Online Library TheLib.net » Communication and Networking: International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part II
cover of the book Communication and Networking: International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part II

Ebook: Communication and Networking: International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part II

00
27.01.2024
0
0

Welcome to the proceedings of the 2010 International Conference on Future Gene- tion Communication and Networking (FGCN 2010) – one of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). FGCN brings together researchers from academia and industry as well as practit- ners to share ideas, problems and solutions relating to the multifaceted aspects of communication and networking, including their links to computational sciences, mathematics and information technology. In total, 1,630 papers were submitted to FGIT 2010 from 30 countries, which - cludes 150 papers submitted to the FGCN 2010 Special Sessions. The submitted papers went through a rigorous reviewing process: 395 of the 1,630 papers were - cepted for FGIT 2010, while 70 papers were accepted for the FGCN 2010 Special Sessions. Of the 70 papers, 6 were selected for the special FGIT 2010 volume p- lished by Springer in LNCS series. Fifty-one papers are published in this volume, and 13 papers were withdrawn due to technical reasons. We would like to acknowledge the great effort of the FGCN 2010 International Advisory Board and Special Session Co-chairs, as well as all the organizations and individuals who supported the idea of publishing this volume of proceedings, incl- ing SERSC and Springer. Also, the success of the conference would not have been possible without the huge support from our sponsors and the work of the Organizing Committee.




This book constitutes the refereed proceedings of the International Conference on Future Generation Communication and Networking, FGCN 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, in Jeju Island, Korea, in December 2010. The 70 full papers presented were carefully reviewed and selected from 150 submissions. The papers are focused on the various aspects of advances in Communication and Networking; the topics include but will not be limited to Communication Basic and Infrastructure; Networks Basic and Management; Multimedia Application, Image, Video, Signal and Information Processing.


