|
|
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
Bali, Indonesia, 26 – 28 July 2011
(Click here to
view CICSyN2010 CICSyN2009 Proceedings in IEEE Digital Library) |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Call for Papers Paper Submission Registration Venue/Rooms Social Events
Keynote and Tutorial
Speakers: keynote-1, tutorial, keynote-2 Submission
of Full/Short/Poster/WIP
papers: see above Notification From: 10 May 2011 Camera-ready to CPS server
& copyright form: 15 June 2011
Registration (Payment) due from: 17 June 2011 Credit Card on EDAS Conference Chairs Suwarno, ITB Jasmy Yunus, UTM Programme Chairs Ismail Saad, UMS Zuwairie Ibrahim, UTM Local Arrangements/ Venue Chairs Ida Ayu Dwi Giriantari, Udayana University Advisory and Honorary
Chairs
Prof Marzuki Khalid, UTM Prof Rrosni Abdullah, USM Prof Paulus Rihardjo, UNPAR Prof Rosalam Sarbatly, UMS General Chair: General Co-Chair: Ajith Abraham EUROSIM Liaison Chair: Richard Zobel |
Scheduled papers: check your paper Paper submission NEW EXTENDED FINAL Deadline:
15 June 2011 Use template below to format your paper: Word template (MS Word
.doc format) Then submit it through EDAS: http://edas.info Paper Registration: DEADLINE 17 June 2011 __________________________________________________________________ Conference Venue: Bali Rani Hotel, Jl Kartika
Plaza, Kuta, www.baliranihotel.com, ___________________________________________________ Papers are invited on any aspect of Computational
Intelligence, Communication
Systems and Networks. Papers
presenting work validated by experimentation, simulation or analysis are
solicited. Papers with application and experimental focus from both industry
and academy, duly documenting lessons learnt from test-beds, field trials or
real deployments are particularly welcome. Manuscripts must be submitted
electronically through the EDAS system. The conference will be held in Bali,
Indonesia. Topics of interest include, but are not
limited to: Tracks/Themes
Intelligent Systems Hybrid Intelligent Systems & Hybrid Soft Computing Sensor Nodes, Circuits, Devices, Wireless Sensor Networks Image, Speech and Signal Processing Transport, Logistics, Harbour, Shipping and Marine Virtual Reality, Visualization and Computer Games Parallel and Distributed Architectures and Systems Internet Modelling, Semantic Web and Ontologies Mobile ad hoc Networks Vehicular Technology and Networks Air Interfaces QoS for Voice and Video
in Wireless Networks Applications: aerospace; remote sensing;
wireless communication, intelligence and simulation, electronic circuits and
systems; communication and networks; management; games,
war/conflict/rebellion modelling, cognitive functions, semantics modelling/
dynamics; manufacturing; robotics; measurement; monitoring; safety critica1
systems; military. Exhibitors: manufacturers of software and
hardware, publishers, etc., are invited to apply to exhibit their products. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Submission Guidelines |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
You are invited
to submit: - proposal to organize a
technical session and/or workshop. Submissions must
be original, unpublished work containing new and interesting results that
demonstrate current research in all areas of computational intelligence,
computer systems and networks, focusing on modelling, simulation and
applications in science, technology, business and commerce. Proceedings will
be published by IEEE Conference
Publishing Service (CPS). The conference is jointly organised by UK
Simulation Society and Asia Modelling and Simulation Society and supported/co-sponsored
by -
EUROSIM -
European
Council for Modelling & Simulation -
IEEE UK
& RI Section -
IEEE
Indonesia Section -
Society for
Computer Simulation Int. (SCS) Submission implies the willingness of at least one of the authors
to register and present the paper. All papers are to be submitted
electronically,- see full instructions under Paper Submission below,
in PDF or Word format. All papers will be peer reviewed by at least three
independent referees of the international program committee. Paper Submission: CICSyN2011 is using EDAS for submission
and registration, authors need to: - create an
account with EDAS by clicking on the link below - open the list
of conferences managed by EDAS & find CICSyN2011 - click on
Submit button on the right to enter your paper title & abstract - upload file. IEEE Author Kit will be
emailed to authors individually upon acceptance of their papers. Paper Templates: Word template (MS Word .doc format) Authors
of the best papers will be invited to revise and extend their work for
publication in a special issue of the
International Journal of Simulation: Systems, Science and Technology. Conference website: http://cicsyn2011.info TPC Prof. Ing. Heinz
Frank, Reinhold-Wuerth-University
Künzelsau, Germany Prof. P.K.
