek, Ali A. Alesheikh, and Pouria Amirian Inverse Transformation for Several Pseudo-cylindrical Map Projections Using Jacobian Matrix 553 Cengizhan Ipbuker Workshop on Wireless and Ad Hoc Networking (WAD 2009) A Cluster-Based Mobility Model for Intelligent Nodes 565 Morteza Romoozi, Hamideh Babaei, Mahmood Fathy, and Mojtaba Romoozi A Scalability Analysis of TDMA-Based Ad Hoc MAC Protocols 580 Sang-Chul Kim and Chong-Woo Woo Noun and Keyword Detection of Korean in Ubiquitous Environment Seong-Yoon Shin, Oh-Hyung Kang, Sang-Joon Park, Jong-Chan Lee, Seong-Bae Pyo, and Yang- Won Rhee Phased Scene Change Detection in Ubiquitous Environments 604 Seong-Yoon Shin, Ji-Hyun Lee, Sang-Joon Park, Jong-Chan Lee, Seong-Bae Pyo, and Yang- Won Rhee A File Carving Algorithm for Digital Forensics 615 Deok-Gyu Park, Sang-Joon Park, Jong-Chan Lee, Si-Young No, and Seong-Yoon Shin Data Discovery and Related Factors of Documents on the Web and the Network 627 Hyun-Joo Moon, Sae-Hun Yeom, Jongmyung Choi, and Chae-Woo Yoo

5 Table of Contents - Part I XVII Thorough Analysis of IEEE EDCA in Ring Topology Scenarios with Hidden and Exposed Nodes 636 Katarzyna Kosek, Marek Natkaniec, and Luca Vollem Issues for Applying Instant Messaging to Smart Home Systems 649 Jongmyung Choi, Sangjoon Park, Hoon Ko, Hyun-Joo Moon, and Jongchan Lee The Scheme of Handover Performance Improvement in WiBro 662 Wongil Park Workshop on PULSES V- Logical, Scientific and Computational Aspects of Pulse Phenomena in Transitions (PULSES 2009) Study of the Correlation between the Concrete Wall Thickness Measurement Results by Ultrasonic Pulse Echo and the PTF Model for Assymetrical Functions 671 Ludan Pusca Detection Weak Period Signal Using Chaotic Oscillator 685 Qizhong Liu and Wanqing Song Energy Metrics and Sustainability 693 Mory Ghomshei and Francesco Villecco The Ultrasonic Measurement for Object Vibration 699 Li-Ping Zhang and Qiu Yu The Generalized Wavelets Based on Meyer Wavelet 708 Xudong Teng and Xiao Yuan Reconstructing Microwave Near-Field Image Based on the Discrepancy of Radial Distribution of Dielectric Constant 717 Zhifu Tao, Qifeng Pan, Meng Yao, and Ming Li Fractals Based on Harmonic Wavelets 729 Carlo Cattani Modelling Hodgkin-Huxley Neurons Interaction 745 Gianni Mattioli and Massimo Scalia Workshop on High-Performance Computing and Information Visualization (HPCIV 2009) Fourth Order Approximation with Complexity Reduction Approach for the Solution of Time Domain Maxwell Equations in Free Space 752 Mohammad Khatim Hasan, Mohamed Othman, Zulkifly Abbas. Jumat Sulaiman, and Fatimah Ahmad

6 XVIII Table of Contents - Part I Nine Point-EDGSOfl: Iterative Method for the Finite Element Solution of 2D Poisson Equations 764 Jumat Sulaiman, Mohamed Othman, and Mohammad Khatim Hasan An Online and Predictive Method for Grid Scheduling Based on Data Mining and Rough Set 775 Asgarali Bouyer, Mohammadbagher Karimi, and Mnsour Jalali A Survey of Cloud Platforms and Their Future 788 Milad Pastaki Rad, Ali Sajedi Badashian, Gelare Meydanipour, Morteza Ashurzad Delcheh, Mahdi Alipour, and Hamidreza Afzali Workshop on Sensor Network and its Applications (SNA 2009) An Efficient Clustering Protocol with Reduced Energy and Latency for Wireless Sensor Networks 797 A. Allirani and M. Suganthi Dynamic Threshold Control-Based Adaptive Message Filtering in Mobile Sensor Networks 810 Sung Ho Jang, Yong Beam Ma, and Jong Sik Lee Design of a Reliable Traffic Control System on City Area Based on a Wireless Network 821 Junghoon Lee, In-Hye Shin, and Cheol Min Kim Design of a Cache Management Scheme for Gateways on the Vehicular Telematics Network 831 Junghoon Lee, In-Hye Shin, Gyung-Leen Park, Ik-Chan Kim, and Yoon-Jung Rhee An Efficient Topology Control and Dynamic Interval Scheduling Scheme for 6L0WPAN 841 Sun-Min Hwang and Eui-Nam Huh Relationship Based Privacy Management for Ubiquitous Society 853 Yuan Tian, Biao Song, and Eui-Nam Huh Real-Time Monitoring of Ubiquitous Wearable ECG Sensor Node for Healthcare Application 868 Do-Un Jeong and Hsein-Ping Kew Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment 885 Seong-Soo Park, Jong-Hyouk Lee, and Tai-Myoung Chung

7 Table of Contents - Part I XIX Workshop on Collective Evolutionary Systems (IWCES 2009) A Triangular Formation Strategy for Collective Behaviors of Robot Swarm 897 Xiang Li, M. Fikret Ercan, and Yu Fai Fung P2P Incentive Mechanism for File Sharing and Cooperation 912 Junghwa Shin, Taehoon Kim, and Sungwoo Tak Modeling Agents' Knowledge in Collective Evolutionary Systems 924 Rajdeep Niyogi and Alfredo Milani Collective Evolutionary Indexing of Multimedia Objects 937 C.H.C. Leung, W.S. Chan, and J. Liu A Hybrid Approach for Selecting Optimal COTS Products 949 Pankaj Gupta, Mukesh Kumar Mehlawat, Garima Mittal, and Shilpi Verma Author Index 963

