2009 IEEE International Conference on Network Infrastructure and Digital Content最新文献

筛选
英文 中文
Efficient multiple pattern matching algorithms for Network Intrusion Detection Systems 网络入侵检测系统的高效多模式匹配算法
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360944
Sunho Lee, Dong Kyue Kim
{"title":"Efficient multiple pattern matching algorithms for Network Intrusion Detection Systems","authors":"Sunho Lee, Dong Kyue Kim","doi":"10.1109/ICNIDC.2009.5360944","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360944","url":null,"abstract":"Multiple pattern matching algorithms are essential engines of Network Intrusion Detection Systems (NIDSs) to inspect packets for occurrences of malicious patterns. For a set of patterns, the multiple pattern matching algorithms usually build a trie data structure. In this paper, we propose efficient implementations of the multiple pattern matching algorithms widely used in NIDSs by using a linearized compact trie. This linearized compact trie is an array representation of a compact trie and guarantees a size linear to the number of patterns with little loss of lookup time. Thus, our implementations achieve compact sizes with fast time, so it is useful to hardware embedding and cache exploiting.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130423499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
β -order perceptually motivated MMSE estimation for speech enhancement 用于语音增强的β阶感知动机MMSE估计
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360815
Yue Wang, Jie Cui, Ping Li, Ling Xiao
{"title":"β -order perceptually motivated MMSE estimation for speech enhancement","authors":"Yue Wang, Jie Cui, Ping Li, Ling Xiao","doi":"10.1109/ICNIDC.2009.5360815","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360815","url":null,"abstract":"This paper derives a β -order perceptually motivated minimum mean square error (MMSE) spectral estimator of the short-time spectral magnitude of speech, aimed to improve the performance in speech enhancement. The performance of the proposed estimators with different values of β has been evaluated by two kinds of objective measures. We have also compared the waveforms of perceptually motivated MMSE (PM) estimated speech and β -order PM estimated speech. The results showed the proposed estimator with different constant β value could focus on either noise reduction or preventing speech distortion. With an adaptive value of β, the proposed estimator have better performance in noise reduction than PM estimator.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127620249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach of shrinking the substrate of multistage 2-D MEMS optical switch 多级二维MEMS光开关衬底的缩小方法
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360972
Yi-Zhu Gao, Yaojun Qiao, Yuefeng Ji
{"title":"An approach of shrinking the substrate of multistage 2-D MEMS optical switch","authors":"Yi-Zhu Gao, Yaojun Qiao, Yuefeng Ji","doi":"10.1109/ICNIDC.2009.5360972","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360972","url":null,"abstract":"We propose a scheme in theory for any architecture of multistage 2-D MEMS to shrink the substrate for high cost performance. We take advantage of Gaussian beam to reduce the substrate size through the mirror radius, and give the theoretical derivation. By adopting the proposed architecture, we compare some multistage 2-D MEMS architecture in terms of the substrate size and the lens radius, and get some improved results.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127842588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic frequency hopping vs. non-hopping in IEEE 802.22 systems IEEE 802.22系统中的动态跳频与非跳频
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360992
Jing Tong, Huarui Wu, Changchuan Yin, Yan Ma, Jianfeng Li
{"title":"Dynamic frequency hopping vs. non-hopping in IEEE 802.22 systems","authors":"Jing Tong, Huarui Wu, Changchuan Yin, Yan Ma, Jianfeng Li","doi":"10.1109/ICNIDC.2009.5360992","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360992","url":null,"abstract":"IEEE 802.22 is the first worldwide wireless standard based on Cognitive Radio (CR) for Wireless Regional Area Networks (WRAN). Usually, Secondary Users (SUs) have to be interrupted periodically for spectrum sensing so as to avoid interference to Primary Users (PUs) operating in the licensed bands. Such interruptions of data transmission, however, impair the Quality of Service (QoS) of SUs. Dynamic Frequency Hopping (DFH) has been proposed for IEEE 802.22 system. In DFH, data transmission is performed in parallel with spectrum sensing without interruptions. In this paper, we compare this hopping mode with non-hopping one by computer simulation, the results show that although hopping mode requires a little more channels, it can reduce the collision with PUs and achieve higher ratio of valid delivery and higher throughput, thus provide enhanced QoS for SUs.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126408603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Secure multipath routing based on secret sharing in mobile ad hoc networks 移动自组网中基于秘密共享的安全多路径路由
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360929
Siguang Chen, Meng Wu
{"title":"Secure multipath routing based on secret sharing in mobile ad hoc networks","authors":"Siguang Chen, Meng Wu","doi":"10.1109/ICNIDC.2009.5360929","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360929","url":null,"abstract":"It is a challenge to thwart both the passive attacks and active attacks in mobile ad hoc networks for their unique characteristics. The improvement of security often sacrifices the delivery rate or other QoS. We propose secure multipath routing scheme based on modified secret sharing as an effective mechanism to protect data confidentiality and simultaneously enhance data delivery rate in mobile ad hoc networks. The scheme is based on multipath route finding algorithm, modified secret sharing scheme, cryptography and optimization technology. Simulation results show that our scheme provides a reasonably good level of security and delivery rate.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122985823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An new deblocking algorithm for DCT coded images using adaptive spatial filters 一种基于自适应空间滤波器的DCT编码图像去块算法
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360917
Jin Wang, Jongho Kim, Jechang Jeong
