Sciweavers

ITIIS
2010
223views more  ITIIS 2010»
13 years 10 months ago
An Adaptive FEC Mechanism Using Cross-layer Approach to Enhance Quality of Video Transmission over 802.11 WLANs
Forward Error Correction (FEC) techniques have been adopted to overcome packet losses and to improve the quality of video delivery. The efficiency of the FEC has been significantl...
Longzhe Han, Sungjun Park, Seung-Seok Kang, Hoh Pe...
ITIIS
2010
240views more  ITIIS 2010»
13 years 10 months ago
Super-Resolution Iris Image Restoration using Single Image for Iris Recognition
Iris recognition is a biometric technique which uses unique iris patterns between the pupil and sclera. The advantage of iris recognition lies in high recognition accuracy; howeve...
Kwang Yong Shin, Byung Jun Kang, Kang Ryoung Park
ITIIS
2010
131views more  ITIIS 2010»
13 years 10 months ago
The Analysis of Random Propagating Worms using Network Bandwidth
There is a well-defined propagation model, named the random constant spread (RCS) model, which explains worms that spread their clones with a random scanning strategy. This model ...
Kwangsun Ko, Hyun-Su Jang, Byuong Woon Park, Young...
ITIIS
2010
191views more  ITIIS 2010»
13 years 10 months ago
Cooperative Multi-relay Scheme for Secondary Spectrum Access
In this paper, we propose a cooperative multi-relay scheme for a secondary system to achieve spectrum access along with a primary system. In the primary network, a primary transmi...
Tran Trung Duy, Hyung Yun Kong
ITIIS
2010
172views more  ITIIS 2010»
13 years 10 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li
ITIIS
2010
151views more  ITIIS 2010»
13 years 10 months ago
Practical Data Transmission in Cluster-Based Sensor Networks
Data routing in wireless sensor networks must be energy-efficient because tiny sensor nodes have limited power. A cluster-based hierarchical routing is known to be more efficient ...
Dae Young Kim, Jinsung Cho, Byeong-Soo Jeong
ITIIS
2010
144views more  ITIIS 2010»
13 years 10 months ago
Cross-layer Design of Rate and Quality Adaptation Schemes for Wireless Video Streaming
Video streaming service over wireless networks is a challenging task because of the changes in the wireless channel conditions that can occur due to interference, fading, and stat...
Sunhun Lee, Kwangsue Chung
ITIIS
2010
137views more  ITIIS 2010»
13 years 10 months ago
Improving the Availability of Scalable on-demand Streams by Dynamic Buffering on P2P Networks
In peer-to-peer (P2P) on-demand streaming networks, the alleviation of server load depends on reciprocal stream sharing among peers. In general, on-demand video services enable cl...
Chow-Sing Lin
ITIIS
2010
183views more  ITIIS 2010»
13 years 10 months ago
Reversible Watermarking Method Using Optimal Histogram Pair Shifting Based on Prediction and Sorting
To be reversible as a data hiding method, the original content and hidden message should be completely recovered. One important objective of this approach is to achieve high embed...
Hee Joon Hwang, Hyoung Joong Kim, Vasiliy Sachnev,...