8 Table of Contents - Part II Workshop on Software Engineering Processes and Applications (SEPA 2009) Ontology-Based Requirements Conflicts Analysis in Activity Diagrams 1 Chi-Lun Liu Resource Allocation Optimization for GSD Projects 13 Supraja Doma, Larry Gottschalk, Tetsutaro Uehara, and Jigang Liu Verification of Use Case with Petri Nets in Requirement Analysis 29 Jinqiang Zhao and Zhenhua Duan Towards Guidelines for a Development Process for Component-Based Embedded Systems 43 Rikard Land, Jan Carlson, Stig Larsson, and Ivica Crnkovic Effective Project Leadership in Computer Science and Engineering 59 Ferid Cafer and Sanjay Misra Weyuker's Properties, Language Independency and Object Oriented Metrics 70 Sanjay Misra Workshop on Molecular Simulations Structures and Processes (MOSSAP 2009) Lattice Constant Prediction of A 2 BB'O6 Type Double Perovskites 82 Abdul Majid, Muhammad Farooq Ahmad, and Tae-Sun Choi A Grid Implementation of Direct Semiclassical Calculations of Rate Coefficients 93 Alessandro Costantini, Noelia Faginas Lago, Antonio Lagana, and Fermín Huarte-Larrañaga A Grid Implementation of Direct Quantum Calculations of Rate Coefficients 104 Alessandro Costantini, Noelia Faginas Lago, Antonio Lagana, and Fermín Huarte-Larrañaga A Grid Implementation of Chimère: Ozone Production in Central Italy 115 Antonio Lagana, Stefano Crocchianti, Alessandro Costantini, Monica Angelucei, and Marco Vecchiocattivi

9 XXII Table of Contents - Part II Workshop on Internet Communication Security (WICS 2009) MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT 130 Sergio Pozo, A.J. Várela-Vaca, and Rafael M. Gasea Testing Topologies for the Evaluation of IPSEC Implementations 145 Fernando Sánchez-Chaparro, José M. Sierra, Oscar Delgado-Mohatar, and Amparo Fúster-S'abater Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public Key 155 Miguel Viedma Astudillo, Jesús Téllez Isaac, Diego Suarez Touceda, and Héctor Plaza López Workshop on Security and Privacy in Pervasive Computing Environments (SPPC 2009) Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-Server Environment 164 Youngsook Lee and Dongho Won Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords 173 Junghyun Nam, Sangchul Han, Minkyu Park, Juryon Paik, and Ung Mo Kim Smart Card Based AKE Protocol Using Biometrie Information in Pervasive Computing Environments 182 Wansuck Yi, Seungjoo Kim, and Dongho Won A Practical Approach to a Reliable Electronic Election 191 Kwangwoo Lee, Yunho Lee, Seungjoo Kim, and Dongho Won Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key 204 Mijin Kim, Heasuk Jo, Seungjoo Kim, and Dongho Won Workshop on Mobile Communications (MC 2009) Performance of STBC PPM-TH UWB Systems with Double Binary Turbo Code in Multi-user Environments 212 Eun Cheol Kim and Jin Young Kim Performance Evaluation of PN Code Acquisition with Delay Diversity Receiver for TH-UWB System 226 Eun Cheol Kim and Jin Young Kim

10 Table of Contents - Part II XXIII Performance Analysis of Binary Negative-Exponential Backoff Algorithm in IEEE a WLAN under Erroneous Channel Condition 237 Bum-Gon Choi, Sueng Jae Bae, Tae-Jin Lee, and Min Young Chung A Resource-Estimated Call Admission Control Algorithm in 3GPP LTE System 250 Sueng Jae Bae, Jin Ju Lee, Bum-Gon Choi, Sungoh Kwon, and Min Young Chung Problems with Correct Traffic Differentiation in Line Topology IEEE EDCA Networks in the Presence of Hidden and Exposed Nodes 261 Katarzyna Kosek, Marek Natkaniec, and Luca Vollem Adaptive and Iterative GSC/MRC Switching Techniques Based on CRC Error Detection for AF Relaying System 276 Jong Sung Lee and Dong In Kim WiBro Net.-Based Five Senses Multimedia Technology Using Mobile Mash-Up 286 Jung-Hyun Kim, Hyeong-Joon Kwon, and Kwang-Seok Hong Overlay Ring Based Secure Group Communication Scheme for Mobile Agents 302 Hyunsu Jang, Kwang Sun Ko, Young-woo Jung, and Young Ik Eom Enhanced Multiple-Shift Scheme for Rapid Code Acquisition in Optical CDMA Systems 314 Dahae Chong, Taeung Yoon, Youngyoon Lee, Chonghan Song, Myungsoo Lee, and Seokho Yoon AltBOC and CBOC Correlation Functions for GNSS Signal Synchronization 325 Youngpo Lee, Youngyoon Lee, Taeung Yoon, Chonghan Song, Sanghun Kim, and Seokho Yoon Performance Enhancement of IEEE b WLANs Using Cooperative MAC Protocol 335 Jin-Seong Kim and Tae-Jin Lee Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks 345 Seong-Soo Park, Jong-Hyouk Lee, and Tai-Myoung Chung On Relocation of Hopping Sensors for Balanced Migration Distribution of Sensors 361 Moonseong Kim and Matt W. Mutka

