The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper,based on the analysis and comparison of the several current typical multiple constraints routing algorithms,a kind of simple multiple contraints multimedia routing algorithm is researched and implemented.Multiple contraints embodied in the two indicators bandwidth and latency.In this algorithm,all links not meeting the bandwidth requirements are eliminated firstly,then we select the...
In this paper, an approach was proposed based on coalitional games to solve the problem that packets of boundary nodes cannot be forwarded. This approach can effectively motivate backbone nodes to forward packets for the boundary nodes. In order to prevent "monopoly" behavior of backbone nodes, we proposed auction mechanism for competition using auction theory. Finally, we develop a packet-forwarding...
Virtualization is an effective mean of supporting the new internet architecture research,The ForCES idea of control element and forwarding element separation provide a basis for router virtualization. This paper focus on the research of virtual service application implement base on the ForCES framework, we built a virtual service application architecture based on the ForCES framework in PC, this system...
The network information system based on multi-level security strategy (MLSS) is adopted by many organizations, as it reflects features of mandatory access control. Meanwhile, the network has also attracted a growing number of Trojan horses' attacks. Considering the relationship between defend ability and security levels, the paper discusses that the Trojan horses' attacks have a dependency on data...
Low-rate denial-of-service attack is a novel category of attacks that are based on exploiting the adaptive behavior exhibited by several network and system protocols. This attack through periodically non-suspicious low-rate attack pulsing, to reduce the performance of the victims. Based on the simulation of low-rate denial-of-service on NS2 platform, we analyze the defense performance of queue management...
Similarity-Search based index structure is an important topic in many application areas, such as content-based multimedia information retrieval, data mining, cluster analysis, etc. In order to improve query performance in high-dimensional vector spaces, lots of index structures have been proposed. However, many well-known index structures encounter “dimensional curse” while the dimension of feature...
The author worked past year as Professor & Head of School of Computing, Information and Mathematical Sciences and Director of Japan Pacific ICT Centre at the University of South Pacific. The South Pacific Region has many problems related to environmental and economic issues. The University of the South Pacific (USP) is an ideal platform for provision of development of Human Resources and enhancement...
Recently, many variants of hypercube have been investigated. In this article, we mainly focus our attention on a more hypercube-like network, the enhanced hypercube. The n-dimensional enhanced hypercube, denoted by Qn,k, possesses many properties superior to the hypercube. Many properties of enhanced hypercube have been proposed, however, this paper aims to show that when the network has a faulty...
This paper explores Bhattacharyya Distance principle and introduces it to recognize stego algorithms in use. First of all, we select the most important features by the means of applying Bhattacharyya distance. Then, BP neural network is used to classify cover and stego images. Extensive experimental works show that the proposed schemes have satisfactory performance on Jpeg steganography like F5, Outguess,...
Security has become an important issue in Web Services application, which has been widely concerned. This paper introduces several security policy models that widely applied and analyzes the basic principles. And then a simple comparison was made for the scope and merits of these models, finally this paper points out the Web Services security research.
Most traditional MAC protocols proposed for wireless networks assume static Network Units (shorted as NUs), which usually lead to performance degradation in mobile scenarios. In this paper, a novel hybrid MAC protocol, called MA-MAC, was presented for multi-hop mobile Tactical Data Link networks based upon the mobile characteristics of NUs. The basic point of MA-MAC is that the transmit mode of each...
Concurrent signature was introduced as an alternative approach to solving the problem of fair exchange of signatures. It allows two entities to produce two signatures in such a way that, the signer of each signature is ambiguous from a third party's point of view until the release of a secret, known as the keystone. Once the keystone is released, both signatures become binding to their respective...
As a new application model of e-government, mobile e-government provides a new approach to improve government's efficiency, effectiveness and economy of public services. This paper deals with the current development of China's mobile e-government. We first discusses the concept of m-government, introduces relevant technologies and application fields of mobile communication technology in government,...
The paper shows that knowledge, including knowledge but not IPR, contributes to the benefit to R&D divisions of JMCs when they dealing with KIBS. But the production divisions tend to obtain the IPR from KIBS. The price of service, location and size of KIBS can help JMCs to find high quality services. Furthermore, the size of KIBS is the most important criterion to R&D group for choosing KIBS...
How to organize and discover the virtual resource effectively is an important research issue in network virtualization environment especially across multiple infrastructure providers with conflicting goals. In this paper, we explore a virtual resource organization and discovery framework of multiple infrastructure providers. The framework composed of Cluster Index Servers and Management Nodes aggregates...
This paper proposes a novel encryption scheme based on invertible watermarking. In the past encryption algorithms, diffusion and confusion algorithms are used to increase the effect of the encryption, however, these algorithms can only change the cover itself to be encrypted. In this paper, the invertible watermarking can be used to perform the encryption, which can not only use the additional information...
This paper presents a new steganographic method called WiPad (Wireless Padding). It is based on the insertion of hidden data into the padding of frames at the physical layer of WLANs (Wireless Local Area Networks). A performance analysis based on a Markov model, previously introduced and validated by the authors in, is provided for the method in relation to the IEEE 802.11 a/g standards . Its results...
An information hiding method on escape sequences of Huffman coding which can embed a great deal of secret information into AAC files is proposed based on the research of AAC coding standard. The proposed algorithm first unpacks the cover AAC file to search for the escape sequences, and then modifies least significant bit (LSB) of the escape sequences with the approach of matrix encoding, to improve...
With the fast development of Internet technology and information processing technology, the image is commonly transmitted via the Internet. People enjoy the convenience and shortcut, but people have to face to the obsession that the important image information in transmission is easily intercepted by unknown persons or hackers. In order to enhance the image information security, image encryption becomes...
This paper presents the design and Research of the Streaming Media Video Teaching System. The techniques of multi-media teaching, Computer Assisted Instruction and network are all involved in this system. The teaching environment, teaching resources, teaching content and student information can all be managed through Network Video Teaching System. Teachers can integrate the multi-media elements provided...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.