2010 WASE International Conference on Information Engineering

14-15 Aug. 2010

Go

Filter Results

Displaying Results 1 - 25 of 85
  • [Front cover - Vol 4]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (629 KB)
    Freely Available from IEEE
  • [Title Page i - Volume 4]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (8 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 4]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (372 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 4]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents - Volume 4

    Publication Year: 2010, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Preface - Volume 4

    Publication Year: 2010, Page(s):xi - xv
    Request permission for commercial reuse | PDF file iconPDF (119 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committee - Volume 4

    Publication Year: 2010, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • A New Synchronization Method for MIMO-OFDM Systems with CAZAC Sequence

    Publication Year: 2010, Page(s):3 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    A new synchronization method for MIMO-OFDM systems with CAZAC sequence is presented in this paper. Frame timing objective functions is sharpen by using CAZAC Sequence, and its accuracy is also improved. Combing frame and symbol synchronization, only one step is needed for timing algorithm. Reducing the computation load and defining the first channel path accurately. Integral frequency offset corre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing Network Paravirtualization with Static Shared Memory Pipe

    Publication Year: 2010, Page(s):6 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    Virtual machine technology can provide high server utilization and service consolidation on an individual physical machine, and gains acceptance in diverse fields. In a growing number of contexts, many situations require high-performance network virtualization. Paravirtualized network system adopts split driver model, and uses dynamic shared memory mechanism for communication between unprivileged ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New AKE Protocol with Stronger Security in the eCK Model

    Publication Year: 2010, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    In this paper, we present a new authenticated key exchange (AKE) protocol, called NS+, which allows the adversary to reveal all the ephemeral secret information, especially including the Diffie-Hellman exponets, used for building one party's outputting message. We also prove the security of this protocol in the eCK model, under the random oracle assumption and the gap Diffie-Hellman (GDH) assumpti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Bi-directional Resource Reservation Proposal for Hard Congestion

    Publication Year: 2010, Page(s):14 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    For real-time multimedia communication has strict QoS (Quality of Service) requirements for network, especially it is very sensitive to packet loss rate and delay jitter. When the communication network becomes seriously congested, a Bi-directional Resource Reservation model solution is proposed. This scheme supports the QoS priority and Bi-directional Reservation. The results show that the interna... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hash function and smart card based multi-server authentication protocol

    Publication Year: 2010, Page(s):17 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    To use the network services provided by multiple servers in mobile wireless network, a hash function and smart card based multi-server authentication scheme without verification tables and servers' public keys is proposed. The new protocol has many advantages, such as no encryption, signature, verification tables, timestamp, and public keys directory. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of Rate Assignment on the Downlink of WCDMA

    Publication Year: 2010, Page(s):20 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    In WCDMA system, rate assignment algorithm on the downlink for the data transmission is proposed. The optimization goal of the resource allocation strategy is choosing appropriate utility function. The utility function reflects a flexible tradeoff between total system throughput and fairness. The power is distributed through the control module and the scheduling module. The simulations show the pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Basic Study on E-interview

    Publication Year: 2010, Page(s):23 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    This paper defines the concept of E-interview, analyze the advantage of E-interview and elaborate the reason of the application scope of the E-interview in the current personnel selection. This paper not only points out the important position and the applicable scope of the E-interview in the current personnel select, but also does the basic estimate to the application foreground of the E-intervie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D Model Transmission and Interactive Rendering over Wireless Network

    Publication Year: 2010, Page(s):26 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    In order to overcome the shortcomings brought by the narrow bandwidth of wireless network and limited computing ability of mobile terminals, this paper mainly proposes a 3D model transmission and interactive real-time rendering method over wireless local area network. Firstly, an optimized model simplified algorithm is presented for preserve the visually important vertices longer than other vertic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring the Shipping Logistics Operations Mechanism Based on the Theory of Ecological Population

    Publication Year: 2010, Page(s):30 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    This paper summarizes the meaning and characteristics of shipping logistics. Based on the similarity between shipping logistics and ecological species, the paper analyzes the population characteristics of shipping logistics. Referring to the logistic growth model of ecology, this paper builds a one-single-agent logistic growth model for shipping enterprises. For multi-agents shipping enterprises, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stress Field Analysis around the Residual Oil Film in Formation Micro-pore with Polymer Flooding

    Publication Year: 2010, Page(s):34 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    There is still nearly 40% of the crude oil remaining in the rock strata formed in residual oil after primary and secondary recovery. In order to improve oil recovery, to find the residual oil recovery method, to further improve the theoretical system of polymer flooding. Through the establishment of constitutive equation and flow equation and the boundary conditions suitable for describing the flo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-user Receiver Based on MMSE Criteria in Laplace Noise and Alpha-stable Noise

    Publication Year: 2010, Page(s):38 - 41
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    In this paper, we modify background noise of multi-user detection, by selecting non-Gaussian noise of more harshly conditions such as Laplace noise and Alpha-Stable noise. Under the traditional MMSE algorithm, Comparing the BER of the two noises with Gaussian noise, which can get close to real complex environment and be beneficial to further research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Performance of Decorrelator in Non-Gaussian Noise

    Publication Year: 2010, Page(s):42 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    In this paper, we modify background noise of multi-user detection, by selecting non-Gaussian noise of more harshly conditions such as Laplace noise and Alpha-Stable noise. Under the traditional DEC algorithm, Comparing the BER of the two noises with Gaussian noise, which can get close to real complex environment and be beneficial to further research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OPNET-based Network of MANET Routing Protocols DSR Computer Simulation

    Publication Year: 2010, Page(s):46 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    In order to better address the problems like the inefficiency and large expense of various Ad Hoc routing protocols, this paper using OPNET simulation tool for the performance of DSR routing protocol simulation, build a small-scale (30 nodes), medium size (50 nodes) and large-scale (100 nodes) the complexity of the mobile ad hoc network model, the DSR routing algorithm, the average route discovery... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Mining Based Intrusion Detection System in VPN Application

    Publication Year: 2010, Page(s):50 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    In order to solve the problem that the technology can not satisfy VPN consumer's need about information insurance for the safety resolving tradition's, in the main body of this essay, we have being aimed at it's safe hidden trouble on the basis going deep into the operating principle studying VPN's, have brought forward one kind of scheme, this scheme passes an introduction invade check system, ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML in Web Data Mining Application

    Publication Year: 2010, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    The difficult issue of Web data mining is proposed to achieve Web data mining method, which is based on XML-based Web database in the face of semi-structured data structure excavation process, the data feature extraction process, we found the hidden rules and knowledge, the method is simple, effective and low cost. The paper first gives the definition of data mining; describes the process and comm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Study of VCO Automatic Test System Base on GPIB Bus

    Publication Year: 2010, Page(s):57 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    With the rapid development of 3G communications, RF circuits are becoming more widespread, so the electronic components VCO's applications grows ever wider, because it is the core module in the oscillator circuit. A voltage-controlled oscillator automatic test system based on GPIB bus is introduced. This system and computer combination has changed the traditional manual operation, VCO production e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recipient Anonymity: An Improved Crowds Protocol Based on Key Sharing

    Publication Year: 2010, Page(s):60 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    Crowds, which is a classical P2P anonymous communication protocol, adopts random forwarding to effectively provide a privacy preserving way of accessing the web with good expansibility, without web sites being able to recognize who is browsing. However, it does not provide anonymity against global eavesdroppers. Furthermore, recipient anonymity and relationship anonymity are not implemented by Cro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.