{"title":"An new deblocking algorithm for DCT coded images using adaptive spatial filters","authors":"Jin Wang, Jongho Kim, Jechang Jeong","doi":"10.1109/ICNIDC.2009.5360917","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360917","url":null,"abstract":"This paper introduces an adaptive postprocessing method in Block-based Discrete Cosine Transform (BDCT) coded images. We present a framework, which is a serial-concatenation of a 1-D simple deblocking filter and a 2-D directional filter. First, we classify the simple deblocking filter by an adaptive threshold depending on local statistical properties, and update block types appropriately by a simple rule, which affects the performance of deblocking progresses. Second, a 2-D directional filter is introduced to suppress the ringing artifacts caused at the sharp edges and the block discontinuities while preserving true edges and textural information. Finally, comprehensive experiments indicate that the proposed algorithm outperforms lots of deblocking methods in the literature, in terms of evaluation of PSNR and subjective visual qualities.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126560953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Characterizing Internet backbone traffic from macro to micro 从宏观到微观表征互联网骨干流量
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360979
Jie Yang, Yang He, Ping Lin, Gang Cheng
{"title":"Characterizing Internet backbone traffic from macro to micro","authors":"Jie Yang, Yang He, Ping Lin, Gang Cheng","doi":"10.1109/ICNIDC.2009.5360979","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360979","url":null,"abstract":"The continuous growth in both commercial and public network traffic with various quality-of-service (QoS) requirements is calling for better service than the Internet's best effort mechanism. One of the challenging issues is to predict the overall behavior of aggregate network traffic. While network traffic characterization has been studied extensively due to its importance in network scheduling and throughput, an accurate characterization of network traffic still remains elusive. In this paper, in addition to characterizing the aggregate network traffic, we classify the traffic into different categories, e.g., P2P, VOIP, and provide insight to each of them in terms of their traffic pattern and impact to the overall traffic. Our study verifies that like many works reported in literature, majority Internet backbone traffic is contributed by a small portion of users. A major contribution of this paper is that we found a linear equation which could be used to approximate the impact of each user to the overall traffic. Many new applications appear recently and become more and more popular as Internet evolves. We show that in current Internet backbone of China, 9 applications, which can be classified into three categories, web browsing, P2P service, and gaming, contribute 95 percent of the total traffic. It is also demonstrated the P2P applications are the dominant traffic contributor among the three categories.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125731718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multiple description coding for wideband audio signal transmission 宽带音频信号传输的多重描述编码
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360882
Ho-seok Wey, A. Ito, Y. Suzuki
{"title":"Multiple description coding for wideband audio signal transmission","authors":"Ho-seok Wey, A. Ito, Y. Suzuki","doi":"10.1109/ICNIDC.2009.5360882","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360882","url":null,"abstract":"In audio communications over a lossy packet network, packet loss concealment techniques are needed to mitigate a user's frustration when perceiving the deterioration of the quality of the decoded signal. Multiple description coding (MDC) is a useful solution to this problem. In this paper, we describe an MDC method to conceal packet losses for wideband audio streaming based on the sample splitting method in the time domain and encoding by an MPEG-1 audio layer III (MP3) encoder. Experiments were conducted to compare the proposed method with several conventional methods, results confirming that our proposed method performs the playback of the decoded signal with sufficient quality for a range of bit rates from 160 to 320 kbps, even with a transmitted packet loss rate of 10%.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"35 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114125838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of electronic nose in gas mixture quantitative detection 电子鼻在气体混合物定量检测中的应用
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360938
Wu Pan, Ning Li, Pandeng Liu
{"title":"Application of electronic nose in gas mixture quantitative detection","authors":"Wu Pan, Ning Li, Pandeng Liu","doi":"10.1109/ICNIDC.2009.5360938","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360938","url":null,"abstract":"Six semiconductor gas sensors which are sensitive to Carbon monoxide (CO), Methane (CH4) and Hydrogen (H2) were chosen to compose the gas sensor array, and an on-line data acquisition system was constructed. Combining with the pattern recognition techniques of back propagation(BP) neuron network, the system was used to carry out the quantitative analysis of the partial gas concentration in a mixture. Pre-processing algorithms and the structures of the neural network was analyzed by experiments, and the results prove that the system can accomplish the quantitative analysis of the partial gas concentration of the mixture results using RRD pre-processing algorithm, then the training and testing of this three-layer BP neuron network with 9 neurons in hidden layer are performed.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121169771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Entropy based broadband user service behavior analysis 基于熵的宽带用户业务行为分析
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360875
Yinan Dou, Peng Liu, Yiming Chen, Zhenming Lei
{"title":"Entropy based broadband user service behavior analysis","authors":"Yinan Dou, Peng Liu, Yiming Chen, Zhenming Lei","doi":"10.1109/ICNIDC.2009.5360875","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360875","url":null,"abstract":"With the rapid development of Internet, network user behavior analysis is getting more and more attention. In this paper, an algorithm combining entropy concept and clustering method is proposed to analyze current broadband users' usage modes of network services, providing a strong support for further analysis or commercial applications. This algorithm can complete the process of division or clustering automatically, without requiring user to input any parameters associated with clustering. And it also can adapt to data set with different shape and size. Experiments have shown promising results when applying this algorithm to classify network users.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125017466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信