11 XXIV Table of Contents - Part II Hybrid Hard/Soft Decode-and-Forward Relaying Protocol with Distributed Turbo Code 372 Taekhoon Kim and Dong In Kim Design of an Efficient Multicast Scheme for Vehicular Telematics Networks 383 Junghoon Lee, In-Hye Shin, Hye-Jin Kim, Min-Jae Kang, and Sang Joon Kim ODDUGI: Ubiquitous Mobile Agent System 393 SungJin Choi, Hyunseung Choo, MaengSoon Baik, HongSoo Kim, and EunJoung Byun Determination of the Optimal Hop Number for Wireless Sensor Networks 408 Jin Wang and Young-Koo Lee Localization in Sensor Networks with Fading Channels Based on Nonmetric Distance Models 419 Viet-Duc Le, Young-Koo Lee, and Sungyoung Lee A Performance Comparison of Swarm Intelligence Inspired Routing Algorithms for MANETs 432 Jin Wang and Sungyoung Lee Analysis of Moving Patterns of Moving Objects with the Proposed Framework 443 In-Hye Shin, Gyung-Leen Park, Abhijit Saha, Ho-young Kwak, and Hanil Kim A User-Defined Index for Containment Queries in XML 453 Gap-Joo Na and Sang- Won Lee On Optimal Placement of the Monitoring Devices on Channels of Communication Network 465 Alexey Rodionov, Olga Sokolova, Anastasia Yurgenson, and Hyunseung Choo Low Latency Handover Scheme Based on Optical Buffering at LMA in Proxy MIPv6 Networks 479 Seungtak Oh and Hyunseung Choo A Capacity Aware Data Transport Protocol for Wireless Sensor Network 491 Md. Obaidur Rahman, Muhammad Mostafa Monowar, and Choong Seon Hong

12 Table of Contents - Part II XXV Data Distribution of Road-Side Information Station in Vehicular Ad Hoc Networks (VANETs) 503 Abhijit Saha, Gyung-Leen Park, Khi-Jung Ahn, Chul Soo Kim, Bongkyu Lee, and Yoon-Jung Rhee VC-GTS: Virtual Cut-Through GTS Allocation Scheme for Voice Traffic in Multihop IEEE Systems 513 Junwoo Jung, Hoki Baek, and Jaesung Lim Towards Location-Based Real-Time Monitoring Systems in u-lbs 525 MoonBae Song and Hyunseung Choo General Track on Computational Methods, Algorithms and Applications A Fast Approximation Algorithm for the k Partition-Distance Problem 537 Yen Hung Chen A PSO - Line Search Hybrid Algorithm 547 Ximing Liang, Xiang Li, and M. Fikret Ercan Using Meaning of Coefficients of the Reliability Polynomial for Their Faster Calculation 557 Alexey Rodionov, Olga Rodionova, and Hyunseung Choo A Novel Tree Graph Data Structure for Point Datasets 572 Saeed Behzadi, Ali A. Alesheikh, and Mohammad R. Malek Software Dependability Analysis Methodology 580 Beoungil Cho, Hyunsang Youn, and Eunseok Lee New Approach for the Pricing of Bond Option Using the Relation between the HJM Model and the BGM Model 594 Kisoeb Park, Seki Kim, and William T. Shaw Measuring Anonymous Systems with the Probabilistic Applied Pi Calculus 605 Xiaojuan Cai and Yonggen Gu YAO: A Software for Variational Data Assimilation Using Numerical Models 621 Luigi Nardi, Charles Sorror, Fouad Badran, and Sylvie Thiria General Track on High Performance Technical Computing and Networks CNP: A Protocol for Reducing Maintenance Cost of Structured P2P Yu Zhang, Yuanda Cao, and Baodong Cheng

13 XXVI Table of Contents - Part II A Research on Instability of Small Flow in SCADA and an Optimizing Design for Control 653 Youqiang Guo, Zijun Zhang, and Xuezhu Pei On-Demand Chaotic Neural Network for Broadcast Scheduling Problem 664 Kushan Ahmadian and Marina Gavrilova General Track on Advanced and Emerging Applications Mining Spread Patterns of Spatio-temporal Co-occurrences over Zones 677 Feng Qian, Qinming He, and Jiangfeng He Computerized Detection of Pulmonary Nodule Based on Two- Dimensional PCA 693 Wook-Jin Choi, Abdul Majid, and Tae-Sun Choi Computational Measurements of the Transient Time and of the Sampling Distance That Enables Statistical Independence in the Logistic Map 703 Adriana Vlad, Adrian Luca, and Madalin Frunzete Future Personal Health Records as a Foundation for Computational Health 719 Robert Steele and Amanda Lo SVM Based Decision Analysis and Its Granular-Based Solving 734 Tian Yang, Xinjie Lu, Zaifei Liao, Wei Liu, and Hongan Wang Fast Object Tracking in Intelligent Surveillance System 749 Ki-Yeol Eom, Tae-Ki Ahn, Gyu-Jin Kim, Gyu-Jin Jang, and Moon-hyun Kim A Reliable Skin Detection Using Dempster-Shafer Theory of Evidence 764 Mohammad Shoyaib, Mohammad Abdullah-Al-Wadud, and Oksam Chae Video Shot Boundary Detection Using Generalized Eigenvalue Decomposition 780 Ali Amiri and Mahmood Fathy Content Quality Assessment Related Frameworks for Social Media 791 Kevin Chai, Vidyasagar Potdar, and Tharam Dillon Weighted Aspect Moment Invariant in Pattern Recognition 806 Rela Puteri Pamungkas and Siti Mariyam Shamsuddin

