By Topic

Networking and Digital Society, 2009. ICNDS '09. International Conference on

Date 30-31 May 2009

Go

Filter Results

Displaying Results 1 - 25 of 83
  • [Front cover - Vol 2]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (4386 KB)
    Freely Available from IEEE
  • [Title page i - Volume 2]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 2]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 2]

    Publication Year: 2009
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Table of contents - Volume 2

    Publication Year: 2009, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (382 KB)
    Freely Available from IEEE
  • Preface - Volume 2

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (31 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organization - Volume 2

    Publication Year: 2009, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Design and Analysis of Management Experiment of Securities Regulation

    Publication Year: 2009, Page(s):3 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Based on the theory of behavioral finance, this paper studies the securities regulation by using the research method of management experiment. The paper designs and analyzes a management experiment of securities regulation by combining some experimental results of the bubble problem of security market with the DHS model of behavioral finance. In the management experiment, securities regulation fac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Low Cost Real-Time Communication System of Locomotive Based on GPS

    Publication Year: 2009, Page(s):8 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    In this paper we propose a mobile communication solution of real-time operating data for moving locomotive without the railway GSM (GSM-R).The method exploits a low cost communication system based on GPS. Through the existed train dispatching radio communication system (TDRCS) and the railway packet switched network (RPSN), the real-time operating data which transacted by data-voice synchronous wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construction of University Digital Library Resources under the Network Environment

    Publication Year: 2009, Page(s):12 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    This article discusses the concept of digital libraries and its main features. By introducing advanced digital library experience and technology of foreign colleges and universities, it presents that China should formulate an overall plan to specify the direction and objective of construction and set up clear constructive missions and functions based on its specific circumstances as well as learni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Combination Multi-signature Scheme

    Publication Year: 2009, Page(s):16 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    The concept of the multi-signature was first proposed by Itakura and Nakamura, in which multiple signers can cooperate to sign the same message and any verifier can verify the validity of the multi-signature. After that, a lot of multi-signature schemes were proposed, but almost all of the multi-signature schemes are either sequence multi-signature or broadcasting multi-signature, but a lot of exa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Proxy Multi-signature Scheme

    Publication Year: 2009, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    The proxy multi-signature is a very useful tool, which allows multiple signers to generate in a collaborative and simultaneous, and if a signer needs to delegate his signing capability to other signer, then the proxy signers can sign on behalf of an original signer. The paper proposed a new proxy multi-signature scheme, which the computation complicacy of the signature algorithm and the verificati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on Parallel Clustering Based on Asynchronous Communication

    Publication Year: 2009, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    In order to improve the speed of clustering data mining, aiming at the characteristics of BIRCH algorithm, this paper has done research and analysis on rapid clustering data mining in the cluster system, and presented several improvement suggestions such as using data parallel thinking, uniform data distribution strategy , clustering communication mode and the optimization of clustering results. E... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of PDE-Based Image Smoothing Method in Digital Image Processing

    Publication Year: 2009, Page(s):28 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (685 KB) | HTML iconHTML

    Compared with traditional image smoothing method, partial differential equations -based image smoothing method is better in preserving image features while suppressing image noise. The PDE-based image denoising smoothing algorithm and an improved algorithm based on it are discussed in the paper. A good result is achieved in the experiment of identifying flaws on precise optical componentspsila sur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Influence of PROFIBUS Frame Transmission Time on Transmission Delay Property

    Publication Year: 2009, Page(s):32 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    The transmission time delay property of fieldbus is an important factor that influences the real time property of industrial control networks. The frame transmission time of message is one important part of fieldbus transmission time delay, based on the fieldbus transmission time delay model. PROFIBUS frame transmission time mathematical model was proposed, for four data link layer severs of PROFI... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Rough Set and Fuzzy Neural Network in Information Handling

    Publication Year: 2009, Page(s):36 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    In this paper, based on rough set, the design of fuzzy neural network is studied. The character of rough fuzzy neural network and other neural network are analyzed and compared. The validity of the rough fuzzy neural network can be verified in extracting sound quality parameters from the scene image. The rough fuzzy neural network has superiorities at the aspect of structure and convergence. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transition from IPv4 to IPv6 Based on Socket Applications

    Publication Year: 2009, Page(s):40 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (501 KB) | HTML iconHTML

    With the rapid development of Internet, IPv4 will transform into Ipv6 step by step. Some network applications on the basis of IPv4 need to be transformed so that they can be executed under the IPv6 environment. To solve the problem of such transition, the socket interface and realization of IPv4 and Ipv6 are analyzed firstly in this paper. Based on the analysis, a feasible method is presented to r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fingerprint Segmentation Based on Improved Active Contour

    Publication Year: 2009, Page(s):44 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (960 KB) | HTML iconHTML

    Snake (active contour) model, introduced by Kass in 1987, is a dynamic curve model with energy-minimizing. Snake algorithm, which has advantages in extracting target object from a certain region, is an effective method in image segmentation. Based on the analysis of the snake model and the regional information of the edges of the fingerprint images, an improved active contour for the segmentation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GMPLS Technology and Its Application in WDM Optical Network

    Publication Year: 2009, Page(s):48 - 51
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    Generalized multi-protocol label switching (GMPLS) is being developed by the IETF as the industry standard for transport network control planes. GMPLS defines IP based control of optical resources. Routers are expected to deliver advanced services at higher throughput while handling large amounts of label switching path (LSP) creation/deletion, traffic engineering link information exchange, and li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Traffic Technology in Communication Network

    Publication Year: 2009, Page(s):52 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    In recent years, with the information increasing rapidly, WDM communication network traffic is paid more and more attentions. Traffic engineering (TE) is an interesting application in IP-based networks. TE main objective is to optimize the performance of a network through an efficient utilization of network resources. This paper discusses traffic technology and load balancing in optical networks. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Role Engineering with SKAOS for Systems Employing RBAC

    Publication Year: 2009, Page(s):56 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    Access control is always essential for safe and security access to the system resource. Role based access control (RBAC) model is widely used in large enterprise software systems. The quality of the RBAC policy design especially role definition has great impact on the system security policy implementation. In this paper we propose a novel role engineering methods with security KAOS (SKAOS), which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Optimal Algorithm for a Location Choice Problem

    Publication Year: 2009, Page(s):61 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    The paper presents an improved optimal location choice in a network. The location choice model considers not only the maximum distances between the vertices but also the sum of the whole cost, which is a common problem in our society. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research of a Structural P2P Model Based on Mobile Cellular Networks

    Publication Year: 2009, Page(s):64 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    This paper provides the C-Chord model which is a Peer-to-Peer overlay network strategy based on mobile cellular networks. In according with theories of Chord model and the landmark cluster, and making use of characteristics of cellular architectures and base stations in mobile cellular network, C-Chord model is formed master Chord ring by all base stations and formed slave Chord ring by the mobile... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding Safe Shelters in Urban Areas for Earthquake Emergency Response through Web Processing Service

    Publication Year: 2009, Page(s):68 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    Earthquake emergency response provides support for making judgments and decisions in order to reduce levels of casualties and economic losses during a state of emergency after the occurrence of an earthquake. In the relief activities, it is of vital importance to provide evacuees usually in panic with accurate safety information. Immediate assessments of victims, collapsed buildings, interruption ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.