Table of contents : 1402062656......Page 1 Table of Contents......Page 5 Preface......Page 12 Acknowledgements......Page 13 1. A Hybrid Predistorter for Nonlinearly Amplified MQAM Signals......Page 15 2. Safe Logon with Free Lightweight Technologies......Page 19 3. Stochastic Communication in Application Specific Networks–on–Chip......Page 24 4. A Random Approach to Study the Stability of Fuzzy Logic Networks......Page 30 5. Extending Ad Hoc Network Range using CSMA(CD) Parameter Optimization......Page 35 6. Resource Aware Media Framework for Mobile Ad Hoc Networks......Page 38 7. Cross-Layer Scheduling of QoS-Aware Multiservice Users in OFDM-Based Wireless Networks......Page 42 8. Development of a Joystick-based Control for a Differential Drive Robot......Page 48 9. Structure and Analysis of a Snake-like Robot......Page 53 10. A Novel Online Technique to Characterize and Mitigate DoS Attacks using EPSD and Honeypots......Page 58 11. Multi-Scale Modelling of VoIP Traffic by MMPP......Page 64 12. Transparent Multihoming Protocol Extension for MIPv6 with Dynamic Traffic Distribution across Multiple Interfaces......Page 70 13. The Wave Variables, A Solution for Stable Haptic Feedback in Molecular Docking Simulations......Page 76 14. A Model for Resonant Tunneling Bipolar Transistors......Page 83 15. Developing secure Web-applications – Security Criteria for the Development of e-Democracy Webapplications......Page 87 16. Data Acquisition and Processing for Determination of Vibration state of Solid Structures – Mechanical press PMCR 63......Page 93 17. Quality of Uni- and Multicast Services in a Middleware. LabMap Study Case......Page 97 18. Traffic Flow Analysis Over a IPv6 Hybrid Manet......Page 103 19. Designing Aspects of a Special Class of Reconfigurable Parallel Robots......Page 109 20. Performance Analysis of Blocking Banyan Switches......Page 115 21. Demystifying the Dynamics of Linear Array Sensor Imagery......Page 120 22. On the Robustness of Integral Time Delay Systems with PD Controllers......Page 125 23. Improvement of the Segmentation in HS Sub-space by means of a Linear Transformation in RGB Space......Page 131 24. Obstruction Removal Using Feature Extraction Through Time for Videoconferencing Processing......Page 137 25. Blade Design and Forming for Fans Using Finite Elements......Page 140 26. On the Application of Cumulant-based Cyclostationary Processing on Bearings Diagnosis......Page 146 27. Application of Higher-order Statistics on Rolling Element Bearings Diagnosis......Page 150 28. Extending RSVP-TE to Support Guarantee of Service in MPLS......Page 154 29. Operators Preserving Products of Hurwitz Polynomials and Passivity......Page 160 30. A Computer Aided Tool Dedicated to Specification and Verification of the MoC and the MoF......Page 163 31. Directionality Based Preventive Protocol for Mobile Ad Hoc Networks......Page 169 32. The Problem of Accurate Time Measurement in Researching Self-Similar Nature of Network Traffic......Page 175 33. Wi-Fi as a Last Mile Access Technology and The Tragedy of the Commons......Page 178 34. Study of Surfaces Generated by Abrasive Waterjet Technology......Page 184 35. On Length-Preserving Symmetric Cryptography......Page 189 36. Revocable Proxy Signature Scheme with Efficient Multiple Delegations to the Same Proxy Signer......Page 195 37. A Robust Method for Registration of Partially-Overlapped Range Images Using Genetic Algorithms......Page 200 38. Lips Movement Segmentation and Features Extraction in Real Time......Page 206 39. Droplet Acceleration In The Arc......Page 212 40. A Comparison of Methods for Estimating the Tail Index of Heavy-tailed Internet Traffic......Page 219 41. IEC61499 Execution Model Semantics......Page 223 42. Towards a Practical Differential Image Processing Approach of Change Detection......Page 229 43. An ISP level Distributed Approach to Detect DDoS Attacks......Page 235 44. Performance Enhancement of Blowfish Algorithm by Modifying its Function......Page 241 45. A Clustering Algorithm Based on Geographical Sensor Position in Wireless Sensor Networks......Page 245 46. The Economic Evaluation of the Active DSRC Application for Electronic Toll Collection System in KOREA......Page 250 47. Adaptive Control of Milling Forces under Fractional Order Holds......Page 256 48. Application of Genetic Algorithms to a Manufacturing Industry Scheduling Multi-Agent System......Page 261 49. Pre- and Post- Processing for Enhancement of Image Compression Based on