14 Table of Contents - Part II XXVII Multiple Object Types KNN Search Using Network Voronoi Diagram Geng Zhao, Kefeng Xuan, David Taniar, Maytham Safar, Marina Gavrilova, and Bala Srinivasan General Track on Information Systems and Information Technologies RRPS: A Ranked Real-Time Publish/Subscribe Using Adaptive QoS Xinjie Lu, Xin Li, Tian Yang, Zaifei Liao, Wei Liu, and Hongan Wang A Dynamic Packet Management in a Protocol Processor 851 Yul Chu, Amit Uppal, and Jae Sok Son On a Construction of Short Digests for Authenticating Ad Hoc Networks 863 Khoongming Khoo, Ford Long Wong, and Chu- Wee Lim Learning and Predicting Key Web Navigation Patterns Using Bayesian Models 877 Malik Tahir Hassan, Khurum Nazir Junejo, and Asim Karim A Hybrid IP Forwarding Engine with High Performance and Low Power 888 Junghwan Kim, Myeong-Cheol Ko, Hyun-Kyu Kang, and Jinsoo Kim Learning Styles Diagnosis Based on Learner Behaviors in Web Based Learning 900 Nilüfer Atman, Mustafa Murat Inceoglu, and Burak Galip Asian State of the Art in Semantic Focused Crawlers 910 Hai Dong, Farookh Khadeer Hussain, and Elizabeth Chang Towards a Framework for Workflow Composition in Ontology Tailoring in Semantic Grid 925 Toshihiro Uchibayashi, Bernady O. Apduhan, Wenny J. Rahayu, David Taniar, and Norio Shiratori Fusion Segmentation Algorithm for SAR Images Based on HMT in Contourlet Domain and D-S Theory of Evidence 937 Yan Wu, Ming Li, Haitao Zong, and Xin Wang Author Index 953

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment

A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment , pp.93-98 http://dx.doi.org/10.14257/astl.2015.108.20 A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment Rae Hyeon Kim, Pyung Soo Kim, Jeong Gon Kim 1 Department

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track)

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Plan Number Serial # Degree First: General Rules Conditions:.

More information

Collaboration System using Agent based on MRA in Cloud

Collaboration System using Agent based on MRA in Cloud Collaboration System using Agent based on MRA in Cloud Jong-Sub Lee*, Seok-Jae Moon** *Department of Information & Communication System, Semyeong University, Jecheon, Korea. ** Ingenium college of liberal

More information

Proxy Mobile IPv6 (PMIPv6)

Proxy Mobile IPv6 (PMIPv6) Sungkyunkwan University Proxy Mobile IPv6 (PMIPv6) - Grand ICT 연구센터지원사업라이프컴패니온쉽경험을위한지능형인터랙션융합연구 - 무선포함접속방식에독립적인차세대네트워킹기술개발 SDN/NFV 기반의기업유무선통합네트워크를위한액세스기술독립적오픈소스컨트롤러개발 - 자율제어네트워킹및자율관리핵심기술개발생체모방자율제어시스템및자율관리

More information

Keywords PMIPv6, Local Mobility Anchor, Mobile Access Gateway, AAA.

Keywords PMIPv6, Local Mobility Anchor, Mobile Access Gateway, AAA. Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Optimized Handover

More information

Open Access Research on the Prediction Model of Material Cost Based on Data Mining

Open Access Research on the Prediction Model of Material Cost Based on Data Mining Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining

More information

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data Wei Yang 1, Tinghua Ai 1, Wei Lu 1, Tong Zhang 2 1 School of Resource and Environment Sciences,

More information

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Security-Enriched Urban Computing and Smart Grid

Security-Enriched Urban Computing and Smart Grid Tai-hoon Kim Adrian Stoica Ruay-Shiung Chang (Eds.) Security-Enriched Urban Computing and Smart Grid First International Conference, SUComS 2010 Daejeon, Korea, September 15-17, 2010 Proceedings 13 Volume

More information

Research on Design and Application of Computer Database Quality Evaluation Model

Research on Design and Application of Computer Database Quality Evaluation Model Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the

More information

Vertical Handover in Vehicular Ad-hoc Networks A Survey

Vertical Handover in Vehicular Ad-hoc Networks A Survey Vertical Handover in Vehicular Ad-hoc Networks A Survey U. Kumaran Department of computer Applications Noorul Islam Center for Higher Education, Kumaracoil,Tamilnadu, India. Abstract- Vehicular Ad-hoc

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

A Study on the IoT Sensor Interaction Transmission System based on BigData

A Study on the IoT Sensor Interaction Transmission System based on BigData Vol.123 (SoftTech 2016), pp.220-224 http://dx.doi.org/10.14257/astl.2016.123.41 A Study on the IoT Sensor Interaction Transmission System based on BigData Jin-Tae Park 1, Gyung-Soo Phyo 1 and Il-Young

More information

Innovative M-Tech projects list IEEE papers

Innovative M-Tech projects list IEEE papers Innovative M-Tech projects list IEEE-2013-14 papers 1. Analysis and Practical Considerations in Implementing Multiple Transmitters for Wireless Power Transfer via Coupled Magnetic Resonance (IEEE 2014)

More information

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks , pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of

More information

Contents Part I: Mathematics and Fuzziness Bipolar Fuzzy BRK-ideals in BRK-algebras... 3 Khizar Hayat, Xiao-Chu Liu, and Bing-Yuan Cao A New Approach for Solving Fuzzy Supplier Selection Problems Under

More information

SMART ENERGY MANAGEMENT SYSTEM

SMART ENERGY MANAGEMENT SYSTEM International Journal of Recent Innovation in Engineering and Research Scientific Journal Impact Factor - 3.605 by SJIF e- ISSN: 2456 2084 SMART ENERGY MANAGEMENT SYSTEM Mrs Ashwini Kale 1, Mr Jeevan Ugale

More information

ZigBee Routing Algorithm Based on Energy Optimization

ZigBee Routing Algorithm Based on Energy Optimization Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com ZigBee Routing Algorithm Based on Energy Optimization Wangang Wang, Yong Peng, Yongyu Peng Chongqing City Management College, No. 151 Daxuecheng

More information

LIGHTWEIGHT DESIGN OF SEAT CUSHION EXTENSION MODULES USING THE PROPERTIES OF PLASTIC AND HCA-SIMP

LIGHTWEIGHT DESIGN OF SEAT CUSHION EXTENSION MODULES USING THE PROPERTIES OF PLASTIC AND HCA-SIMP International Journal of Mechanical Engineering and Technology (IJMET) Volume 9, Issue 5, May 2018, pp. 624 632, Article ID: IJMET_09_05_068 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=9&itype=5

