By Topic

Advanced Intelligence and Awarenss Internet (AIAI 2010), 2010 International Conference on

Date 23-25 Oct. 2010

Filter Results

Displaying Results 1 - 25 of 114
  • Title page

    Publication Year: 2010 , Page(s): I
    PDF file iconPDF (17 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2010 , Page(s): 1 - 10
    PDF file iconPDF (65 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet of things—Opportunities and challenges for telecom operators in China

    Publication Year: 2010 , Page(s): 1
    Click to expandAbstract | PDF file iconPDF (31 KB)  

    Internet of things (IoT) is being developed in China as an emerging industry of strategic importance. This presentation will introduce the background and status of IoT industry in China. The development opportunities, key technologies and market challenges of IoT will be analyzed from telecom operators' perspective. Typical IoT application cases in China will be given. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous sensor networks: A glimpse of where we are going

    Publication Year: 2010 , Page(s): 1
    Cited by:  Papers (2)
    Click to expandAbstract | PDF file iconPDF (37 KB)  

    Peter Drucker investigated the impact of railroad on society. “The technology of the steam engine did not end with the railroad.” Although “the railroad made the Industrial Revolution accomplished fact”, the boom it triggered lasted almost a hundred years. The dynamics of the technology shifted to totally new “social institutions: the modern postal service, the d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On mobility profiling and cyber transportation systems

    Publication Year: 2010 , Page(s): 2
    Click to expandAbstract | PDF file iconPDF (29 KB)  

    In this talk, I'll present our results obtained from analyzing users' mobility trace data. Unlike earlier work, we profile the movement patterns of wireless users and predict their locations, and show that each user regularly visits a list of places called hubs (e.g., buildings) with some probability. We also show that over a period of time (e.g., a week), a user may repeatedly follow a mixture of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An overview of future information network research

    Publication Year: 2010 , Page(s): 3
    Click to expandAbstract | PDF file iconPDF (28 KB)  

    Due to historical reasons, the original model of existing information networks is that one network corresponds to one main service, and this mode can't adapts well to increasing multi-demands of networks and services. So network architecture should be redesigned urgently based on new network concept and protocols. We have studied the main issues in future information network, and give the new arch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AI based agriculture support system with precisely deployed versatile sensors and sensor network

    Publication Year: 2010 , Page(s): 4
    Click to expandAbstract | PDF file iconPDF (24 KB)  

    Agriculture industry is fundamental and essential for existence of human beings. On the other hand, agriculture industry is facing serious problems of food shortages due to rapid population increase, sharp decrease of farm land due to greenhouse warming and desertification and diversion of agricultural product into new energy resource. To solve these problems, use of sensors, agricultural informat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring of farm animals with Wireless Sensor Networks

    Publication Year: 2010 , Page(s): 5
    Click to expandAbstract | PDF file iconPDF (25 KB)  

    The presentation will detail an adaptation of Wireless Sensor Networks (WSNs) to cattle health monitoring. The solution facilitates the requirement for continuously assessing the condition of individual animals, aggregating and reporting this data to the farm manager. There are several existing approaches to achieving animal monitoring, ranging from using a store and forward mechanism to employing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart network society applied internet of things

    Publication Year: 2010 , Page(s): 6
    Click to expandAbstract | PDF file iconPDF (27 KB)  

    ICT contributes to construct to the affluent society, putting into the practice of the sophisticated transportation systems, the social safety & secure platform, the monitoring system for lessening the environmental burden such as reducing CO2 emissions and so on. We call “Smart Network Society”, it's the concept of the world view constructing by ICT near future. Then we expect I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A ubiquitous service platform for building context-aware services with resource-oriented interfaces

    Publication Year: 2010 , Page(s): 7
    Click to expandAbstract | PDF file iconPDF (27 KB)  

    Cellular phones and broadband Internet have achieved large degree of accessibility in which users are connected anytime and anywhere. It is desired to create context-aware services best suited for a specific time, place and opportunity to a target user across the boundaries of the virtual and real world, making use of such accessibility. Towards realizing a platform to build such services, we are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impairment-aware protection in optical WDM networks

    Publication Year: 2010 , Page(s): 8
    Click to expandAbstract | PDF file iconPDF (27 KB)  

    In WDM networks, optical reachability is limited by physical impairments introduced by fibers and cascading optical components. In the network design phase, 3R regeneration (reamplifying, reshaping, and retiming) can be placed sparsely at a set of network nodes in WDM networks for extending optical reach and is currently realized by converting the optical signal to the electronic domain and optica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud networking technologies for green innovation

    Publication Year: 2010 , Page(s): 9
    Click to expandAbstract | PDF file iconPDF (25 KB)  

    ICT (Information and communication technology) has continued its progress to improve our lives. While environmental protection and effective use of energy has become a concern of the whole human society, ICT is now required to become not only business tool but also an essential technology for the society by means of environmental protection and energy saving. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Researches and developments on new generation network in AKARI architecture design project

    Publication Year: 2010 , Page(s): 10
    Click to expandAbstract | PDF file iconPDF (26 KB)  

    This presentation will introduce our researches and developments on new generation network (NwGN). The NICT of Japan has been promoting an AKARI architecture design project. Our project aims to design NwGN architecture and develop technologies required for NwGN based on the architecture. Our philosophy is to pursue an ideal solution by researching new network architecture from a clean slate withou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-layer design of packet optical networks the case of joint traffic grooming and regenerator placement

    Publication Year: 2010 , Page(s): 11
    Click to expandAbstract | PDF file iconPDF (28 KB)  

