IJWMT Vol. 1, No. 3, Jun. 2011
Cover page and Table of Contents: PDF (size: 119KB)
REGULAR PAPERS
Rapid development of the multimedia and the associated technologies urge the processing of a huge database of video clips. The processing efficiency depends on the search methodologies utilized in the video processing system. Use of inappropriate search methodologies may make the processing system ineffective. Hence, an effective video retrieval system is an essential pre-requisite for searching relevant videos from a huge collection of videos. In this paper, an effective content based video retrieval system based on some dominant features such as motion, color and edge is proposed. The system is evaluated using the video clips of format MPEG-2 and then precision-recall is determined for the test clip.
[...] Read more.When detecting a target or monitoring a physical phenomenon in a region, the deployment problem is fundamental in these applications. Traditionally, stationary sensor networks are deployed to carry out the sensing operations. It is well known that the mobility of sensor nodes can improve the coverage and the probability of the detecting, so we deal with the problem of detecting a target using hybrid sensor networks which contain both stationary sensors and mobile sensors. In this paper, to begin with, we prove that the node deployment problem is NP-complete. Then, one polynomial algorithm for node deployment in hybrid wireless sensor networks is proposed, which aims at minimizing the number of all sensors to reduce the cost. The simulations verify the efficiency of our algorithm.
[...] Read more.Referring to transportation network reliability problem, five new computer network reliability definitions are proposed and discussed. They are computer network connectivity reliability, computer network time reliability, computer network capacity reliability, computer network behavior reliability and computer network potential reliability. Finally strategies are suggested to enhance network reliability.
[...] Read more.In order to found a scalable platform for attack resistance test, this paper proposed a simulation method for network attack. We designed a modular framework and using XML to describe the test cases. We also realized both stateful and stateless attacks by Socket programming and Jpcap packet forging method. Experiment results showed that the system has good scalability and provides a template-based testing circuit.
[...] Read more.From the qualitative and quantitative perspectives, by use of modern educational philosophy and statistics evaluation theory, this thesis makes study on the theory for university students’ comprehensive quality evaluation. It makes careful analysis on the students’ daily life according to their characters, and makes scientific classification after picking up the main aspects, and then, combining the design principle of indictor system and hierarchic method, it establishes scientific and reasonable comprehensive quality evaluation indicator system for university students, which is easy to operate and meets the demand of the age. So the system can measure and evaluate the comprehensive quality of university students in a more scientific and objective way. Meanwhile, this thesis puts forward effective methods for university students’ comprehensive quality evaluation under new situations.
[...] Read more.This paper puts forward a simple algorithm to make color images lighter based on Wavelet transformation and histogram smoothing. This algorithm uses HIS space which is based on human visual features. Without changing hue, it can conduct histogram smoothing in low brightness frequency domain through wavelet decomposition and make the images lighter, which at the same time avoids vagueness of details and increase of noises. According to experiment results, this algorithm can make low brightness color images lighter effectively with low time complexity.
[...] Read more.Advances in the areas of smart embedded devices, computing and networking are leading to the emergence of the Internet of Things (IoT) composed of millions of heterogeneous devices. These devices will be interconnected, providing and consuming information available on the network and cooperate. As the improvement of the performance of industrial processes, the service-oriented approach can be adopted for smart embedded devices. Each device can offer its functionality as services. In such infrastructures, traditional web service compositions can not adapt to the dynamic environment for the Internet of Things. In this paper, we propose an approach to compose services with context. It can not only adapt to dynamic environment for the Internet of Things, but also satisfy the user’s preferences. We first build context ontology to describe the scenario for user. According to context information, the service composition process is presented.
[...] Read more.In this paper, a quality of service (QoS) multicast routing protocol in mobile ad hoc networks (MANET) using directional antennas has been presented. Many important applications, such as audio/video conferencing, require the quality of service guarantee. Directional antenna technology provides the capability for considerable increase in spatial reuse, which increases the efficiency of communication. This paper studies TDMA-based timeslot allocation and directional antennas, and presents an effective algorithm for calculating bandwidth of a multicast tree. We also propose a novel DSR-based QoS multicasting routing agrotithm. The simulation result shows the performance of this routing protocol in terms of call success rate.
[...] Read more.In this paper, we propose two format-compliant encryption schemes for JPEG2000, which preserve the syntax of the original codestream and do not introduce superfluous markers into the encrypted bitstream. The proposed efficient scheme randomly encrypts either low or upper half bytes of those randomly selected bytes in Codeblock Contribution to Packets (CCPs). The secure scheme encrypts both low and upper half bytes and can protect the nearly whole codestream except for the header information. The proposed schemes can provide efficient, secure, scalable and completely format-compliant protection of JPEG2000, which is proved by lots of experiments.
[...] Read more.There is increasing pressure on providing a high degree of assurance of operation system’s security and functionality. Formal verification is the only known way to guarantee that a system is free of programming errors. We study on formal verification of operation system kernel in system implementation level and take theorem proving and model checking as the main technical methods to resolve the key techniques of verifying operation system kernel in C implementation level. We present a case study to the verification of real-world C systems code derived from an implementation of μC/OS – II in the end.
[...] Read more.