Title: sens-u: Remote human in loop health-monitoring system at home




НазваниеTitle: sens-u: Remote human in loop health-monitoring system at home
страница1/51
Дата27.11.2012
Размер1.41 Mb.
ТипДокументы
  1   2   3   4   5   6   7   8   9   ...   51


Accession number:20091412011704

Title:SENS-U: Remote human in loop health-monitoring system at home

Authors:Yuan, An (1); Yan, Liu (3); Ma, Cai-Wen (1); Sun, Li-Min (4); Xiao, Zhi-Feng (4)

Author affiliation:(1) 1 Xi'an Institute of Optics Precision Mechanics, Chinese Academy of Sciences, Xi'an, Shaanxi, 710068, China; (2) Graduate University of Chinese Academy of Sciences, Beijing, 100910, China; (3) School of Software and Microelectronics, Peking University, Beijing, 102600, China; (4) State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Sciences, Beijing, 100910, China

Corresponding author:Yan, L.

(ly@ss.pku.edu.cn)

Source title:Proceedings - 2008 Pacific-Asia Workshop on Computational Intelligence and Industrial Application, PACIIA 2008

Abbreviated source title:Proc. - Pacific-Asia Workshop Comput. Intel. Ind. Appl., PACIIA

Volume:1

Monograph title:Proceedings - 2008 Pacific-Asia Workshop on Computational Intelligence and Industrial Application, PACIIA 2008

Issue date:2008

Publication year:2008

Pages:441-445

Article number:4756598

Language:English

ISBN-13:9780769534909

Document type:Conference article (CA)

Conference name:2008 Pacific-Asia Workshop on Computational Intelligence and Industrial Application, PACIIA 2008

Conference date:December 19, 2008 - December 20, 2008

Conference location:Wuhan, China

Conference code:75763

Sponsor:Institute of Electrical and Electronics Engineers; Wuhan Institute of Technology, IEEE; Huazhong University of Science and Technology; Huazhong Normal University; Computing and Security Center

Publisher:Inst. of Elec. and Elec. Eng. Computer Society, 445 Hoes Lane - P.O.Box 1331, Piscataway, NJ 08855-1331, United States

Abstract:Personal health status is becoming a matter of concern while pressure of work growing gradually in everyday life, in the meantime, the ageing population needs more attention. Thanks to many challenging problems of Wireless Sensor Networks (WSNs) solved, exploring work of human body monitoring based on WSNs achieved great progress, we called it wireless Body Sensor Networks(BSNs). In this paper, we propose a novel healthmonitoring system based on BSNs; we named it SENS-U. It consists of wireless multi-parameters monitoring terminals and two medical care centers; with human body, they form a remote human in loop 4 vital signs and ECG monitoring system. ©2008 IEEE.copy; 2008 IEEE.

Number of references:9

Main heading:Wireless sensor networks

Controlled terms:Artificial intelligence - Industrial applications - Intelligent control - Sensor networks

Uncontrolled terms:Ageing populations - Health-monitoring systems - Human bodies - Medical cares - Monitoring systems - Multi-parameters - Personal healths - Vital signs - Wireless body sensor networks

Classification code:913 Production Planning and Control; Manufacturing - 901.4 Impact of Technology on Society - 732 Control Devices - 731.1 Control Systems - 723.4.1 Expert Systems - 723.4 Artificial Intelligence - 722.4 Digital Computers and Systems - 722.3 Data Communication, Equipment and Techniques - 716.3 Radio Systems and Equipment

DOI:10.1109/PACIIA.2008.212

Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.




Accession number:20094212385313

Title:On the unprovable security of 2-Key XCBC

Authors:Wang, Peng (1); Feng, Dengguo (2); Wu, Wenling (2); Zhang, Liting (2)

Author affiliation:(1) State Key Laboratory of Information Security, Graduate University, Chinese Academy of Sciences, Beijing 100049, China; (2) State Key Laboratory of Information Security, Institution of Software, Chinese Academy of Sciences, 100080 Beijing, China

Corresponding author:Wang, P.

(wp@is.ac.cn)

Source title:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Abbreviated source title:Lect. Notes Comput. Sci.

Volume:5107 LNCS

Monograph title:Information Security and Privacy - 13th Australasian Conference, ACISP 2008, Proceedings

Issue date:2008

Publication year:2008

Pages:230-238

Language:English

ISSN:03029743

E-ISSN:16113349

ISBN-10:3540699716

ISBN-13:9783540699712

Document type:Conference article (CA)

Conference name:13th Australasian Conference on Information Security and Privacy, ACISP 2008

Conference date:July 7, 2008 - July 9, 2008

Conference location:Wollongong, NSW, Australia

Conference code:77484

Sponsor:University of Wollongong; Centre for Computer and Information Security Research

Publisher:Springer Verlag, Tiergartenstrasse 17, Heidelberg, D-69121, Germany

Abstract:There has been extensive research focusing on improving CBC-MAC to operate on variable length messages with less keys and less blockcipher invocations. After Black and Rogaway's XCBC, Moriai and Imai proposed 2-Key XCBC, which replaced the third key of XCBC with its first key. Moriai and Imai "proved" that 2-Key XCBC is secure if the underling blockcipher is a pseudorandom permutation (PRP). Our research shows that it is not the case. The security of 2-Key XCBC can not be proved under the solo assumption of PRP, even if it is a RPR-RK secure against some related-key attack. We construct a special PRP (PRP-RK) to show that the main lemma in [14] is not true and 2-Key XCBC using this PRP (PRP-RK) is totally insecure. © 2008 Springer-Verlag Berlin Heidelberg.

