2009 International Conference on Networks Security, Wireless Communications and Trusted Computing - Conference Table of Contents | IEEE Xplore
International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing

DOI: 10.1109/nswctc14839.2009

25-26 April 2009

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Networks Security, Wireless Communications and Trusted Computing (NSWCTC), 2009 International Conference on

[Front cover - Vol 2]

Publication Year: 2009,Page(s):C1 - C1

[Title page i - Volume 2]

Publication Year: 2009,Page(s):i - i

[Title page iii - Volume 2]

Publication Year: 2009,Page(s):iii - iii

[Copyright notice - Volume 2]

Publication Year: 2009,Page(s):iv - iv

Table of contents - Volume 2

Publication Year: 2009,Page(s):v - xviii

list-reviewer

Publication Year: 2009,Page(s):xxii - xxii
To provide a reasonable, effective and easy-to-use solution approach for the supplier selection. Based on the established transporter selection synthetic index system, a fuzzy semantic distance mathematical model is obtained for selecting transporter. In view of the characteristic that included both fuzzy interval data and qualitative variable in the index system, the model can synthesize the quan...Show More
A wide-bandwidth low-noise VCO used in PLL system was investigated, including a harmonic filtering resistor and source damping resistors to reduce the phase noise and power dissipation. The back-to-back varactor topology is identified as a suitable solution to linearize the tank capacitance. The amplitude to phase noise conversion is greatly attenuated. The circuit was simulated using 0.35 mum CMO...Show More
A CMOS variable gain amplifier (VGA) is designed, which is suitable for the turner of digital video broadcasting-cable(DVB-C). The amplifier is consists of exponential control circuit, amplifier circuit and common mode feedback circuit. The exponential circuit is presented by an approximate exponential function. The VGA is fabricated in 0.35 mum CMOS technology, and is simulated by Mentorpsilas ci...Show More
Sticker model was a popular computing in the area of DNA computing. The separate operation was one of the important operation in this model. Adleman-Lipton DNA computing model was belong to sticker model, but, it was not convenient to use separate and multi-separate operation in Adleman-Lipton model. In order to solve this problem, extended separate technology and extended multi-separate technolog...Show More
Excessively complex web site features will increase consumer transaction costs, it is important to reveal the impact of different functions on improving the design of site structure, reducing transaction costs and increasing consumerspsila purchase intention. This paper adopts the method of factor analysis and factor sorting to study the influencing factors on Chinese consumerspsila purchase inten...Show More
In the era of network, B2B electronic commerce (EC) has become new bright spot to accelerate economy and trend of future business development gradually and it also becomes one of major reasons to economic gaps between developing countries and developed countries. However, there are lacks of research on Chinese B2B EC at present; especially it is lack of research on coordinate control among enterpr...Show More
With the increasing widespread use of wireless technologies, the need arises for QoS provisioning mechanisms for multimedia applications in wireless networks. However, QoS protocols designed for fixed network are not applicable in mobile networks. In this paper, we propose a modified MRSVP scheme based on motion prediction for mobile networks. The modified MRSVP scheme using the result of motion p...Show More
Remote control network is a research focus in the application domain of wireless communication technology. Zigbee technology makes up for the vacancy of wireless communication market in the low-cost and low-power equipment domain. This paper presents the design and application of wireless sensor network web server based on S3C2410 and Zigbee protocol. This server can realize real-time motoring and...Show More
In this paper, an iterative high-resolution DOA algorithm is proposed for DOA estimation for CDMA systems. The algorithm iteratively removes detected signals from the received data and searches the residue spatial spectrum for further signals. It does not require any computationally expensive eigen decomposition or spatial smoothing in coherent multipath scenarios. Results are presented illustrati...Show More
In this paper, a cumulant-based DOA estimation algorithm, is presented for DS-CDMA system under multi-user environment. Simulations results show that the algorithm is much better in DOA estimation precision and resoling capability than the conventional MUSIC algorithm.Show More
With the development of both economy and society,service always requires higher and higher security and quality.However, since security services always induce extra resource consumption, QoS may descend evidently. It is important and essential to find optimal solutions that can not only achieve enough level of security, but also meet as high QoS as system can. In this paper, we propose an entity, ...Show More
Circumstance data of building such as fire accident smoke, robberpsilas body information, temperature and humidity signal, etc is acquired by different kinds of sensor unit. Single chip microprocessor (SCM) AT89C51 processes data signal collection and realize telephone automatically dialing-alarming when there is unusual condition, as well as it controls wireless transceiver chip nRF905 to complet...Show More
Multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) is the key technique for generation communications systems. In this paper an enhanced signal detection scheme is proposed for MIMO-OFDM systems. A combining QR and PIC MIMO detection scheme was directly applied to MIMO-OFDM systems. The performance of algorithm is evaluated based on computer simulation. The simul...Show More
This paper provides a novel approach to the classical problem in wireless communication of testing the departure from Gaussianity of an independent and identically distributed stationary process. Theoretical analysis of the independent Gaussian process Trispectrum is given. Based on the analysis, a new test algorithm that exploits the low fluctuation of the Trispectrum is proposed. Simulation resu...Show More
The paper designs the WSACPL policy ontology to express access control policies for web services. The ontology also includes a mechanism to resolve conflicts among WSACPL policies. In the end, the paper gives an implementation called WACS. The WACS combines WSACPL policy ontology with domain ontology and service ontology to realize semantic access control for web services.Show More
Due to perceived high risk in the first transaction and Internet low switching cost, building consumer initial trust is crucial for online vendors. Extant research has often examined determinants of initial trust from the perspectives of TAM and trust transference, and seldom considered the initial trust building from dual-routes. Drawing on ELM, we analyzed the different effect of argument qualit...Show More

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Networks Security, Wireless Communications and Trusted Computing (NSWCTC), 2009 International Conference on