Meher, NTU, Singapore Dr
Athanasios Pantelous, UK Dr. Harkirat
Singh, Samsung, USA Dr. Maman
Abdurohman,Institut Teknologi Telkom,Bandung - Indonesia Prof. Vijay
Bhargava, University of British Columbia, Vancouver, Canada Prof. Hai JiangArkansas
State University, USA Dr.
Theodoros G. Kostis, Greece Dr. Varun Jeoti, Petronas,
Malaysia Dr. Joanne Scillitoe,
Michigan Tech Univ, USA Prof Shubha Kher, USA Prof Helen Karatza, Greece Prof Anna Lekova, Bulgaria Prof. Sudarshan Tiwari,
MNNIT, Allahabad Dr. Shekhar Verma, IIIT,
Allahabad Dr. Shrishu Verma, IIIT,
Allahabad Prof. Harnath Kar, MNNIT,
Allahabad Prof. A.G. Keshkar, VNIT,
Nagpur, India Prof. P.K. Singhal, MITS,
Gwalior India Prof. S.S. Bhadoria, MITS,
Gwalior, India Ms. Pallavi Shukla, VITM,
Indore, India Mr. Manish Dixit, MITS, Gwalior, India Prof. A.K. Saxena, Libya Dr Zuzka Oplatkova, Czech
Republic Dr. Aditya Trivedi, IIITM, Gwalior,
India Prof. B.K. Mohanty, JIET,
Guna, India Mr. R.S. Tomar, IITM,
Gwalior, India Mr. B.K. Chaurasia, IIIT,
Allahabad, india Dr. Shirsu Verma, IIIT,
Allahabad, India Mr. Arvind Jain, RJIT,
Gwalior, India Mr. Prashant Purohit, RJIT,
India Mr. P. Ganeshan, British
Telecom, Malaysia Dr.
S.S. Bedi, Barielly, India Dr.
Lei Shu, Japan Dr.
K. Madduletty, NITIE, Mumbai, India Dr.
Atul Negi, Hyderabad, India Dr.
S.K. Shukla, India Prof.
Suresh Kumar, Tumkur, India Dr. C.V. Tripathi, India Dr. Azrin Aris, Malaysia Dr. Jongman Cho, Korea Dr. Shwkat Ali, Australia Mr. Valliappan Raman, USM,
Malaysia Mr. Rajit Ram, VITM, India Prof Eduard Babulak, Canada Prof. Rakesh Saxena International Reviewers
Abu Khari A'ain Ghulam Abbas Mohsen Askari Athanasios Pantelous Mohd Zaidi Abd Rozan Normaziah Abdul Aziz Izhal Abdul Halin Theodoros G. Kostis Ruzairi Abdul Rahim Irfan Syamsuddin Rosni Abdulla Shahrum Shah Abdullah Dayang Norhayati Abg Jawawi Shukri Abidin Hassan Abolhassani Athanasios Goudosis Ajith Abraham Kamalrulnizam Abu Bakar Gregorio Romero Luisa Martinez Rohani Abu Bakar Carlota Tovar Ford Lumban Gaol Wan Hussain bin Wan Ishak Syed Abd Rahman Abu Bakar Johari Adnan Mohamad Noh Ahmad Mohammad Nazir Ahmad Waqas Ahmad Shakeel Ahmad Waqas Ahmed Khalid Al-Begain David Al-Dabass Dhiya Al-Jumeily Rafe' Alasem Mikulas Alexik Marco Remondino Belal Alhaija Tony Allen Ferda Alpaslan Ismail Amin Shamsudin Amin Konar Amit Marcelo Ang, Jr Obinna Anya Ishak Aris Vijay Arora Irfan Awan Eduard Babulak Kambiz Badie Youakim Badr Gurvinder-Singh Baicher Preeti Bajaj Frank Ball Abhijit Bapat Narendra Bawane Arijit Bhattacharya Fabian Boettinger Mohammad Razaa Borujerdi Vesna Bosilj-Vuksic Felix Breitenecker Adam Brentnall John Brinkman Agostino Bruzzone Bustanur Busta Hueseyin Cakmak Piers Campbell Richard Cant Andre Carvalho Sanjay Chaudhary Russell Cheng Monica Chis Sung-Bae Cho Chin Soon Chong Monica Chris Robert Colomb Emilio Corchado Roy Crosbie Amol Deshmukh R Deshmukh Jafri Din Jiri Dvorsky Andrzej Dzielinski Chionh Eng Wee Mazlina Esa Tony Fleet Thomas Freytag Vikram Gadre Boon Ping Gan G Ganesan Viranjay M. Srivastava Fengge Gao Xiao-Zhi Gao Xiaohong Gao Yannis Goulermas Crina Grosan Jafar Habibi Abdul Razak Hamdan Habibollah Haron Faiezah Haron Fazilah Haron Manaf Hashim Uda Hashim Aboul Ella Hassanien George Herterich Seth Hetu Vlatka Hlupic Sadiq Hussain Abir Hussain Min-Shiang Hwang Zuwairie Ibrahim Hanif Ibrahim Ismail Ibrahim Subariah Ibrahim Mohd. Yazid Idris Mojca Indihar Štemberger Rolly Intan Hisao Ishibuchi Razali Ismail Nauman Israr Norafida Ithnin Teruaki