Applied Mechanics and Materials Vols. 284-287

Paper Title Page

Abstract: This paper proposes a modified Least significant bit (LSB) embedding capable of both a high embedding payload and error correction. The method proposed in this paper combines the techniques of both LSB embedding and multilevel coding to produce stego images with error correction capability and high embedding payloads. The proposed method divides cover work into multiple blocks, and each LSB for all the pixels in each block is considered a layer. Reed-Muller codes are used to encode cipher and embed data into every layer. LSB embedding has no inherent capability to correct errors in cipher extraction, but the proposed method can correct some errors according to the error correction capability of multilevel coding. Compared with LSB embedding, simulation results show that the proposed method has a similar peak signal noise ratio (PSNR) and embedding payload. The peak signal noise ratio (PSNR) exceeds 40 dB by using our proposed method. Additionally, our proposed method offers significantly superior embedding payloads and error correction capabilities.
3256
Abstract: In this paper, we propose a new approach using both the Citizen Digital Certificate and anonymous identification to fulfill the back-end real-name and front-end anonymous verification requirements in an online transaction. Anonymous identification is a simple design to establish the link between the real name and the pseudonym (account ID) selected by the user during the registration, in which the reverse-lookup is not allowed so that the anonymous verification is achieved. The back-end real-name mechanism in this model plays an important role which requires total fairness and trust. Thus, we use the government MOICA as the trust back-end platform, which issues the Citizen Digital Certificate and thus will have the user’s real-name. The main purpose of the front-end anonymity mechanism is that, the online shopping store does not know the real identities of its customers but pseudonyms. The customer is able to conduct a transaction anonymously in a normal circumstance, in which his/her privacy is preserved. The back-end real-name mechanism will be activated only when crime events occur. In such cases, anonymity will be removed through legal means to trace the real identity.
3260
Abstract: In this paper, an optimal routing strategy called TM3NORA for the Internet of Things’ Machine-to-Machine network is proposed. In the Internet of Things, devices or nodes are clustered to create a Machine-to-Machine network, which can be considered as a small-world network. The network model concerned is a Time-constrained Multi-packet Multi-state Machine-to-machine network (TM3N). A TM3N has four characteristics: (1) each arc employs two attributes, capacity and lead time; (2) the arc capacity is stochastic; (3) different packets consume the arc capacity differently; (4) the delivery has to be completed within the promised time window. Essentially, the TM3NORA generates a small-world route map, reduces the route map, obtains the optimal route set that can be used to deliver all types of packets from the source node to the sink node within the desired time window, and evaluates the small-world route map’s overall reliability that all types of packets can arrive at the sink node within the time constraint. The efficiency and accuracy of the TM3NORA are validated through a numerical example of a six-node small-world route map.
3265
Abstract: This paper proposes a non-intrusive authentication method based on two sensitive apparatus of smartphones, namely, the orientation sensor and the touchscreen. We have found that these two sensors are capable of capturing behavioral biometrics of a user while the user is engaged in relatively stationary activities. The experimental results with respect to two types of flick operating have an equal error rate of about 3.5% and 5%, respectively. To the best of our knowledge, this work is the first publicly reported study that simultaneously adopts the orientation sensor and the touchscreen to build an authentication model for smartphone users. Finally, we show that the proposed approach can be used together with existing intrusive mechanisms, such as password and/or fingerprints, to build a more robust authentication framework for smartphone users.
3270
Abstract: IP scheme over Ethernet is one of the world's most widely used network structure. However, ARP Spoofing attacks still remain as one of serious security threats on the local area network. Despite the seriousness, there is no protective mechanism that can effectively protect against ARP Spoofing attacks available yet. This paper proposes an ARP query process mechanism that corresponds with the current IP/MAC mapping correlations based upon the existing ARP protocol and the "Direct Communication" characteristic of the LAN. It can effectively protect against ARP Spoofing attacks without change of network structures or an increase of investments in personnel and equipments.
3275
Abstract: Mobile Ad Hoc Networks (MANETs) are infrastructure-free, self-configuring and stand alone wireless networks. Lack of efficient computations and secure based point authentication, the security and efficiency of MANETs have been the biggest challenges in its wide application. Many researchers have applied RSA and ECC cryptography algorithms in building secure ID and key exchange agreement; however, they also have difficult to face the challenges of factoring large composite integers and computing discrete logarithms. Generally, public key infrastructures are assumed to be unavailable in MANETs. The key exchange problem for this type of network has now become important. In this article, we propose a new NTRU-based authenticated key exchange protocol for MANETs. We take advantage of NTRU cryptosystem of the inherent efficiency and security in this type of wireless networks - without any public key infrastructure - to defend message exchange against the threat of session key attacks, the man-in-the-middle attacks and the brute force attacks.