More information

Table of Contents. Pulmonary Nodule Segmentation by using 3D Deformable Model in CT Images... 1 Ji-Seok Yoon, Tae-Sun Choi

Table of Contents. Pulmonary Nodule Segmentation by using 3D Deformable Model in CT Images... 1 Ji-Seok Yoon, Tae-Sun Choi Table of Contents Pulmonary Nodule Segmentation by using 3D Deformable Model in CT Images... 1 Ji-Seok Yoon, Tae-Sun Choi A CMOS Analog Baseband for a 5GHzWLAN Direct-Conversion Receiver... 5 Mi-young

More information

Application of isight for Optimal Tip Design of Complex Tool Holder Spindle

Application of isight for Optimal Tip Design of Complex Tool Holder Spindle Application of isight for Optimal Tip Design of Complex Tool Holder Spindle WMSCI 2010 Author: Koo Hong Kwon Won Jee Chung Ki Beom Park School of Mechatronics, Changwon National University Email: goodgoohong@hanmail.net

More information

Applicability Estimation of Mobile Mapping. System for Road Management

Applicability Estimation of Mobile Mapping. System for Road Management Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1407-1414 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49173 Applicability Estimation of Mobile Mapping System for Road Management

More information

White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017

White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017 White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017 Call for Authors This call for authors seeks contributions from academics and scientists who are in the fields of

More information

Design and Performance Improvements for Fault Detection in Tightly-Coupled Multi-Robot Team Tasks

Design and Performance Improvements for Fault Detection in Tightly-Coupled Multi-Robot Team Tasks Design and Performance Improvements for Fault Detection in Tightly-Coupled Multi-Robot Team Tasks Xingyan Li and Lynne E. Parker Distributed Intelligence Laboratory, Department of Electrical Engineering

More information

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks 152 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 2, APRIL 2011 The Improved WCMRP Protocol for Mobile Wireless Sensor Networks Ming Huang Guo Department of Information Management, Shih-Hsin University, Taipei,

More information

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2 5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang

More information

International Journal Of Engineering And Computer Science ISSN: Volume 2 Issue 9 September 2013 Page No.

International Journal Of Engineering And Computer Science ISSN: Volume 2 Issue 9 September 2013 Page No. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 9 September 2013 Page No. 2885-2888 A Survey of Various Method to improve the throughput of Zigbee Cluster

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Research Article. Three-dimensional modeling of simulation scene in campus navigation system

Research Article. Three-dimensional modeling of simulation scene in campus navigation system Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2013, 5(12):103-107 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Three-dimensional modeling of simulation scene

More information

Providing Security to the Architecture of Presence Servers

Providing Security to the Architecture of Presence Servers Providing Security to the Architecture of Presence Servers Vimitha R Vidhya Lakshmi PG Scholar TKM Institute of Technology Kollam, Kerala, India Anju J Assistant Professor TKM Institute of Technology Kollam,

More information

Minimizing Thin Glass Deflection in Flexible Display Manufacturing via Pin Map Optimization

Minimizing Thin Glass Deflection in Flexible Display Manufacturing via Pin Map Optimization Minimizing Thin Glass Deflection in Flexible Display Manufacturing via Pin Map Optimization Nam Hoon Jo BS. Scholar, Department of Mechanical Engineering, Graduate School Kongju National University (KNU),

More information

Preface List of Acronyms

Preface List of Acronyms Contents Preface List of Acronyms xxi Chapter 1 Next Generation Wireless Technologies 1 1.1 Introduction 1 1.2 Wireless Networking Standardization Process 5 1.2.1 Wireless Personal Area Networks 5 1.2.2

More information

Reliable and Efficient flooding Algorithm for Broadcasting in VANET

Reliable and Efficient flooding Algorithm for Broadcasting in VANET Reliable and Efficient flooding Algorithm for Broadcasting in VANET Vinod Kumar*, Meenakshi Bansal Mtech Student YCOE,Talwandi Sabo(india), A.P. YCOE, Talwandi Sabo(india) Vinod_Sharma85@rediffmail.com,

More information

The simulation and emulation verification that was based on NS-2

The simulation and emulation verification that was based on NS-2 210 The simulation and emulation verification that was based on NS-2 Ju-Young Shin, Jong-Wook Jang, Jin-Man Kim Department of Computer Engineering Dong-Eui University, Busan, Korea Department of Computer

More information

Geospatial Information Service Based on Ad Hoc Network

Geospatial Information Service Based on Ad Hoc Network I. J. Communications, Network and System Sciences, 2009, 2, 91-168 Published Online May 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Geospatial Information Service Based on Ad Hoc Network Fuling

More information

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled

More information

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques 1 Himanshu Verma, Mr Tarun Rathi, 3 Mr Ashish Singh Chauhan 1 Research Scholar, Deptt of Electronics and

More information

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,

More information

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage , pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2

More information

ICONI & APIC-IST 2010, December Crimson Resort, Mac tan Island, Philippines. Host by

ICONI & APIC-IST 2010, December Crimson Resort, Mac tan Island, Philippines. Host by KOREAN SOCIETY FOR INTERNET INFORMATION ICONI & APIC-IST 2010, December 16 20 Crimson Resort, Mac tan Island, Philippines Conference Program Host by Korean Society for Internet Information (KSII) Korea

More information

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Mobile Ad Hoc Networks: Basic Concepts and Research Issues Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full

More information

The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing

The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing Sung Ho Jang, Tae Young Kim, Jae Kwon Kim and Jong Sik Lee School of Information Engineering Inha University #253, YongHyun-Dong,