Ito Lakhmi Jain Sudhanshu Jamuar Safeeullah Soomro Janos-Sebestyen Janosy Gerrit Janssens Don Jeng Emilio Jiménez Macías Rao Jinnah Er Joo Kasmiran Jumari Esko Juuso Lilia Kakaradova Nikolaos Karadimas Helen Karatza S. D. Katebi SHET KC Arpad Keleman Avinash Keskar Marzuki Khalid Noor Khafifah Khalid Mohamed Khalil-Hani Hisham Khamis M Kharat Shubha Kher Dong-hwa Kim Mario Koeppen Petia Koprinkova Anna Lekova Michal Kratky Vijay Kukreja Rajeev Kumar Tri Basuki Kurniawan Alhad Kuwadekar Rik Van Landeghem Caroline Langensiepen |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
A minimum of one registration fee is payable for each paper
accepted. When the final version of the paper is uploaded one of the authors should be nominated to attend the conference and present the paper. If this is not done then the organising committee will assume that the first author is the nominated author. The status of the nominated author will determine the registration fee that is payable for that paper. If additional authors wish to attend (and they are not the nominated author for another paper) then an additional registration fee is payable for each such author. Attendees must pay the registration fee
appropriate to their own status. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Scheduled Papers for
Presentation: 42 (+X1) + 2 Keynotes + 2 Tutorials, 6 July 2011-
Final
X1: Extra paper
from AMS2011, #1569435757: Visualizing Work Progress Information of Construction
Project by Web and VR Application, Kang
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Towards 2020 Computing Professor Frank Zhigang Wang, SMIEEE, FBCS Chairman, IEEE Computer Society, UK & Republic of Ireland Chapter Head, School of Computing, University of Kent Canterbury, CT2 7NFUK, United Kingdom Email: f.z.wang@kent.ac.uk Prof Wang and his Future Computing Group at Kent conduct research on Cloud/Grid Computing, Green Computing (via memristor), Biologically-inspired Computing, Quantum Computing/Communication, Data Storage & Data Communication, and Data Storage and Data Warehousing, etc. The Future Computing Research aims to pursuing ground-breaking, high-risk but potentially high gain research that opens up new directions in ICT. The Group has developed a Cloud/Grid Computing platform, which supports universally network applications with a speedup of 2-25. Its associated protocol is the first of its kind worldwide. Best of all, this platform requires no changes in the way users work with their applications since it conforms the existing IT infrastructures. During his presentation, he is going to show a demo of using this platform to accelerate applications, ranging from IBM DB2, MySQL, Office, Firefox Web Browser, Google Earth to Media Player (Table 1). This work has won an ACM/IEEE Super Computing Award. Table 1 The developed Cloud Computing platform accelerates the access to the remote data for different distributed applications [1].
Prof Wang’s group has recently engaged in another research on memristor. Memristor theory was formulated by Leon Chua in 1971. Chua strongly believed that a fourth element existed to provide conceptual symmetry with the resistor, inductor, and capacitor. He called this fourth element a "memristor" that is for “memory resistor”. 37 years later, in 2008, a HP team announced the discovery of a memristor. Recently, Prof Frank Wang discovered memristor's "The Delayed Switching Effect" and applied this effect to computer memory (Fig.1) [2][3].