Number of references:15

Main heading:Security of data

Controlled terms:Authentication

Uncontrolled terms:Blockcipher - Blockcipher mode of operation - Message authentication code - Provable security - Related-key attack

Classification code:723 Computer Software, Data Handling and Applications - 723.2 Data Processing and Image Processing

DOI:10.1007/978-3-540-70500-0-17

Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.




Accession number:20094012348215

Title:More on weak bisimilarity of normed basic parallel processes

Authors:Chen, Haiyan (1)

Author affiliation:(1) State Key Laboratory Computer Science, Institute of Software, Chinese Academy of Sciences; (2) Graduate School, Chinese Academy of Sciences

Corresponding author:Chen, H.

(chy@ios.ac.cn)

Source title:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Abbreviated source title:Lect. Notes Comput. Sci.

Volume:4978 LNCS

Monograph title:Theory and Applications of Models of Computation - 5th International Conference, TAMC 2008, Proceedings

Issue date:2008

Publication year:2008

Pages:192-203

Language:English

ISSN:03029743

E-ISSN:16113349

ISBN-10:3540792279

ISBN-13:9783540792277

Document type:Conference article (CA)

Conference name:5th International Conference on Theory and Applications of Models of Computation, TAMC 2008

Conference date:April 25, 2008 - April 29, 2008

Conference location:Xian, China

Conference code:77245

Sponsor:Institute of Computing Theory and Technology of Xidian University; Xidian University; The National Natural Science Foundation of China

Publisher:Springer Verlag, Tiergartenstrasse 17, Heidelberg, D-69121, Germany

Abstract:Deciding strong and weak bisimilarity of BPP are challenging because of the infinite nature of the state space of such processes. Deciding weak bisimilarity is harder since the usual decomposition property which holds for strong bisimilarity fails. Hirshfeld proposed the notion of bisimulation tree to prove that weak bisimulation is decidable for totally normed BPA and BPP processes. In this paper, we present a tableau method to decide weak bisimilarity of totally normed BPP. Compared with Hirshfeld's bisimulation tree method, our method is more intuitive and more direct. Moreover from the decidability proof we can derive a complete axiomatisation for the weak bisimulation of totally normed BPP. © 2008 Springer-Verlag Berlin Heidelberg.

Number of references:19

Main heading:Computability and decidability

Uncontrolled terms:Axiomatisation - Basic parallel process - Bisimilarity - Bisimulation trees - Decomposition property - State space - Tableau method - Weak bisimilarity - Weak bisimulation

Classification code:721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory

DOI:10.1007/978-3-540-79228-4-17

Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.




Accession number:20090411875211

Title:An analysis to understand software trustworthiness

Authors:Tan, Thomas (1); He, Mei (2); Yang, Ye (2); Wang, Qing (2); Li, Mingshu (2)

Author affiliation:(1) Center for System and Software Engineering, University of Southern California, United States; (2) Institute of Software, Chinese Academy of Sciences, China; (3) Graduate University of Chinese Academy of Sciences, China

Corresponding author:Tan, T.

(thomast@usc.edu)

Source title:Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008

Abbreviated source title:Proc. Int. Conf. Young Comput. Sci., ICYCS

Monograph title:Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008

Issue date:2008

Publication year:2008

Pages:2366-2371

Article number:4709342

Language:English

ISBN-13:9780769533988

Document type:Conference article (CA)

Conference name:9th International Conference for Young Computer Scientists, ICYCS 2008

Conference date:November 18, 2008 - November 21, 2008

Conference location:Zhang Jia Jie, Hunan, China

Conference code:75076

Sponsor:China Computer Federation

Publisher:Inst. of Elec. and Elec. Eng. Computer Society, 445 Hoes Lane - P.O.Box 1331, Piscataway, NJ 08855-1331, United States

Abstract:With the increasing demand of software capabilities in both business and government operations, building trustworthy software become critical for the success of the organization. However, the growth of Internet throws different kinds of malicious and/or unintentional threats into the mix by providing endless points of attacks that threatens the dependency of software running on the network for distributed applications. In this paper, we'd like to discuss our effort to understand some of the key areas related to software trustworthiness. © 2008 IEEE.

Number of references:18

Main heading:Computer software

Uncontrolled terms:Distributed applications - Software capabilities - Software trustworthiness - Software trustworthiness definition

Classification code:723 Computer Software, Data Handling and Applications

DOI:10.1109/ICYCS.2008.484

Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.