Spectrum Pyramid......Page 267 50. The Use of Maple in Computation of Generalized Transfer Functions for Nonlinear Systems......Page 273 51. A Game Theoretic Approach to Regulating Mutual Repairing in a Self-Repairing Network......Page 279 52. An Automated Self-Configuring Driver System for IEEE 802.11b/g WLAN Standards......Page 285 53. Development of a Virtual Force-Reflecting Scara Robot for Teleoperation......Page 290 54. Improving HORSE Again and Authenticating MAODV......Page 296 55. Curvelet Transform Based Logo Watermarking......Page 301 56. Fairness Enhancement of IEEE 802.11 Ad Hoc Mode Using Rescue Frames......Page 306 57. Modelling Trust in Wireless Sensor Networks from the Sensor Reliability Prospective......Page 312 58. Performability Estimation of Network Services in the Presence of Component Failures......Page 317 59. RBAC Model for SCADA......Page 323 60. DNPSec Simulation Study......Page 330 61. A Client-Server Software that Violates Security Rules Defined by Firewalls and Proxies......Page 336 62. Mobile Communication in Real Time for the First Time. User Evaluation of Non-voice Terminal Equipment for People with Hearing and Speech Disabilities......Page 340 63. Analyzing the Key Distribution from Security Attacks in Wireless Sensor......Page 346 64. Hint Key Distribution for Sensor Networks......Page 351 65. A Model for GSM Mobile Network Design......Page 356 66. Application of LFSR with NTRU Algorithm......Page 360 67. Adaptive Packet Loss Concealment Mechanism for Wireless Voice Over Ip......Page 365 68. Dynamic Location Privacy Mechanism in Location-Aware System......Page 368 69. Video Transmission Performance Using Bluetooth Technology......Page 374 70. Kelvin Effect, Mean Curvatures and Load Impedance in Surface Induction Hardening: An Analytical Approach including Magnetic Losses......Page 377 71. A Simple Speed Feedback System for Low Speed DC Motor Control in Robotic Applications......Page 384 72. A Low Power CMOS Circuit for Generating Gaussian Pulse and its Derivatives for High Frequency Applications......Page 387 73. On the Efficiency and Fairness of Congestion Control Algorithms......Page 391 74. Hopfield Neural Network as a Channel Allocator......Page 394 75. Command Charging Circuit with Energy Recovery for Pulsed Power Supply of Copper Vapor Laser......Page 398 76. Performance Evaluation of MANET Routing Protocols Using Scenario Based Mobility Models......Page 403 77. Analysis of Small World Phenomena and Group Mobility in Ad Hoc Networks......Page 409 78. Handoff Management Schemes for HCN/WLAN Interworking......Page 415 79. Cross-Layer Fast and Seamless Handoff Scheme for 3GPP-WLAN Interworking......Page 421 80. Minimizing the Null Message Exchange in Conservative Distributed Simulation......Page 427 81. An Analog Computer to Solve any Second Order Linear Differential Equation with Arbitrary Coefficients......Page 433 82. QoS Provisioning in WCDMA 3G Networks using Mobility Prediction......Page 436 83. Patent-Free Authenticated-Encryption as Fast as OCB......Page 442 84. Application of Least Squares Support Vector Machines in Modeling of the Top-oil Temperature......Page 445 85. Optimal Routing with Qos Guarantees in the Wireless Networks......Page 451 86. RFID in Automotive Supply Chain Processes - There is a Case......Page 456 87. Reduced – Order Controller Design in Discrete Time Domain......Page 462 88. Simple Intrusion Detection in an 802.15.4 Sensor Cluster......Page 468 89. Dim Target Detection in Infrared Image Sequences Using Accumulated Information......Page 474 90. Cooperative Diversity Based on LDPC Code......Page 478 91. MEMS Yield Simulation with Monte Carlo Method......Page 481 92. A Human Interface Tool for System Modeling and Application Development Based on Multilevel Flow Models......Page 485 93. Genetic Algorithm Approach in Adaptive Resource Allocation in OFDM Systems......Page 491 94. Real-time Vehicle Detection with the Same Algorithm both Day and Night Using the Shadows Underneath Vehicles......Page 497 95. An Authentication Protocol to Address the Problem of the Trusted 3rd Party Authentication Protocols......Page 503 96. Autonomous Agents based Dynamic Distributed (A2D2) Intrusion Detection System......Page 507 97. Modeling and Implementation of Agent-Based Discrete Industrial Automation......Page 514 98. Performance of CBR and TCP Traffics in Various MANET Environments......Page 520 D......Page 525 I......Page 526 M......Page 527 S......Page 528 Z......Page 529