Fig.1 Computer memory with a
transistor-free crossbar architecture. “Full Selection” means a full voltage,
V, is applied across the two wires with the desired memristor at the
intersection. “Half Selection” means only a half voltage, V/2, is applied across
the (undesired) memristor. An inset shows low-resistance shorting bars
running between cells. λ is the resolution limit of the lithography used
to fabricate the memory cells. The
minimum line width is λ and the minimum distance between lines is 1.2 λ,
thus one cell area is 4.84λ2. Since the first computer was built, scientists have been fascinated with the idea of a computer that works similarly to the human brain. Memristor behaves in a manner that mimics the junctions between the neurons in the brain. The Future Computing Group has investigated their recently discovered "The Delayed Switching Effect" in memristor neural networks. They will develop novel computational architectures, including smart memories and brain-like computers. REFERENCES [1] Frank Wang, Sining Wu, Na Helian,
Andy Parker, Yike Guo, Yuhui Deng, Vineet Khare, Grid-oriented Storage: A
Single-Image, Cross-Domain, High-Bandwidth Architecture, IEEE Transaction on
Computers, Vol.56, No.4, 2007. [2] F. Wang, Na Helian, Sining Wu, Guan
Lim, Yike Guo & Andy Parker, “Delayed Switching in Memristors and
Memristive Systems”, IEEE Electron Device Letters, Volume 31, Issue 7, 2010 [3]
F. Wang, “A newly-discovered delayed switching effect could revolutionize
magnetoelectronic memory design”, 55th IEEE Conference on Magnetism and
Magnetic Materials, Oral Presentation, FE-06, November 14-18 2010, Atlanta,
USA Author’s
Biography Prof. Frank Zhigang Wang Head, School of Computing, University of Kent in Canterbury Chair in e-Science and Grid Computing Director of Center for Grid Computing Cambridge-Cranfield High Performance Computing Facility(CCHPCF) Cranfield University Campus, United Kingdom. Email: f.wang@cranfield.ac.uk
* * * |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Keynote Speaker-2 Cyber Security & Future Networks Professor Eduard Babulak EU CORDIS, Email: babulak@ieee.org The
Telecommunications and Internet Technologies have evolved dramatically during
the last decade, laying solid foundation for the future generation of the
Ubiquitous Internet access, omnipresent web technologies and ultimate
automated information cyberspace. As a result, the current efforts in the
research and development in the areas of Next Generation of Internet and
Telecommunications Technologies promotes formation of inter-disciplinary
international teams of experts, scientists, researchers and engineers to
create a new generation of applications and technologies that will facilitate
the fully-automated information cyberspace systems via Future Networks. Having hundreds of millions of people all over the planet, connecting to Internet via his/her PC, laptop, or portable mobile device, etc., create opportunities to communicate of kind of information and content which may or may not be always contributing to the betterment of mankind. The emergence and accessibility of advanced data and telecommunications technologies combined with convergence of industry standards, as well as the convergence of data and telecommunications industries contribute towards the ubiquitous access to information resources via Internet. The current and future dynamic development and innovation in the field of Future Networks and Global Information Communications Technologies (ICT) create a platform for the ubiquitous connectivity via Cyberspace anywhere at any time for anyone worldwide. Among thousands of different interest groups and social networks in countries worldwide, there are groups that may create, distribute or promote the information that may put state security, national economy and society in danger. Given current complexity of the global Internet infrastructure, in conjunction with the human factor, creates foundation for categories that may trigger local Internet malfunction and ultimately a Cyberspace worldwide. In light of recent earthquakes in Japan, Australia and South China, it is important to prepare for the Cyberspace malfunction triggered by the natural disaster(s) worldwide. These categories are: Natural disasters: Flooding; Earthquake(s); Volcanic explosion(s), etc.; Human factor: Terrorist driven attack(s); Politically and Economically driven attack(s); War(s), etc.; Hardware & Software: Power supply, Connectivity; Reliability; Malware and spams; Configuration; Interoperability; All across the globe, there are many professional groups of experts working together to make sure that the Future Networks and Cyberspace function properly. There number of the Computer Emergency Response Teams (CERTs) that operate and cover a specific region on the planet, such as Australian CERT [1], Japanese CERT [2], US CERT [3], APCERT [4] and PacCERT [5]. The regional CERTs coordinate and monitor the Internet in collaboration with the regional network service providers, security vendors, government agencies, as well as the industry associations. The author will discuss the technological trends in Future Networks, Cyber-security and CERTs. Keywords: Future Networks, Computer Emergency Response Team (CERT), Cyber Security, globalization. References: [1] AusCERT: http://www.auscert.org.au/ accessed February 7th 2011; [2] JPCERT: http://www.jpcert.or.jp/english/about/ accessed February 7th 2011; [3] USCERT: http://www.us-cert.gov/ accessed February 7th 2011; [4] APCERT: http://www.apcert.org/ accessed February 7th 2011; [5] APCERT membership: http://www.apcert.org/about/structure/members.html last visited on February 7th 2011; Author’s