    In optical network design, traffic grooming aggregates low-rate traffic onto high-rate lightpaths in order to utilize wavelength resources efficiently. Regenerator placement allocates signal regenerators throughout the network to address optical reachability issues as well as minimize the overall network equipment cost. Traffic grooming is a function at the optical transport layer (or above), whil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated development environment of software design and space design

    Publication Year: 2010 , Page(s): 12
    Click to expandAbstract | PDF file iconPDF (26 KB)  

    In recent years, large displays have become increasingly popular. Several notable examples are sharing visualized large size of data, smart office, digital signage, interactive public art, and architectural exterior displays. These systems consist of both software and real space components. For instance, interactive digital signage likely utilizes software, cameras, sensors, projectors, speakers, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical-layer multicast based on network coding

    Publication Year: 2010 , Page(s): 13
    Click to expandAbstract | PDF file iconPDF (29 KB)  

    Optical-layer multicast will be a promising solution for high-speed and high-bandwidth multicast applications. While network coding can achieve maximum multicast rate by allowing intermediate network nodes to combine the data received from different incoming links. Therefore, how to apply network coding to optical-layer multicast has been attracting much attention. Due to the limitation of optical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coherent optical single-carrier frequency domain equalization techniques for high speed fiber transmission and access networking

    Publication Year: 2010 , Page(s): 14
    Click to expandAbstract | PDF file iconPDF (27 KB)  

    Coherent optical single-carrier frequency-domain equalization (CO-SCFDE) techniques especially frequency-division-multiplexing scheme (CO-SCFDM) is theoretically and experimentally studied. PON Architecture based on the single-carrier frequency division multiple address (SC-FDMA) technique is proposed and experimentally demonstrated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new model based on P4P IN mobile internet

    Publication Year: 2010 , Page(s): 15 - 18
    Click to expandAbstract | PDF file iconPDF (267 KB)  

    In recent years, large-volume contents delivery have been growing and P2P technology has been a roaring success. However, P2P have some inherent problems, and it would bring severe effect in mobile internet. For example, excessive equality between two peers burdens the backbone network; the security defect worries all of users, etc. To solve this problem, we propose a new telecommunication model b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A protective mechanism using variable-instruction-sets encryption for Java applications in mobile terminal platforms

    Publication Year: 2010 , Page(s): 19 - 22
    Cited by:  Papers (1)
    Click to expandAbstract | PDF file iconPDF (147 KB)  

    In some mobile terminal platforms, such as Android, OMS (Open Mobile System), etc, the compiled Java application files could be easily decompiled, so the security of source codes in Java application is a problem. In this paper, we analyze traditional protective methods for Java application files. Then a class-loading mechanism using variable-instruction-sets encryption is raised. Variable-instruct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Su-peercast: A P2P live streaming system with super-node based on PeerCast

    Publication Year: 2010 , Page(s): 23 - 27
    Cited by:  Papers (2)
    Click to expandAbstract | PDF file iconPDF (467 KB)  

    The amount of client a live streaming system can serve by unicast is limited by the bandwidth requirement. Theoretically, IP-multicast is an efficient solution for that situation, but it suffers from poor deployment. Therefore, another solution, called Application Layer Multicast (ALM), is being increasingly recognized as a available alternative. However, this solution also has certain shortcoming... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An extension of S1 AP protocol for home enodeb

    Publication Year: 2010 , Page(s): 28 - 32
    Click to expandAbstract | PDF file iconPDF (124 KB)  

    Currently, Home eNodeB(HeNB) has become a hot spot research area in the mobile communication, as a small, low-power and client premises access equipment, HeNB connects the operators core network via broadband IP network(Such as DSL or cable) and provides the voice and high speed data service for users. It is not only an extension of mobile telecommunication, but also the integration of fixed and m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on semantic overlay network topology of P2P based on node location

    Publication Year: 2010 , Page(s): 33 - 36
    Click to expandAbstract | PDF file iconPDF (74 KB)  

    Two algorithms are proposed to decrease the communication capacity and consumption of system resources for resource location in P2P networks. Experiment result shows that these algorithms can reduce communication cost significantly, utilize system resources effectively, and improve the overall performance of resource location in P2P networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP-CReno — TCP enhancement using cross-layer for Cognitive Radio Networks

    Publication Year: 2010 , Page(s): 37 - 40
    Click to expandAbstract | PDF file iconPDF (580 KB)  

    In Cognitive Radio Networks, cognitive radio users have to sense and occupy the free channel, and continuously check the channel status. Once primary user needs to utilize this channel, the transmission must stop as not to cause interference, which significantly decreases the performance of TCP. In this paper, we propose an improved transport protocol, called TCP-CReno. This new protocol can obtai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on portscan detection based on selective packet sampling

    Publication Year: 2010 , Page(s): 41 - 45
    Click to expandAbstract | PDF file iconPDF (107 KB)  

    To achieve efficient and effective detection of portscan attacks on high-speed internet backbone links, a new packet sampling technique that focuses on the selection of small packets is introduced and analyzed. A new portscan detection algorithm, SnortHoneypot, which combines the detection techniques of Snort and honeypot is proposed. Under the condition of using systematic sampling, SnortHoneypot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of internet governance based on harmful information propagation model

    Publication Year: 2010 , Page(s): 46 - 51
    Click to expandAbstract | PDF file iconPDF (92 KB)  

    Currently, the harmful information on internet has restricted the process of network, and become a very important part in internet governance. In order to clean-up of harmful information effectively, we must study the mechanisms of its propagation on the internet. Based on the internet topology and dynamic behavior of the biological propagation model, this paper presented a harmful Internet inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.