Accession number:20082311304243

Title:Improved transport layer identification of peer-to-peer traffic

Authors:Xu, Peng (1); Liu, Qiong (1); Lin, Sen (1)

Author affiliation:(1) Institute of Software, Chinese Academy of Sciences, Beijing 100190, China; (2) Graduate University, Chinese Academy of Sciences, Beijing 100049, China

Corresponding author:Xu, P.

(xupeng03@ios.cn)

Source title:Jisuanji Yanjiu yu Fazhan/Computer Research and Development

Abbreviated source title:Jisuanji Yanjiu yu Fazhan

Volume:45

Issue:5

Issue date:May 2008

Publication year:2008

Pages:794-802

Language:Chinese

ISSN:10001239

CODEN:JYYFEY

Document type:Journal article (JA)

Publisher:Science Press, 18,Shuangqing Street,Haidian, Beijing, 100085, China

Abstract:Peer-to-peer (P2P) traffic identification is a hot topic in network measurement in recent years. The identification method based on P2P traffic transport layer behavior has good scalability, because it is independent of the signature strings of P2P application. But the network application's behavior in transport layer is easy to be affected by network environment, so there is a great difference in the accuracy of this identification method between domestic and overseas network environment. In order to improve the existing transport layer identification method in domestic network environment, three proposals are offered in this paper. The first is a filtering mechanism based on non-P2P known port. The second is a counting mechanism using data flow. The third is an FTP flow filtering mechanism using reversed flow. Then, these proposals are validated using the domestic traces. The result of experiments indicates that the flow accuracy and bytes accuracy of the improved P2P traffic transport layer identification method approach 95% and 99% respectively. Finally, this improved method is firstly used to analyze the trace of the Internet backbone in China Education and Research Network. The result of measurement shows that the volume of P2P traffic increases from 0. 76% roughly to 70% of the total traffic in the backbone.

Number of references:16

Main heading:Internet

Controlled terms:Algorithms - Telecommunication traffic

Uncontrolled terms:China education research network - FTP flow filter - Internet backbone - Network behavior - Network measurement - Peer-to-peer (P2P) - Signature strings - Traffic identification - Transport layer

Classification code:716 Telecommunication; Radar, Radio and Television - 717 Optical Communication - 718 Telephone Systems and Related Technologies; Line Communications - 723 Computer Software, Data Handling and Applications - 921 Mathematics

Treatment:Theoretical (THR); Experimental (EXP)

Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.




Accession number:20084811741085

Title:Probability distribution based time synchronization protocol for wireless sensor networks

Authors:Li, Lian (1); Sun, Li-Min (3); Fan, Xiao-Zhong (1)

Author affiliation:(1) Department of Computer Science and Technology, Beijing Institute of Technology, Beijing 100084, China; (2) Department of Control Engineering, Naval Aeronautical and Astronautical University, Yantai 264001, China; (3) Institute of Software, Chinese Academy of Sciences, Beijing 100080, China

Corresponding author:Li, L.

(LL1965@163.com)

Source title:Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications

Abbreviated source title:Beijing Youdian Daxue Xuebao

Volume:31

Issue:5

Issue date:October 2008

Publication year:2008

Pages:57-60

Language:Chinese

ISSN:10075321

CODEN:BYXBEV

Document type:Journal article (JA)
  1   2   3   4   5   6   7   8   9   ...   51

Похожие:

Title: sens-u: Remote human in loop health-monitoring system at home iconThe Place and Role of Official Statistics within the National System of Health Monitoring

Title: sens-u: Remote human in loop health-monitoring system at home iconDevelopment of Malaria Early Warning System (mews) using Remote Sensing and Geographical Information Systems. Isse's Summer Colloquia on Climate and Health, in

Title: sens-u: Remote human in loop health-monitoring system at home iconRiDCam remote internet Device Control and Monitoring

Title: sens-u: Remote human in loop health-monitoring system at home iconNatural resource inventory and monitoring related publications on remote sensing/gis

Title: sens-u: Remote human in loop health-monitoring system at home iconOptical Remote sensing for monitoring evolution of ablation season mountain snow cover

Title: sens-u: Remote human in loop health-monitoring system at home iconTitle: Enhancing global sls-resolution with loop cutting and tabling mechanisms

Title: sens-u: Remote human in loop health-monitoring system at home iconHealth monitoring of structures with cable members under tension

Title: sens-u: Remote human in loop health-monitoring system at home iconLaser monitoring system for the cms lead tungstate crystal calorimeter

Title: sens-u: Remote human in loop health-monitoring system at home iconI sis canada Educational Module No. 5: An Introduction to Structural Health Monitoring

Title: sens-u: Remote human in loop health-monitoring system at home iconAdvanced Structural Health Monitoring based on Multi-Agent Technology

Разместите кнопку на своём сайте:
Библиотека


База данных защищена авторским правом ©lib.znate.ru 2014
обратиться к администрации
Библиотека
Главная страница