More information

Available online at ScienceDirect. Procedia Computer Science 56 (2015 )

Available online at  ScienceDirect. Procedia Computer Science 56 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 56 (2015 ) 266 270 The 10th International Conference on Future Networks and Communications (FNC 2015) A Context-based Future

More information

UPnP-Based Telematics Service Discovery for Local Hot-Spots

UPnP-Based Telematics Service Discovery for Local Hot-Spots UPnP-Based Telematics Service Discovery for Local Hot-Spots Dong-Kyun Kim and Sang-Jeong Lee Dept. of Computer Science and Engineering, Soonchunhyang University Asan, Chungnam, Korea {kdk7, sjlee}@sch.ac.kr

More information

Power Control Performance Evaluation for Efficiency in D2D Cellular Network

Power Control Performance Evaluation for Efficiency in D2D Cellular Network Power Control Performance Evaluation for Efficiency in D2D Cellular Network Soo Hyeong Kang, Jeong Gon Kim* Department of Electronic Engineering, Korea Polytechnic University, Siheung Si, Gyeonggi Do,

More information

Overview of Mobile Networking Initiatives at WINLAB

Overview of Mobile Networking Initiatives at WINLAB Overview of Mobile Networking Initiatives at WINLAB Introduction: The Next Generation MSC Custom Mobile Infrastructure (e.g. GSM, 3G) BTS Public Switched Network (PSTN) BSC GGSN, etc. WLAN Access Point

More information

AN IMPROVED TAIPEI BUS ESTIMATION-TIME-OF-ARRIVAL (ETA) MODEL BASED ON INTEGRATED ANALYSIS ON HISTORICAL AND REAL-TIME BUS POSITION

AN IMPROVED TAIPEI BUS ESTIMATION-TIME-OF-ARRIVAL (ETA) MODEL BASED ON INTEGRATED ANALYSIS ON HISTORICAL AND REAL-TIME BUS POSITION AN IMPROVED TAIPEI BUS ESTIMATION-TIME-OF-ARRIVAL (ETA) MODEL BASED ON INTEGRATED ANALYSIS ON HISTORICAL AND REAL-TIME BUS POSITION Xue-Min Lu 1,3, Sendo Wang 2 1 Master Student, 2 Associate Professor

More information

2017 International Conference on Communication Technologies (ComTech 2017)

2017 International Conference on Communication Technologies (ComTech 2017) 2017 International Conference on Communication Technologies (ComTech 2017) Rawalpindi, Pakistan 19 21 April 2017 IEEE Catalog Number: ISBN: CFP17CMR-POD 978-1-5090-5985-0 Copyright 2017 by the Institute

More information

AN INTRODUCTION TO FUZZY SETS Analysis and Design. Witold Pedrycz and Fernando Gomide

AN INTRODUCTION TO FUZZY SETS Analysis and Design. Witold Pedrycz and Fernando Gomide AN INTRODUCTION TO FUZZY SETS Analysis and Design Witold Pedrycz and Fernando Gomide A Bradford Book The MIT Press Cambridge, Massachusetts London, England Foreword - Preface Introduction xiii xxv xxi

More information

Reliable Routing In VANET Using Cross Layer Approach

Reliable Routing In VANET Using Cross Layer Approach Reliable Routing In VANET Using Cross Layer Approach 1 Mr. Bhagirath Patel, 2 Ms. Khushbu Shah 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 er.bhagirath@gmail.com,

More information

3D Grid Size Optimization of Automatic Space Analysis for Plant Facility Using Point Cloud Data

3D Grid Size Optimization of Automatic Space Analysis for Plant Facility Using Point Cloud Data 33 rd International Symposium on Automation and Robotics in Construction (ISARC 2016) 3D Grid Size Optimization of Automatic Space Analysis for Plant Facility Using Point Cloud Data Gyu seong Choi a, S.W.

More information

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT MOBILE OFFLOADING USING POWER BASED DECISION IN WIRELESS COMMUNICATION M.Nivethamani 1*, Soma Prathinha 2 1* PG Scholar, Student Member, IEEE, Sri Sairam Engineering College, Chennai 2 Associate Professor,

More information

Distinguished Capabilities of Artificial Intelligence Wireless Communication Systems

Distinguished Capabilities of Artificial Intelligence Wireless Communication Systems Distinguished Capabilities of Artificial Intelligence Wireless Communication Systems Xiaohu Ge, Senior Member, IEEE School of Electronic Information and Communications Huazhong University of Science and

More information

AN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH

AN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH AN ENHANCED ATTRIBUTE RERANKING DESIGN FOR WEB IMAGE SEARCH Sai Tejaswi Dasari #1 and G K Kishore Babu *2 # Student,Cse, CIET, Lam,Guntur, India * Assistant Professort,Cse, CIET, Lam,Guntur, India Abstract-

More information

Multimedia Big Data Frame Combination Storage Strategy Based on Virtual Space Distortion

Multimedia Big Data Frame Combination Storage Strategy Based on Virtual Space Distortion Multimedia Big Data Frame Combination Storage Strategy Based on Virtual Space https://doi.org/0.399/ijoe.v3i02.66 Jian Luo Zhejiang Technical Institute of Economics, Hangzhou Zhejiang, China jiansluo@yahoo.com

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Application Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography

Application Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography , pp.37-41 http://dx.doi.org/10.14257/astl.2013.31.09 Application Research of Wavelet Fusion Algorithm in Electrical Capacitance Tomography Lanying Li 1, Yun Zhang 1, 1 School of Computer Science and Technology

More information

COMBINING HIGH SPATIAL RESOLUTION OPTICAL AND LIDAR DATA FOR OBJECT-BASED IMAGE CLASSIFICATION

COMBINING HIGH SPATIAL RESOLUTION OPTICAL AND LIDAR DATA FOR OBJECT-BASED IMAGE CLASSIFICATION COMBINING HIGH SPATIAL RESOLUTION OPTICAL AND LIDAR DATA FOR OBJECT-BASED IMAGE CLASSIFICATION Ruonan Li 1, Tianyi Zhang 1, Ruozheng Geng 1, Leiguang Wang 2, * 1 School of Forestry, Southwest Forestry