3280
Abstract: In the paper, a cloud computing based intelligent scheduling system for manufacturing quality is proposed. Most of scheduling system is only considered producing time but manufacturing quality. It is very important to focus on manufacturing quality for the industry upgrade. The factors of manufacturing quality are product, equipment, material and human. It makes higher cost for scheduling the flexible manufacturing system. So we develop the cloud computing-based intelligent scheduling system by using artificial neural network and optimized layout method for manufacturing quality in the research. The architecture of the intelligent scheduling system contains: (1) Cloud database structure. (2) Intelligent scheduling engine. (3) Real-time human-machine interface. SQL Azure is used as the cloud database for scattering and storing data. And the intelligent scheduling engine contains the intelligent sequence score system of the products, the optimized layout system and the monitoring system of available resources. By using Visual C#, we can program a human-machine interface with real-time data updating. So that we can see real-time scheduling states of manufacturing by the human-machine interface at any time everywhere. We get good performance from the results of the experiment in the intelligent scheduling system considering manufacturing quality. It is important to develop a cloud computing-based intelligent scheduling system for manufacturing quality because of the advantages of production fluency, low cost, just good quality and flexible management.
3285
Abstract: Term matching is one of applications of pattern matching for comparing strings. This paper presents a strategy of term matching based on a tree structure for integrating item-banks. An item-bank consists of question items from which the contents are connected to. Contents of a text book are divided into concepts, followed by the tree structure, while each node contains terms that describes the concepts. Comparing the terms of question items and contents, item-banks can be integrated. To evaluate the performance of the proposed method, contents of two grades have been used on the learning process. The experimental results showed that the proposed algorithm can provide an extremely high quality result in terms of both the relevance of items and the computation time in Chinese item sets. In addition, the experimental results also showed that the accuracy rate of the item-bank described herein ranges from 93.3% to 94.8%.
3290
Abstract: A continuous window query is an important class of spatial queries for location-based services. It retrieves spatial objects in a fixed window region of every point on a line segment and indicates the valid segments of them. In this paper, we focus on continuous window queries in wireless data broadcast systems. Since the query result of the continuous window queries has the spatial locality, providing neighbor information of spatial objects can guide clients to efficiently retrieve related objects. Therefore, we propose a neighbor-index method to efficiently support the continuous window queries in wireless data broadcast systems. The proposed method interleaves the neighbor information between spatial objects to guide mobile clients to quickly retrieve the answered objects and save the power consumption of the mobile devices. Experimental results show that our method outperforms the distributed indexing.
3295
Abstract: A mashup is a web page or application that combines data from two or more sources so as to create new services or enhance original services. Mashup technique is usually implemented in web-based applications at web browser via drag-and-drop actions. These web-based applications usually require extra programming efforts when integrating with a non-web application, and they usually cannot drop out the APIs style programming. The developers require indicating specific data source for their new mashup applications, and usually the functions of these applications are limited due to developers’ design in developing time. This kind of programming style is difficult to mashup more data sources coherently, and it is high coupling, resource limited, and difficult to be extended. To solve these issues, this paper proposes a uniform and coherent mashup technique based on the OSGi (Open Service Gateway Initiative) framework. OSGi is a module system and service platform that implements a complete and dynamic component model. By using the OSGi’s dynamic and flexible features, applications could be easily to deploy, remove, discovery, and combine with each other. The key features of proposed mashup technique include the definition of uniform identity terms and invoking chains. The uniform identity term is used to match each application service. Developers can leverage non-web mashup applications by declaring the simple definition of uniform identity term without providing and using any APIs. The invoking chains could link and combine relative application services or data with unlimited length and irregular mixing. After that, the system could build up invoking chains to perform mashup technique automatically. Therefore, developers could mashup certain application functions or data to unknown applications in runtime phase. Finally, we present two different use cases to evaluate the capabilities of the proposed technique.
3300

Showing 611 to 620 of 699 Paper Titles