International Journal of Wireless and Microwave Technologies (IJWMT)

IJWMT Vol. 1, No. 3, Jun. 2011

Cover page and Table of Contents: PDF (size: 119KB)

Table Of Contents

REGULAR PAPERS

A Comprhensive CBVR System Based on Spatiotemporal Features Such as Motion,Quantized Color and Edge Density Features

By Kalpana S.Thakre Archana M.Rajurkar

DOI: https://doi.org/10.5815/ijwmt.2011.03.01, Pub. Date: 15 Jun. 2011

Rapid development of the multimedia and the associated technologies urge the processing of a huge database of video clips. The processing efficiency depends on the search methodologies utilized in the video processing system. Use of inappropriate search methodologies may make the processing system ineffective. Hence, an effective video retrieval system is an essential pre-requisite for searching relevant videos from a huge collection of videos. In this paper, an effective content based video retrieval system based on some dominant features such as motion, color and edge is proposed. The system is evaluated using the video clips of format MPEG-2 and then precision-recall is determined for the test clip.

[...] Read more.
Polynomial Algorithm for Node Deployment in Hybrid Wireless Sensor Networks

By Lili Zhang Jing Yuan Yingchi Mao Xiwei Zhang Guihai Chen

DOI: https://doi.org/10.5815/ijwmt.2011.03.02, Pub. Date: 15 Jun. 2011

When detecting a target or monitoring a physical phenomenon in a region, the deployment problem is fundamental in these applications. Traditionally, stationary sensor networks are deployed to carry out the sensing operations. It is well known that the mobility of sensor nodes can improve the coverage and the probability of the detecting, so we deal with the problem of detecting a target using hybrid sensor networks which contain both stationary sensors and mobile sensors. In this paper, to begin with, we prove that the node deployment problem is NP-complete. Then, one polynomial algorithm for node deployment in hybrid wireless sensor networks is proposed, which aims at minimizing the number of all sensors to reduce the cost. The simulations verify the efficiency of our algorithm.

[...] Read more.
Enlightenment on Computer Network Reliability From Transportation Network Reliability

By Hu Wenjun Zhou Xizhao

DOI: https://doi.org/10.5815/ijwmt.2011.03.03, Pub. Date: 15 Jun. 2011

Referring to transportation network reliability problem, five new computer network reliability definitions are proposed and discussed. They are computer network connectivity reliability, computer network time reliability, computer network capacity reliability, computer network behavior reliability and computer network potential reliability. Finally strategies are suggested to enhance network reliability.

[...] Read more.
A Scalable Simulation Method for Network Attack

By Jinsong Wang Wenchao Dou Kai Shi

DOI: https://doi.org/10.5815/ijwmt.2011.03.04, Pub. Date: 15 Jun. 2011

In order to found a scalable platform for attack resistance test, this paper proposed a simulation method for network attack. We designed a modular framework and using XML to describe the test cases. We also realized both stateful and stateless attacks by Socket programming and Jpcap packet forging method. Experiment results showed that the system has good scalability and provides a template-based testing circuit.

[...] Read more.
Study on Quality Evaluation System for University Students

By He Yongqiang Yang Mingming

DOI: https://doi.org/10.5815/ijwmt.2011.03.05, Pub. Date: 15 Jun. 2011

From the qualitative and quantitative perspectives, by use of modern educational philosophy and statistics evaluation theory, this thesis makes study on the theory for university students’ comprehensive quality evaluation. It makes careful analysis on the students’ daily life according to their characters, and makes scientific classification after picking up the main aspects, and then, combining the design principle of indictor system and hierarchic method, it establishes scientific and reasonable comprehensive quality evaluation indicator system for university students, which is easy to operate and meets the demand of the age. So the system can measure and evaluate the comprehensive quality of university students in a more scientific and objective way. Meanwhile, this thesis puts forward effective methods for university students’ comprehensive quality evaluation under new situations.

[...] Read more.
A Simple Algorithm to Strengthen the Brightness of Color Images

By Hua ZHANG

DOI: https://doi.org/10.5815/ijwmt.2011.03.06, Pub. Date: 15 Jun. 2011

This paper puts forward a simple algorithm to make color images lighter based on Wavelet transformation and histogram smoothing. This algorithm uses HIS space which is based on human visual features. Without changing hue, it can conduct histogram smoothing in low brightness frequency domain through wavelet decomposition and make the images lighter, which at the same time avoids vagueness of details and increase of noises. According to experiment results, this algorithm can make low brightness color images lighter effectively with low time complexity.

[...] Read more.
Compose Real-world Service With Context

By Guoping Zhang Jiazheng Tian

DOI: https://doi.org/10.5815/ijwmt.2011.03.07, Pub. Date: 15 Jun. 2011

Advances in the areas of smart embedded devices, computing and networking are leading to the emergence of the Internet of Things (IoT) composed of millions of heterogeneous devices. These devices will be interconnected, providing and consuming information available on the network and cooperate. As the improvement of the performance of industrial processes, the service-oriented approach can be adopted for smart embedded devices. Each device can offer its functionality as services. In such infrastructures, traditional web service compositions can not adapt to the dynamic environment for the Internet of Things. In this paper, we propose an approach to compose services with context. It can not only adapt to dynamic environment for the Internet of Things, but also satisfy the user’s preferences. We first build context ontology to describe the scenario for user. According to context information, the service composition process is presented.

[...] Read more.
A QoS Multicast Routing in TDMA-Based MANET Using Directional Antennas

By Yuan Li Xing Luo

DOI: https://doi.org/10.5815/ijwmt.2011.03.08, Pub. Date: 15 Jun. 2011

In this paper, a quality of service (QoS) multicast routing protocol in mobile ad hoc networks (MANET) using directional antennas has been presented. Many important applications, such as audio/video conferencing, require the quality of service guarantee. Directional antenna technology provides the capability for considerable increase in spatial reuse, which increases the efficiency of communication. This paper studies TDMA-based timeslot allocation and directional antennas, and presents an effective algorithm for calculating bandwidth of a multicast tree. We also propose a novel DSR-based QoS multicasting routing agrotithm. The simulation result shows the performance of this routing protocol in terms of call success rate.

[...] Read more.
Format-Compliant Encryption of JPEG2000 Codestreams

By Zhiguo Chang Jian Xu

DOI: https://doi.org/10.5815/ijwmt.2011.03.09, Pub. Date: 15 Jun. 2011

In this paper, we propose two format-compliant encryption schemes for JPEG2000, which preserve the syntax of the original codestream and do not introduce superfluous markers into the encrypted bitstream. The proposed efficient scheme randomly encrypts either low or upper half bytes of those randomly selected bytes in Codeblock Contribution to Packets (CCPs). The secure scheme encrypts both low and upper half bytes and can protect the nearly whole codestream except for the header information. The proposed schemes can provide efficient, secure, scalable and completely format-compliant protection of JPEG2000, which is proved by lots of experiments.

[...] Read more.
The Study on Formal Verification of OS Kernel

By Zhang Yufeng Dong Yunwei Zhang Zhongqiu Huo Hong Zhang Fan

DOI: https://doi.org/10.5815/ijwmt.2011.03.10, Pub. Date: 15 Jun. 2011

There is increasing pressure on providing a high degree of assurance of operation system’s security and functionality. Formal verification is the only known way to guarantee that a system is free of programming errors. We study on formal verification of operation system kernel in system implementation level and take theorem proving and model checking as the main technical methods to resolve the key techniques of verifying operation system kernel in C implementation level. We present a case study to the verification of real-world C systems code derived from an implementation of μC/OS – II in the end.

[...] Read more.