More information

Keywords: Cloud computing, ZigBee, Smart home, Security cloud

Keywords: Cloud computing, ZigBee, Smart home, Security cloud 2016 International Conference on Information Engineering and Communications Technology (IECT 2016) ISBN: 978-1-60595-375-5 Design of the Smart-home Security System based on Cloud Computing Yan Wang 1,a,

More information

Urban Scene Segmentation, Recognition and Remodeling. Part III. Jinglu Wang 11/24/2016 ACCV 2016 TUTORIAL

Urban Scene Segmentation, Recognition and Remodeling. Part III. Jinglu Wang 11/24/2016 ACCV 2016 TUTORIAL Part III Jinglu Wang Urban Scene Segmentation, Recognition and Remodeling 102 Outline Introduction Related work Approaches Conclusion and future work o o - - ) 11/7/16 103 Introduction Motivation Motivation

More information

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,

More information

A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation

A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation , pp.162-167 http://dx.doi.org/10.14257/astl.2016.138.33 A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation Liqiang Hu, Chaofeng He Shijiazhuang Tiedao University,

More information

Efficient Windows Query Processing with. Expanded Grid Cells on Wireless Spatial Data. Broadcasting for Pervasive Computing

Efficient Windows Query Processing with. Expanded Grid Cells on Wireless Spatial Data. Broadcasting for Pervasive Computing Contemporary Engineering Sciences, Vol. 7, 2014, no. 16, 785 790 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4691 Efficient Windows Query Processing with Expanded Grid Cells on Wireless

More information

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 239-7242 Volume 4 Issue 8 Aug 205, Page No. 3640-3643 An Enhanced General Self-Organized Tree-Based Energy- Balance Routing

More information

One Communication Key Udate with Whitelist Attribute in SCADA System

One Communication Key Udate with Whitelist Attribute in SCADA System Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 3, May 2016 One Communication Key Udate with Whitelist Attribute in SCADA

More information

Eigen Reputation One Hop Certificate Exchange for Secure and Self Organizing Key Management in Manet

Eigen Reputation One Hop Certificate Exchange for Secure and Self Organizing Key Management in Manet Eigen Reputation One Hop Certificate Exchange for Secure and Self Organizing Key Management in Manet Chidambar P.Inamdar Research Scholar, Bharathiar Uniniversity, Coimabatore Abstract-Mobile node communication

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Mobile Edge Computing for 5G: The Communication Perspective

Mobile Edge Computing for 5G: The Communication Perspective Mobile Edge Computing for 5G: The Communication Perspective Kaibin Huang Dept. of Electrical & Electronic Engineering The University of Hong Kong Hong Kong Joint Work with Yuyi Mao (HKUST), Changsheng

More information

Contents. Foreword to Second Edition. Acknowledgments About the Authors

Contents. Foreword to Second Edition. Acknowledgments About the Authors Contents Foreword xix Foreword to Second Edition xxi Preface xxiii Acknowledgments About the Authors xxxi xxxv Chapter 1 Introduction 1 1.1 Why Data Mining? 1 1.1.1 Moving toward the Information Age 1

More information

Cryptography basedauthentication method for DoS attack Detection in Clustered Wireless Sensor Networks

Cryptography basedauthentication method for DoS attack Detection in Clustered Wireless Sensor Networks Cryptography basedauthentication method for DoS attack Detection in Clustered Wireless Sensor Networks Jerine.S 1, Dr.Julia Punitha Malar Dhas 2 1. Research Scholar, Department of Computer Applications,

More information

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS 1 V.VINOTH, 2 M.LAKSHMI 1 Research Scholar, Faculty of Computing, Department of IT, Sathyabama University,

More information

Table of Contents 1 Introduction A Declarative Approach to Entity Resolution... 17

Table of Contents 1 Introduction A Declarative Approach to Entity Resolution... 17 Table of Contents 1 Introduction...1 1.1 Common Problem...1 1.2 Data Integration and Data Management...3 1.2.1 Information Quality Overview...3 1.2.2 Customer Data Integration...4 1.2.3 Data Management...8

More information

Cooperative Spectrum Sharing Scheme for Wireless Sensor Networks

Cooperative Spectrum Sharing Scheme for Wireless Sensor Networks Cooperative Spectrum Sharing Scheme for Wireless Sensor Networks Tshimangadzo M. Tshilongamulenzhe 1, Topside E. Mathonsi, member IAENG 2 and Maredi I. Mphahlele 3 Department of Information Technology,

More information

Telematics Transport Gateway for Telematics Systems. Independent on Mobile Networks

Telematics Transport Gateway for Telematics Systems. Independent on Mobile Networks Telematics Transport Gateway for Telematics Systems Independent on Mobile Networks Chul-Su Kim 1 *, Jongik Kim, Woo-Yong Han, and Oh-Cheon Kwon 1. Electronics and Telecommunications Research Institute,

More information

Mobile Computing. Homework#1 Due date: Oct.25, 2018 NOTE: WRITE YOUR ANSWERS IN ENGLISH. ID#: Name: (Kor.) (Eng.)

