首页    期刊浏览 2024年07月06日 星期六
登录注册

文章基本信息

  • 标题:Guest Editorial
  • 本地全文:下载
  • 作者:Ding, Shifei
  • 期刊名称:Journal of Networks
  • 印刷版ISSN:1796-2056
  • 出版年度:2012
  • 卷号:7
  • 期号:7
  • 页码:1007-1008
  • DOI:10.4304/jnw.7.7.1007-1008
  • 语种:English
  • 出版社:Academy Publisher
  • 摘要:This special issue comprises of 16 selected papers from the 2012 International Conference on Information, Computing and Telecommunications (ICICT 2012). The conferences received 1660 paper submissions from 11 countries and regions, of which 810 were selected for presentation after a rigorous review process. From these 810 research papers, through two rounds of reviewing, the guest editors selected 16 as the best papers on the Information and Networks track of the Conference. The candidates of the Special Issue are all the authors, whose papers have been accepted and presented at the ICICT 2012, with the contents not been published elsewhere before. Information, Computing and Telecommunications are very hot and important research topics and gain more attention by economy as well as society in recent years. The 2012 International Conference on Information, Computing and Telecommunications (ICICT 2012) was held from Jan 7~8, 2012 in Harbin, P.R. China. This conference is co-sponsored by Harbin University of Science and Technology and International Science and Engineering Research Center, and it is technical co-sponsored by Harbin Engineering University, Northeast Forestry University, Harbin Normal University, Heilongjiang University, Northeast Petroleum University and Harbin University. “(t, n) Secret Sharing Scheme Based on Cylinder Model in Wireless Sensor Networks”, by Haiping Huang, Hao Chen, Ruchuan Wang, Qian Mao, Renyuan Cheng, proposes a (t, n) threshold secret sharing scheme based on the cylinder model, including the procedures of master-key reconfiguration and sub-key updating in wireless sensor networks.This scheme enables several nodes to be responsible for the security of key together to improve the capability of anti-capturing. “A New Algorithm of Spectrum Allocation Based on the Balance between Supply and Demand in Cognitive Radio Networks”, by Liang Ma, Qi Zhu, establishes a supply and demand model ,by considering the primary utility and total bandwidth, the secondary battery capacity and the reliance degree that how primary users trust secondary users. “Long-lived Self-healing Group Key Distribution Scheme in Wireless Sensor Networks”, by Qiuhua Wang, Huifang Chen, Lei Xie, Kuang Wang, proposes an efficient long-lived δ-self-healing group key distribution scheme with revocation and collusion resistance capabilities for wireless sensor networks. This scheme not only resolves the lifetime extension problem, but also achieves better security performance with lower storage and communication costs. “Research on Evolution and Synchronization of Space Information Support Power Networks”, by Zhenxin Liu, Xiaohong Yu, Qing Yang, proposes a network model of space information support power, analyses the initial link mechanism, the number of communication nodes, other support nodes and the total nodes how to effect the evolution and synchronization of this network. “Threshold Selection for TOA Estimation based on Skewness and Slope in Ultra-wideband Sensor Networks”, by Hao Zhang, Xue-rong Cui, T. Aaron Gulliver, finds out that the skewness and maximum slope are more sensitive to the SNR and thus more suitable for TOA estimation ,proposes an algorithm for the threshold selection of Ultra-Wideband TOA estimation based on a joint metric of the skewness and maximum slope, investigates the best threshold values for different SNRs and examines the effects of integration period and channel models. “A Novel Error Resilient Scheme for Wavelet-based Image Coding over Packet Networks”, by WenZhu Sun, HongYu Wang, DaXing Qian, proposes a robust transmission strategy for wavelet-based scalable image coding over packet erasure channel. “The Research of Ranging with Timing over Packet Network for the Mine Safety Application”, by Xiaoxiao Liu, Jun Steed Huang, Zujue Chen, proposes a solution of coal mine human positioning system by introducing the timing over packet network and precision timing protocol, which will fulfill the need of the precise position of the miners and safety for production. “Road Network Change Detection Based on Floating Car Data”, by Luliang Tang, Fangzhen Huang, Xueyan Zhang, Hong Xu, proposes a new method to realize the road network change detection and updating based on floating car data (FCD), which includes the road network change classification, map matching, change detection and road network updating. “Research of an Adaptive Aggregation Routing Algorithm in Wireless Sensor Networks”, by Xiangli Wang, Layuan Li, proposes an energy-efficiency routing method in multimedia wireless sensor networks, where the data aggregation is very necessary and the aggregation overheads can’t be ignored. “Applying Stochastic Integer Programming to Optimization of Resource Scheduling in Cloud Computing”, by Qiang Li, proposes an optimal model for resource scheduling in cloud computing and give an algorithm to solve the problem by applying stochastic integer programming technique and Gronber bases theory. “A Novel Sensor Node Management Approach Based on Particle Filtering Prediction”, by Yueheng Li, Meiyan Ju, Huibin Wang, Xiaomin Sun, proposes a novel node management approach based on particle filtering prediction. Through the new management algorithm, both better tracking quality and lower WSN nodes energy consumption can be achieved. “An Identification System of Original Painting Artworks Based on Smart Card”, by Yongquan Cai, Jiong Tian, Hui Xu, proposes an identification system of original painting artworks based on the hardware cipher device using the technology of the Internet of Things and the knowledge of cryptography. “Rapid Identification Authentication Protocol for Mobile Nodes in Internet of Things with Privacy Protection”, by Jingjun Miao, Liangmin Wang, proposes a rapid identification authentication protocol that resists replay attack, eavesdropping attack, tracking or location privacy attack, satisfies two privacy protection properties of untraceability and forward security, and has some advantages of communication and computation overheads over related protocols. “Routing Algorithm Based on Multi-Community Evolutionary Game for VANET”, by Di Wu, Jing Cao, Yan Ling, Jiangchuan Liu, Limin Sun, proposes an evolutionary game theoretic approach to the forwarding messages when there exist multiple competing communities in sparse VANET “The Effect of Wireless Sensor Nodes Deployment Density in Forest Fire Monitoring Quality Evaluation”, by Guanghui Li, Hong Li, Hailin Feng, Zhi Wang and Ziwei Xuan, analyzes the case where the sensors are located in a regular triangle grid based on the forest fire circular and elliptical propagation model, and proposes some results which relate the sensor node density to the forest fire monitoring quality. “Research and Construction of a Net Monitor System”, by Ruining Huang, Lei Li and Yunjiang Lou, proposes a net monitor system that includes the Linux Operating System (OS), embedded web browser, Media player, clouding applications, video conference and so on. We would like to take this opportunity to thank the authors for the efforts they put in the preparation of the manuscripts and for their valuable contributions. We wish to express our deepest gratitude to the program committee members for their help in selecting papers for this issue and especially the referees of the selected papers for their thorough reviews under a tight time schedule. Last, but not least, our thanks go to the editorial board of the Journal of Networks for the exceptional effort they did throughout this process. In closing, we sincerely hope that you will enjoy reading this special issue.
  • 关键词:Special Issue;Advances in Information and Networks
国家哲学社会科学文献中心版权所有