This book constitutes the refereed proceedings of the International Conference on Future Generation Communication and Networking, FGCN 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, in Jeju Island, Korea, in December 2010. The 70 full papers presented were carefully reviewed and selected from 150 submissions. The papers are focused on the various aspects of advances in Communication and Networking; the topics include but will not be limited to Communication Basic and Infrastructure; Networks Basic and Management; Multimedia Application, Image, Video, Signal and Information Processing.
Content:
Front Matter....Pages -
Congestion Avoidance and Energy Efficient Routing Protocol for WSN Healthcare Applications....Pages 1-10
An Efficient Method for Detecting Misbehaving Zone Manager in MANET....Pages 11-21
Query Answering Driven by Collaborating Agents....Pages 22-30
Attribute-Based Access Control for Layered Grid Resources....Pages 31-40
A Local Graph Clustering Algorithm for Discovering Subgoals in Reinforcement Learning....Pages 41-50
Automatic Skill Acquisition in Reinforcement Learning Agents Using Connection Bridge Centrality....Pages 51-62
Security Analysis of Liu-Li Digital Signature Scheme....Pages 63-70
An Optimal Method for Detecting Internal and External Intrusion in MANET....Pages 71-82
SNMP-SI: A Network Management Tool Based on Slow Intelligence System Approach....Pages 83-92
Intrusion Detection in Database Systems....Pages 93-101
A Secure Routing Using Reliable 1-Hop Broadcast in Mobile Ad Hoc Networks....Pages 102-111
A Hybrid Routing Algorithm Based on Ant Colony and ZHLS Routing Protocol for MANET....Pages 112-122
Decision-Making Model Based on Capability Factors for Embedded Systems....Pages 123-129
Socio-Psycho-Linguistic Determined Expert-Search System (SPLDESS) Development with Multimedia Illustration Elements....Pages 130-137
A Packet Loss Concealment Algorithm Robust to Burst Packet Loss Using Multiple Codebooks and Comfort Noise for CELP-Type Speech Coders....Pages 138-147
Duration Model-Based Post-processing for the Performance Improvement of a Keyword Spotting System....Pages 148-154
Complexity Reduction of WSOLA-Based Time-Scale Modification Using Signal Period Estimation....Pages 155-161
A Real-Time Audio Upmixing Method from Stereo to 7.1-Channel Audio....Pages 162-171
Statistical Model-Based Voice Activity Detection Using Spatial Cues and Log Energy for Dual-Channel Noisy Speech Recognition....Pages 172-179
3D Sound Techniques for Sound Source Elevation in a Loudspeaker Listening Environment....Pages 180-187
Integrated Framework for Information Security in Mobile Banking Service Based on Smart Phone....Pages 188-197
A Design of the Transcoding Middleware for the Mobile Browsing Service....Pages 198-204
A Study of Context-Awareness RBAC Model Using User Profile on Ubiquitous Computing....Pages 205-213
Challenges and Security in Cloud Computing....Pages 214-217
3D Viewer Platform of Cloud Clustering Management System: Google Map 3D....Pages 218-222
Output Current-Voltage Characteristic of a Solar Concentrator....Pages 223-226
Efficient Thread Labeling for Monitoring Programs with Nested Parallelism....Pages 227-237
A Race Healing Framework in Simulated ARINC-653....Pages 238-246
A K-Means Shape Classification Algorithm Using Shock Graph-Based Edit Distance....Pages 247-254
Efficient Caching Scheme for Better Context Inference in Intelligent Distributed Surveillance Environment....Pages 255-261
A System Implementation for Cooperation between UHF RFID Reader and TCP/IP Device....Pages 262-267
Study of Host-Based Cyber Attack Precursor Symptom Detection Algorithm....Pages 268-275
Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring....Pages 276-283
The Improved 4-PSK 4-State Space-Time Trellis Code with Two Transmit Antennas....Pages 284-290
A Study on Efficient Mobile IPv6 Fast Handover Scheme Using Reverse Binding Mechanism....Pages 291-300
A Software Framework for Optimizing Smart Resources in the Industrial Field....Pages 301-310
Automatic Image Quality Control System....Pages 311-315
Programmable RF System for RF System-on-Chip....Pages 316-320
Development of a Mobile Language Learning Assistant System Based on Smartphone....Pages 321-329
Implementation of the Sensor Node Hardware Platform for an Automatic Stall Management....Pages 330-334
A Study on the Enhancement of Positioning Accuracy Performance Using Interrogator Selection Schemes over Indoor Wireless Channels....Pages 335-342
A Fully Parallel, High-Speed BPC Hardware Architecture for the EBCOT in JPEG 2000....Pages 343-346
Implementating Grid Portal for Scientific Job Submission....Pages 347-353
A Comprehensive Performance Comparison of On-Demand Routing Protocols in Mobile Ad-Hoc Networks....Pages 354-369
Preserving Energy Using Link Protocol in Wireless Networks....Pages 370-380
Trust Based Routing in Ad Hoc Network....Pages 381-392
Routing in Ad Hoc Network Using Ant Colony Optimization....Pages 393-404
Non-Repudiation in Ad Hoc Networks....Pages 405-415
The Vehicular Information Space Framework....Pages 416-431
Effectiveness of AODV Protocol under Hidden Node Environment....Pages 432-440
Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens....Pages 441-449
Performance Evaluation of FAST TCP Traffic-Flows in Multihomed MANETs....Pages 450-458
Fault Tolerant Implementation of Xilinx Vertex FPGA for Sensor Systems through On-Chip System Evolution....Pages 459-468
Back Matter....Pages -


