Yang / Kim / Park | Advances in Communication and Networking | E-Book | www2.sack.de
E-Book

E-Book, Englisch, Band 27, 195 Seiten

Reihe: Communications in Computer and Information Science

Yang / Kim / Park Advances in Communication and Networking

Second International Conference on Future Generation Communication and Networking, FGCN 2008, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers
1. Auflage 2009
ISBN: 978-3-642-10236-3
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

Second International Conference on Future Generation Communication and Networking, FGCN 2008, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers

E-Book, Englisch, Band 27, 195 Seiten

Reihe: Communications in Computer and Information Science

ISBN: 978-3-642-10236-3
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



This volume constitutes the selected and extended papers of the International Conference on Advances in Communication and Networking, FGCN2008, and Its Special Sessions, held in Sanya, Hainan Island, China in December 2008. The articles discuss recent progress in the area of Communication and Networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems.

Yang / Kim / Park Advances in Communication and Networking jetzt bestellen!

Weitere Infos & Material


1;Preface;5
2;Organization;6
3;Table of Contents;10
4;Active Vessel Navigation Monitoring with Multi-media Message Service;12
4.1;Introduction;12
4.2;Service System Architecture;13
4.3;Automatic Background Image Selecting Method;15
4.3.1;Image’s Information Entropy;16
4.3.2;Image’s Information Scrambling Degree;16
4.3.3;Automatic Background Image Selecting Method;17
4.4;Experiments;20
4.4.1;Neural Network Experiments;20
4.4.2;Scheduler Center Executing Records;21
4.4.3;Multi-media Notification Message;23
4.5;Conclusion;23
4.6;References;24
5;Improvement of Efficient Remote Mutual Authentication and Key Agreement;25
5.1;Introduction;25
5.2;Review of Shieh-Wang’s Remote Scheme;26
5.2.1;Registration Phase;27
5.2.2;Login and Key Agreement Phase;27
5.3;Security Flaws on Shieh and Wang’s Scheme;28
5.3.1;Perfect Forward Secrecy Problem;28
5.3.2;Privileged Insider’s Attack;30
5.4;Our Improved Scheme;30
5.4.1;Registration Phase;30
5.4.2;Login and Key Agreement Phase;30
5.4.3;Password Change Phase;31
5.5;Security Analysis;32
5.6;Conclusion;34
5.7;References;34
6;QTL Analysis of Ascochyta Blight Resistance in Chickpea;36
6.1;Introduction;37
6.2;Materials and Methods;38
6.3;Results and Discussion;43
6.4;References;49
7;A Context-Aware Adaptation Model for Efficient Web Browsing on Mobile Devices;52
7.1;Introduction;52
7.2;Related Work;53
7.3;The Proxy-Agent Model;54
7.4;The Document Cluster Graph (DCG) Model;56
7.5;Weight Adjustment for Document Links;58
7.6;The H3 Viewer;61
7.7;Adaptation in a Mobile Environment;62
7.8;Conclusion;64
7.9;References;64
8;Data Gathering Based on Nodes' Credit in Wireless Sensor Network;66
8.1;Introduction;66
8.2;Review: Directed Diffusion;67
8.2.1;Basic Scheme;67
8.2.2;Limitations;68
8.3;The Proposed Algorithm;68
8.4;Performance Evaluation;70
8.5;Conclusion;72
8.6;References;72
9;A Privacy Preserved Model for Medical Data Sharing in Telemedicine;74
9.1;Introduction;74
9.1.1;Organization;75
9.2;Literature Review;75
9.2.1;Issues in Medical Data Sharing;76
9.2.2;Data Sharing in Telemedicine;76
9.3;Definition;77
9.3.1;Problem Definition;77
9.3.2;Privacy and Security;77
9.3.3;Privacy in Telemedicine;78
9.4;Proposed Model;78
9.4.1;Components;79
9.4.2;Communications between Components;80
9.5;Implementation;82
9.6;Discussions and Conclusion;85
9.7;References;86
10;Wireless Network of Collaborative Physiological Signal Devices in a U-Healthcare System;87
10.1;Introduction;87