Mobile Computing. Homework#1 Due date: Oct.25, 2018 NOTE: WRITE YOUR ANSWERS IN ENGLISH. ID#: Name: (Kor.) (Eng.) Mobile Computing Homework#1 Due date: Oct.25, 2018 NOTE: WRITE YOUR ANSWERS IN ENGLISH. ID#: Name: (Kor.) (Eng.) Problem #1 (20pts). Answer the following questions based on your knowledge. 1) In Data-Link

More information

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS xxi

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS xxi ix TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES xv LIST OF FIGURES xviii LIST OF SYMBOLS AND ABBREVIATIONS xxi 1 INTRODUCTION 1 1.1 INTRODUCTION 1 1.2 WEB CACHING 2 1.2.1 Classification

More information

Wide Area Ontology Integration Scheme for Reasoning Agents in Surveillance Networks

Wide Area Ontology Integration Scheme for Reasoning Agents in Surveillance Networks Wide Area Ontology Integration Scheme for Reasoning Agents in Surveillance Networks Soomi Yang 1*, Heejung Byun 2 1 Department of Information Engineering, the University of Suwon, Hwasung-si, Gyeonggido,

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS

AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS AUTOMATIC VISUAL CONCEPT DETECTION IN VIDEOS Nilam B. Lonkar 1, Dinesh B. Hanchate 2 Student of Computer Engineering, Pune University VPKBIET, Baramati, India Computer Engineering, Pune University VPKBIET,

More information

YEONG HO HA. DATE OF BIRTH August 10, 1953

YEONG HO HA. DATE OF BIRTH August 10, 1953 YEONG HO HA PRESENT POSITION AND ADDRESS Professor School of Electronics Engineering Kyungpook National University 80 Daehak-ro, Buk-gu, Daegu 41566, Korea Phone: +82-53-950-5535 FAX: +82-53-950-5505 E-MAIL:

More information

A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehicular Networks

A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehicular Networks A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehicular Networks Saeed Fathi Ghiri 1 and Morteza Rahmani and Hassan Almasi 2 1 Department of Computer Engineering, Azad University

More information

SK International Journal of Multidisciplinary Research Hub Research Article / Survey Paper / Case Study Published By: SK Publisher

SK International Journal of Multidisciplinary Research Hub Research Article / Survey Paper / Case Study Published By: SK Publisher ISSN: 2394 3122 (Online) Volume 2, Issue 1, January 2015 Research Article / Survey Paper / Case Study Published By: SK Publisher P. Elamathi 1 M.Phil. Full Time Research Scholar Vivekanandha College of

More information

A Test Sequence Generation Method Based on Dependencies and Slices Jin-peng MO *, Jun-yi LI and Jian-wen HUANG

A Test Sequence Generation Method Based on Dependencies and Slices Jin-peng MO *, Jun-yi LI and Jian-wen HUANG 2017 2nd International Conference on Advances in Management Engineering and Information Technology (AMEIT 2017) ISBN: 978-1-60595-457-8 A Test Sequence Generation Method Based on Dependencies and Slices

More information

Development of MF-TDMA based Satellite Network System Simulation Model

Development of MF-TDMA based Satellite Network System Simulation Model International Global Navigation Satellite Systems Society IGNSS Symposium 2011 University of New South Wales, Sydney, NSW, Australia 15 17 November 2011 Development of MF-TDMA based Satellite Network System

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for

More information

Pre-Qual Groups. EL GOUNA WORLD CUP 03 till 09 December Hurghada (EG) Group Match players T-car T-Inn T-car T-Inn Av MP 1st HR 2nd HR A

Pre-Qual Groups. EL GOUNA WORLD CUP 03 till 09 December Hurghada (EG) Group Match players T-car T-Inn T-car T-Inn Av MP 1st HR 2nd HR A A ANDERSEN Thomas 30 24 30 24 1.250 2 4 3 KIYOTA Atsushi 14 24 14 24 0.583 0 2 2 CHRISTIANI Dave 30 22 30 22 1.363 2 8 3 KIYOTA Atsushi 12 22 12 22 0.545 0 3 2 CHRISTIANI Dave 29 28 29 28 1.035 0 6 3 ANDERSEN

More information

Nowadays data-intensive applications play a

Nowadays data-intensive applications play a Journal of Advances in Computer Engineering and Technology, 3(2) 2017 Data Replication-Based Scheduling in Cloud Computing Environment Bahareh Rahmati 1, Amir Masoud Rahmani 2 Received (2016-02-02) Accepted

More information

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008 2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China 13-15 December 2008 IEEE Catalog Number: ISBN: CFP0881F-PRT 978-1-4244-3427-5 TABLE OF CONTENTS

More information

A Study on Different Challenges in Facial Recognition Methods

A Study on Different Challenges in Facial Recognition Methods Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521

More information

Multimedia Document Communications over Wireless Network

Multimedia Document Communications over Wireless Network Multimedia Document Communications over Wireless Network 1 Convergence of Mobile Services Personal computer Access to any data Internet Telecommunications Mobile Technology Ubiquitous Portable processing

More information

Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology

Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology 2010 China International Conference on Electricity Distribution 1 Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology Zhang Hong-tao, Ye Ying, An Qing China Zhoukou Power

More information

Collaborative Security Attack Detection in Software-Defined Vehicular Networks

Collaborative Security Attack Detection in Software-Defined Vehicular Networks Collaborative Security Attack Detection in Software-Defined Vehicular Networks APNOMS 2017 Myeongsu Kim, Insun Jang, Sukjin Choo, Jungwoo Koo, and Sangheon Pack Korea University 2017. 9. 27. Contents Introduction

More information

RoboCup 2014 Rescue Simulation League Team Description. <CSU_Yunlu (China)>

RoboCup 2014 Rescue Simulation League Team Description. <CSU_Yunlu (China)> RoboCup 2014 Rescue Simulation League Team Description Fu Jiang, Jun Peng, Xiaoyong Zhang, Tao Cao, Muhong Guo, Longlong Jing, Zhifeng Gao, Fangming Zheng School of Information Science

More information

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:

More information

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE System

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE System Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 82.16 System Woo-Jae Kim 1, Joo-Young Baek 1, Sun-Don Lee 1, Young-Joo Suh 1, Yun-Sung Kim 2, and Jin-A Kim 2 1 Department of Computer

More information