Biography
* * * |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Tutorial-1 Secure Multi-party
Computation for Preserving Privacy:
Problems,
Techniques and Applications
Professor Durgesh Kumar Mishra Professor (CSE) and Dean (R&D), Acropolis Institute of Technology and Research, Indore, MP, India, Ph - +91 9826047547, +91-731-4730038 Mishra_research@rediffmail.com Chairman IEEE Computer Society, Bombay Chapter, Vice Chairman, IEEE MP-Subsection, durgeshmishra@ieee.org, dkmishra@acropolis.in Consider a set of parties who do not have trust in each other, nor in the channel by which they communicate. Even then the parties wish to correctly compute some common function of their local inputs, while keeping their local data secure from others. This, in a nutshell, is the problem of secure multi-party computation (SMC). This problem is fundamentally in cryptography and in the study of distributed computations. It takes many different forms depending on the underlying network, on the function to be computed, and on the amount of distrust the parties have in each others and in the network. In this tutorial, we present several aspects of secure multi-party computation like privacy of Individuals, correctness of result and network traffic reductions. We first present the definition of this problem in various situations. Our definition is drawn from the previous idea and formulizations, and incorporate aspects that were previously overlooked. We also present several problems associated with SMC. Next we show the problem of hiding the data form trusted third party (TTP) which computes the result. We present the existing solutions of SMC along with the protocols developed by us. In our first solution, we introduced a randomly selected anonymizer between the parties and the TTP to hide the data. Apart from the randomly selection of anonymizer, the party will divide the data into number of packets and then send to different anonymizer so that the entire data will not reach to a single anonymizer and the privacy of individual will be maintained. After that, we present another problem, which enables the SMC to perform the correct computation of the result as well as the authentication of computational body. We have introduced multiple TTPs instead of a single one. If there is only one TTP then its behavior can be suspicious. Using this multiple TTP concepts we have the option to choose a TTP from domain of TTPs for computation. In this method we divide the data in several packets and these packets are sent to multiple TTPs and a randomly selected master TTP will perform the computation after accumulating data from other TTPs. For the authentication of TTP, we have introduced the concepts of equivalence classes. With the help of this concept we remove the malicious TTP from the system for further computation. Finally, present the problem of dealing with adversaries in SMC and minimizing their effects. We investigate the power of adversaries in several situations. We have also minimized the complexity of network traffic in entire process of SMC. Author’s
Biography
* *
* |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Tutorial-2 Cross Layer Optimization
in Ad-hoc network using Directional Antenna and Switching Network Prof. Geetam Singh Tomar Principal, Malwa Institute of Technology & Management Gwalior, India Email: geetamtomar@gmail.com In the field of wireless network new challenges have erupted with growing technologies. The challenges are to accommodate new standards, protocols and services with better performance. The parameters to cater are data rate, spatial reuse and reducing interference. In wireless communication lower three layers play a major role thus cross layer communication is required to use information available in one layer to another layer, which needs optimization of cross layer communication. In this paper we have provided a solution using directional antenna. By using this method problems like channel interference, spatial reuse have been reduced and has provided stable path by increasing the coverage range and reducing the no of hops, which has helped in eliminating frequent route errors in ad hoc networks by incorporating some changes in MAC layer and in routing layer. In this work we have used DSR (Dynamic Source Routing) protocol, because this protocol is a more appropriate for directional antennas as it has less complexity than other routing protocols. This has achieved cross layer optimization between the MAC layer and Routing Protocol so that it gives a better performance than omni directional antennas. The option of using Microwave switching network is also being investigated to improve throughput and mitigate problems arised due to use of directional antennas. Author’s Biography
* * * |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||