10.2;Wearable Physiological Signal Devices;88
10.2.1;ECG-Single Channel;89
10.2.2;PPG (Photopleth-Ysmography);90
10.2.3;SKT (Skin Temperature);90
10.2.4;Fall Detector (Using ACC Sensor);90
10.2.5;SBP (Using ECG and PPG Sensor);90
10.2.6;Dongle and Mobile System;91
10.3;Wireless Body Area Network (WBAN);91
10.3.1;Scanning Algorithm;91
10.3.2;Dynamic Discovery and Installation;92
10.3.3;Reliable Data Transmission;94
10.3.4;PSD Access Control;94
10.3.5;Ubiquitous Healthcare Profile;94
10.4;Service Scenario and Application;96
10.5;Conclusion;97
10.6;References;98
11;Mobility and QoS Control Concern in Next Generation Networks;100
11.1;Introduction;100
11.2;NGN Architecture;102
11.2.1;Interactions between NGN and Non-NGN Environments;103
11.3;Mobility in NGN;104
11.3.1;Mobile Networks' Infrastructure Evolution;104
11.3.2;Mobility Management in 2G Networks;106
11.3.3;Mobility Management in NGN;107
11.4;Resource Management and QoS Control in NGN;110
11.4.1;Related Research Work by ETSI and IETF;110
11.4.2;Resource and Admission Control Functional Architecture;111
11.4.3;Mobility Considerations in RACF;112
11.5;Conclusion;114
11.6;References;115
12;Mapping Rule of Workflow-XML Resource Model for Asynchronous Web Service;116
12.1;Introduction;116
12.2;Related Studies;117
12.3;Asynchronous Web Service Protocol;117
12.3.1;ASAP;117
12.3.2;Workflow-XML;118
12.4;Data Modeling about Workflow-XML Resource Model;119
12.4.1;Workflow-XML Resource Type Entity Modeling;119
12.4.2;Workflow-XML Interaction Resource Entity Modeling;124
12.5;Conclusion and Further Works;126
12.6;References;126
13;In Search of Unstructured Documents Categorization;127
13.1;Introduction;127
13.2;Overview;128
13.3;Approach;129
13.3.1;Text and Data Mining Technique;129
13.3.2;Lexical Chain Technique;130
13.3.3;Genetic Algorithm (GA) Technique;131
13.3.4;Artificial Neural Network Technique;131
13.3.5;Binarization;132
13.4;Application;133
13.5;Evaluation;134
13.5.1;Text and Data Mining Technique;134
13.5.2;Lexical Chain Mechanism;134
13.5.3;Genetic Algorithmic Approach;134
13.5.4;Artificial Neural Network;134
13.5.5;Binarization;134
13.6;Conclusion;135
13.7;References;135
14;A Medical Charts Management Using RFID System with Enhanced Recognition Property;137
14.1;Introduction;137
14.2;Review of RFID;139
14.3;Reader Placement for Reading Out Good Sensing Value;141
14.4;Solution for Double Recognition;142
14.5;Experimental Results;144
14.6;Conclusion;145
14.7;References;145
15;A Variable Bandwidth Allocation Scheme Using Effective Multicast Traffic Share in Heterogeneous Networks;147
15.1;Introduction;147
15.2;Bandwidth Resource Analysis;151
15.3;Variable Bandwidth Scheme;152
15.4;Analysis of the Proposed Scheme;154
15.5;Simulation Results;155
15.6;Conclusions;160
15.7;References;160
16;RFID-Enable Real-Time Management for Multi-experiment Training Center;162
16.1;Introduction;162
16.2;RFID Tech;164
16.3;Overview of RFID-Enable Real-Time Multi-experiment Training Center Management System;165
16.3.1;Hardware;165
16.3.2;Software Frameworks;169
16.4;Optimization;172
16.4.1;Modular Optimization;172
16.4.2;System Adjustment;173
16.4.3;Code Optimization;174
16.5;Key Technologies;177
16.6;Conclusion;178
16.7;References;179
17;Secured Resource Selection in Grid Computing: Trust and Reputation Sentient Scheme;180
17.1;Introduction;180
17.2;Related Work;182
17.3;Trust and Reputation;184
17.3.1;Trust;184
17.3.2;Reputation;184
17.4;Secured Resource Selection for Scheduling Jobs;185
17.4.1;Self-protection Capability;185
17.4.2;Reputation Computation;186
17.4.3;Trust Factor Calculation and Resource Selection;188
17.5;Experimental Results;188
17.6;Conclusion;191
17.7;References;192
18;Author Index;195



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.