This book constitutes the refereed proceedings of the International Conference on Future Generation Communication and Networking, FGCN 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, in Jeju Island, Korea, in December 2010. The 70 full papers presented were carefully reviewed and selected from 150 submissions. The papers are focused on the various aspects of advances in Communication and Networking; the topics include but will not be limited to Communication Basic and Infrastructure; Networks Basic and Management; Multimedia Application, Image, Video, Signal and Information Processing.
Content:
Front Matter....Pages -
Congestion Avoidance and Energy Efficient Routing Protocol for WSN Healthcare Applications....Pages 1-10
An Efficient Method for Detecting Misbehaving Zone Manager in MANET....Pages 11-21
Query Answering Driven by Collaborating Agents....Pages 22-30
Attribute-Based Access Control for Layered Grid Resources....Pages 31-40
A Local Graph Clustering Algorithm for Discovering Subgoals in Reinforcement Learning....Pages 41-50
Automatic Skill Acquisition in Reinforcement Learning Agents Using Connection Bridge Centrality....Pages 51-62
Security Analysis of Liu-Li Digital Signature Scheme....Pages 63-70
An Optimal Method for Detecting Internal and External Intrusion in MANET....Pages 71-82
SNMP-SI: A Network Management Tool Based on Slow Intelligence System Approach....Pages 83-92
Intrusion Detection in Database Systems....Pages 93-101
A Secure Routing Using Reliable 1-Hop Broadcast in Mobile Ad Hoc Networks....Pages 102-111
A Hybrid Routing Algorithm Based on Ant Colony and ZHLS Routing Protocol for MANET....Pages 112-122
Decision-Making Model Based on Capability Factors for Embedded Systems....Pages 123-129
Socio-Psycho-Linguistic Determined Expert-Search System (SPLDESS) Development with Multimedia Illustration Elements....Pages 130-137
A Packet Loss Concealment Algorithm Robust to Burst Packet Loss Using Multiple Codebooks and Comfort Noise for CELP-Type Speech Coders....Pages 138-147
Duration Model-Based Post-processing for the Performance Improvement of a Keyword Spotting System....Pages 148-154
Complexity Reduction of WSOLA-Based Time-Scale Modification Using Signal Period Estimation....Pages 155-161
A Real-Time Audio Upmixing Method from Stereo to 7.1-Channel Audio....Pages 162-171
Statistical Model-Based Voice Activity Detection Using Spatial Cues and Log Energy for Dual-Channel Noisy Speech Recognition....Pages 172-179
3D Sound Techniques for Sound Source Elevation in a Loudspeaker Listening Environment....Pages 180-187
Integrated Framework for Information Security in Mobile Banking Service Based on Smart Phone....Pages 188-197
A Design of the Transcoding Middleware for the Mobile Browsing Service....Pages 198-204
A Study of Context-Awareness RBAC Model Using User Profile on Ubiquitous Computing....Pages 205-213
Challenges and Security in Cloud Computing....Pages 214-217
3D Viewer Platform of Cloud Clustering Management System: Google Map 3D....Pages 218-222
Output Current-Voltage Characteristic of a Solar Concentrator....Pages 223-226
Efficient Thread Labeling for Monitoring Programs with Nested Parallelism....Pages 227-237
A Race Healing Framework in Simulated ARINC-653....Pages 238-246
A K-Means Shape Classification Algorithm Using Shock Graph-Based Edit Distance....Pages 247-254
Efficient Caching Scheme for Better Context Inference in Intelligent Distributed Surveillance Environment....Pages 255-261
A System Implementation for Cooperation between UHF RFID Reader and TCP/IP Device....Pages 262-267
Study of Host-Based Cyber Attack Precursor Symptom Detection Algorithm....Pages 268-275
Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring....Pages 276-283
The Improved 4-PSK 4-State Space-Time Trellis Code with Two Transmit Antennas....Pages 284-290
A Study on Efficient Mobile IPv6 Fast Handover Scheme Using Reverse Binding Mechanism....Pages 291-300
A Software Framework for Optimizing Smart Resources in the Industrial Field....Pages 301-310
Automatic Image Quality Control System....Pages 311-315
Programmable RF System for RF System-on-Chip....Pages 316-320
Development of a Mobile Language Learning Assistant System Based on Smartphone....Pages 321-329
Implementation of the Sensor Node Hardware Platform for an Automatic Stall Management....Pages 330-334
A Study on the Enhancement of Positioning Accuracy Performance Using Interrogator Selection Schemes over Indoor Wireless Channels....Pages 335-342
A Fully Parallel, High-Speed BPC Hardware Architecture for the EBCOT in JPEG 2000....Pages 343-346
Implementating Grid Portal for Scientific Job Submission....Pages 347-353
A Comprehensive Performance Comparison of On-Demand Routing Protocols in Mobile Ad-Hoc Networks....Pages 354-369
Preserving Energy Using Link Protocol in Wireless Networks....Pages 370-380
Trust Based Routing in Ad Hoc Network....Pages 381-392
Routing in Ad Hoc Network Using Ant Colony Optimization....Pages 393-404
Non-Repudiation in Ad Hoc Networks....Pages 405-415
The Vehicular Information Space Framework....Pages 416-431
Effectiveness of AODV Protocol under Hidden Node Environment....Pages 432-440
Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens....Pages 441-449
Performance Evaluation of FAST TCP Traffic-Flows in Multihomed MANETs....Pages 450-458
Fault Tolerant Implementation of Xilinx Vertex FPGA for Sensor Systems through On-Chip System Evolution....Pages 459-468
Back Matter....Pages -
....
Download the book Communication and Networking: International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part II for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen