A Multiple Trees-Based Data Dissemination Scheme in Wireless Sensor Networks

A Multiple Trees-Based Data Dissemination Scheme in Wireless Sensor Networks

2009 WRI World Congress on Computer Science and Information Engineering (CSIE 2009) Los Angeles, California, USA 31 March 2 April 2009 Volume 1 Pages 1-383 IEEE Catalog Number: CFP0960F-PRT ISBN: 978-1-4244-5109-8 TABLE OF CONTENTS COMMUNICATIONS AND MOBILE COMPUTING SYMPOSIUM – VOLUME 1 AD HOC, BODY-AREA AND SENSOR NETWORKS – VOLUME 1 A Multiple Trees-Based Data Dissemination Scheme in Wireless Sensor Networks..................................................................................1 KeZhong Lu, XiaoHui Lin Developing Test System of Ad Hoc Network for Emergency Communications..........................................................................................5 Fang Hong, Tao Yi, He Zhao, Bian Xin Researching on Communication Efficiency for the Mobile Physiological Information Monitor System Based on Zigbee.................................................................................................................................................................................................................10 Jiao Teng, Zhang Kun, Zhang Yang, Wang Hua, Zhu XinYa, Dong Xiuzhen A Backbone Routing Protocol Based on the Connected Dominating Set in Ad Hoc Networks...............................................................14 Yao-Pin Tsai, Tzu-Ling Hsu, Ru-Sheng Liu, Ying-Kwei Ho Distributed Clustering Algorithm with Load Balancing in Wireless Sensor Network............................................................................19 Farruh Ishmanov, Sung Won Kim Employing CHNN to Develop a Data Refining Algorithm for Wireless Sensor Networks......................................................................24 Joy Iong-Zong Chen, Chieh Chung Yu, Meng Tsun Hsieh, Yi Nung Chung Routing Design of Wireless Sensor Networks in Mine Monitoring System...............................................................................................32 Jinpeng Tian, Huichang Shi, Yifei Zhou, WenLiang Guo Impact of Mobility in Ad Hoc Protocol Design .............................................................................................................................................38 Arta Doci, Georgios Samakovitis, Vijaya Raju Provisioning QoS in Wireless Sensor Networks Using a Simple Max-Min Fair Bandwidth Allocation ................................................44 H.Z. Abidin, F.Y.A. Rahman Impact of Link Layer on Routing Protocols in Wireless Sensor Network.................................................................................................49 Franklin Fondjo Fotou, Vicky Y. Taffoti Yolong, Pierre F. Tiako Method to Improve the Performance of Common Channel Framework...................................................................................................53 Junrong Yan, Shunyi Zhang, Jun Li, Huibin Feng Wireless Sensor Network for Orchard Soil and Climate Monitoring ........................................................................................................58 Haiqing Yang, Yong He ANTENNAS, PROPAGATION AND CHANNEL MODELING - VOLUME 1 An Improved Fast Approach for DOA Tracking Estimation......................................................................................................................63 Cheng Wei, Yang Rui-juan, Huang Mei-rong, Fan Zhao-yong Evolutionary Design of On-Chip Antenna for HF Label.............................................................................................................................68 Deyan Wu, Hui Deng The Fractional Brownian Channel Model Considering the Statistical Characters in WCDMA ............................................................73 Cao Dun, Fu Ming, Luo Yi, Chen Xi Design of a Broad/Dual-Band Circularly Polarized Square Slot Antenna Using Genetic Local Search Algorithms...........................77 Tuan-Yung Han, Lin-Yu Tseng Study on the Biconical Antenna in the EMC Test Suitable for Engineering Machinery.........................................................................81 Zhang Kai, Li Wanli, Chen Xiwei UV NLOS Communications Atmospheric Channel Model and Its Performance Analysis .....................................................................85 Wang Junliang, Luo Ting, Dai Meng, Tian Yanfang Study on the Quantitative Analysis of Turbo-Unit Fault Based on Lyapunov Exponent-Correlation Dimension...............................89 Wang Bingcheng, Hou Yongtao COMPUTER AND NETWORK SECURITY - VOLUME 1 Automatic Generation of Host-Based Network Attack Graph ...................................................................................................................93 Shangqin Zhong, Danfeng Yan, Chen Liu A Location-Based Mechanism for Mobile Device Security .........................................................................................................................99 Wayne Jansen, Vlad Korolev Frequency Weighted Hamming Distance for System Call Anomaly Detection ......................................................................................105 Ying Wu, Jianhui Jiang COOPERATIVE COMMUNICATIONS – VOLUME 1 Architecture and Key Technologies of Interactive Intelligent Communication......................................................................................110 Zhonggui Ma, Hongbo Wang, Xianwei Zhou, Xuyan Tu The Investigation of Inter-organizational Information Systems Capabilities in Hebei Province, China.............................................115 Zhang Zhiying, Kang Kai, Wang Yunfeng A Technology of Agent-Cache Used in Mobile Computing Environment ...............................................................................................120 Rubing Liang, Qiong Liu CRYPTOGRAPHY – VOLUME 1 Remarks on Cryptanalysis of RSA Using Lattice Basis Reduction ..........................................................................................................125 Haijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai Efficient Schnorr Type Identity-Based Blind Signatures from Bilinear Pairings...................................................................................130 Zhenjie Huang, Qunshan Chen, Rufen Huang, Xuanzhi Lin GRID, CLUSTER AND P2P COMPUTING – VOLUME 1 Understanding and Supporting Live and On-Demand Streaming Service .............................................................................................135 Yun Tang, Qian Meng, Kaiyun Zhang, Shiqiang Yang Peer Caching Algorithm Based on Global Segment Popularity for P2P VoD System ...........................................................................140 Liu Jie, Liu Yi-na, Cheng Ling-ling, Tao Jun-cai INTRUSION DETECTION AND COUNTERMEASURES – VOLUME 1 An Adaptive Approach of String Metrics Application in the Intrusion Detection Systems ..................................................................145 Evgeniya Nikolova, Veselina Jecheva Automated Risk Assessment for Sources and Targets of Vulnerability Exploitation ............................................................................150 Hassan Rasheed, Randy Y.C. Chow MOBILE AND WIRELESS NETWORKS SECURITY – VOLUME 1 Research on the Optimization of Encryption and Authentication Mode of EAX about Broadband Wireless Communications Equipment.........................................................................................................................................................................155 Qingbo Zhang, Jiaming He, Liu Li Replay Protection at the Link Layer Security in Wireless Sensor Networks ..........................................................................................160 Devesh Jinwala, Dhiren Patel, Sankita Patel, K.S. Dasgupta MODULATION, CODING AND INFORMATION THEORY – VOLUME 1 Constant Power Signaling in Rayleigh Fading Channels: Joint Output Probability Distribution and Information Rate Bounds ....................................................................................................................................................................................................166 Rauf Iqbal, Parastoo Sadeghi, Thushara D. Abhayapala OFDM AND MULTI-CARRIER SYSTEMS – VOLUME 1 Research of Peak-to-Average Power Ratio Reduction Improved Algorithm for MIMO-OFDM System ...........................................171 Xu Yan, Wang Chunli, Wang Qi An Effective Low-Complexity Method for PAPR Reduction in OFDM-Based Systems........................................................................176 Li Yicai, Yang Shizhong A Simplified NLS Frequency Offset Estimator for OFDM Systems .......................................................................................................181 Yun Wu, Wen Chen, Wu-Jun Xu OPTICAL COMMUNICATIONS AND NETWORKING – VOLUME 1 A Real-Time Planning-Based Scheduling Policy with CAN for Automotive Communication Systems ...............................................186 Wanke Cao, Cheng Lin, Wei Zhou, Fengchun Sun Research on the Criterion of Wireless Optical Access System and Its Application................................................................................192 Zhao Li, Ke Xizheng, Yin Zhiyun, Zhou Xiangchen A Novel Optical Multiplexing Approach for Computer Interconnection and Optical Digital Transmission......................................197 Cheng Luo, Biao Chen OTHER TOPICS IN COMMUNICATIONS – VOLUME 1 A Novel Family of Complex Hadamard Matrices with Cyclically Distinct Rows and Large Linear Span..........................................203 Fanxin Zeng OCDMA over WDM System Based on Chebyshev-Map Chaotic Spread Spectrum in Passive Optical Network..............................208 Zhihua Zheng, Zongjue Qian, Guochu Shou, Yihong Hu A Multi-perspective

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    44 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us