2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery最新文献

筛选
英文 中文
An Efficient Transmission Scheme for OpenFlow Based Wireless Networks 一种基于OpenFlow的无线网络高效传输方案
Ji Lu, Zhiyi Zhang, Junfang Wang, Ning Li
{"title":"An Efficient Transmission Scheme for OpenFlow Based Wireless Networks","authors":"Ji Lu, Zhiyi Zhang, Junfang Wang, Ning Li","doi":"10.1109/CyberC.2013.71","DOIUrl":"https://doi.org/10.1109/CyberC.2013.71","url":null,"abstract":"A network coding-based ARQ scheme is proposed for open flow based wireless networks by using an efficient combination strategy of lost packets. The combination strategy is designed to and compensates for the inherent computation arising in lost packet selection, thus improves not only the wireless throughput, but also the complexity. The simulation results shows the proposed scheme achieves about 250% throughput efficiency gain over traditional ARQ retransmission and maintains very limited operation time.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"317 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124300842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Big Data Approach for a New ICT Agriculture Application Development 新ICT农业应用发展的大数据途径
R. D. A. Ludena, A. Ahrary
{"title":"A Big Data Approach for a New ICT Agriculture Application Development","authors":"R. D. A. Ludena, A. Ahrary","doi":"10.1109/CyberC.2013.30","DOIUrl":"https://doi.org/10.1109/CyberC.2013.30","url":null,"abstract":"Big Data is becoming a common term among researchers, who are looking for a tool to broaden their research and to improve their results because the \"probable\" relation between different scientific areas. But, although the term Big Data is not new, its recent application and methodologies are changing some well establish paradigms in the research area as well in the several industry applications where Big Data methodologies are used. Because of their rapid development, Big Data is also raising specific issues related to some of its core concepts. It is the aim of this paper to address the impact of these issues in the novel nutrition-based vegetable production and distribution system project in which Sojo University is an active member.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127283517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Security Ontology with MDA for Software Development 基于MDA的软件开发安全本体
Wentao Kang, Ying Liang
{"title":"A Security Ontology with MDA for Software Development","authors":"Wentao Kang, Ying Liang","doi":"10.1109/CyberC.2013.20","DOIUrl":"https://doi.org/10.1109/CyberC.2013.20","url":null,"abstract":"It is found that current ontologies for security often emphasize the security concerns and concepts without their involvement in each of stages of a software development process. This means that the security concerns and concepts will not be actually considered throughout the development process. This leads a lack of approaches to involving security concerns and concepts throughout the development process. In order to overcome the lack, a new security ontology for software development has been defined together with MDA that has been used in software development so that security concerns and concepts can play a role in each of stages of the development process and be included as security components in software. This paper will firstly introduce this new ontology and its semantics, then show how to use it in the development process in terms of four case studies. The results of the case studies have proven that the proposed security ontology could be useful in modeling and design of security concerns and concepts at each of stages of the development process with MDA.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130030220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Predicting Service Execution Time towards a Runtime Monitoring Approach 采用运行时监视方法预测服务执行时间
Xinglong Ju, Youxiang Duan, Cheng Ma, Haiyan Ju
{"title":"Predicting Service Execution Time towards a Runtime Monitoring Approach","authors":"Xinglong Ju, Youxiang Duan, Cheng Ma, Haiyan Ju","doi":"10.1109/CyberC.2013.43","DOIUrl":"https://doi.org/10.1109/CyberC.2013.43","url":null,"abstract":"This paper presents a prediction method for Web services execution time based on monitoring service data collected at runtime. The prediction method is called RHDB (recent history data based) method and is based on Pareto's law and statistical regularity. By comparing XM method, mean method, local mean method and RHDB method proposed in this paper, the conclusion is that RHDB method has better prediction result.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133013591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Virtual Machine Placement Strategy Research 虚拟机布局策略研究
Ji-Pu Gao, Gaoming Tang
{"title":"Virtual Machine Placement Strategy Research","authors":"Ji-Pu Gao, Gaoming Tang","doi":"10.1109/CyberC.2013.57","DOIUrl":"https://doi.org/10.1109/CyberC.2013.57","url":null,"abstract":"With the emergence of cloud computing, users begin to have more abstract concept for the physical machine. IaaS providers prohibits users request specify the physical machine to virtual machine resources. Users know nothing about underlying infrastructure resources. The data center carry out virtual machine placement decision-making. In this paper, we use particle swarm optimization theory to guide the placement of virtual machines in the data center resources modeling and analysis. According to user needs and current physical server load state, the algorithm quantifies each physical machine and the virtual machine's CPU uses, memory uses, and storage uses. By using multi-objective particle swarm optimization algorithm, the placement of virtual machines based on the physical server resource utilization and the number of virtual machine migration. Simulation results show that the algorithm can effectively improve the minimum number of virtual machine migration resource utilization.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126708131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
RF Measurements of the RFX 900 and RFX 2400 Daughter Boards with the USRP N210 Driven by the GNU Radio Software GNU无线电软件驱动下USRP N210对RFX 900和RFX 2400子板的射频测量
Rafik Zitouni, S. Ataman, L. George
{"title":"RF Measurements of the RFX 900 and RFX 2400 Daughter Boards with the USRP N210 Driven by the GNU Radio Software","authors":"Rafik Zitouni, S. Ataman, L. George","doi":"10.1109/CyberC.2013.90","DOIUrl":"https://doi.org/10.1109/CyberC.2013.90","url":null,"abstract":"In this paper, we report a series of RF (Radio Frequency) measurements performed on a USRP and a GNU Radio Software Defined Radio (SDR). The RFX 900 and RFX 2400 Daughter Boards are connected to an USRP N210 platform and driven by the GNU Radio open source software. We focused on two main aspects: the output RF bandwidth and the power linearity versus the DAC value for each daughter board. The measured bandwidths of the daughter boards are found smaller than advertised while the linearity of the output power with the expected results is in good agreement only for low DAC values.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125629603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Anomaly Detection via One Class SVM for Protection of SCADA Systems 基于一类支持向量机的SCADA系统异常检测
Jianmin Jiang, Lasith Yasakethu
{"title":"Anomaly Detection via One Class SVM for Protection of SCADA Systems","authors":"Jianmin Jiang, Lasith Yasakethu","doi":"10.1109/CyberC.2013.22","DOIUrl":"https://doi.org/10.1109/CyberC.2013.22","url":null,"abstract":"Funded by European Framework-7 (FP7), the CockpicCI project aims at developing intelligent risk detection, analysis and protection techniques for Critical Infrastructures (CI). In this paper, we describes our recent research on automated anomaly detection from central Supervisory Control and Data Acquisition (SCADA) systems and their related commands/measurements in the SCADA-field equipment communications. The work exploits the concept of one-class SVM (Support Vector Machines) and adaptively controls its decision parameter to detect unusual patterns from inputs and generate alarms for on-site engineers to further investigate. Experiments on simulation data sets from telecommunication networks illustrate that the proposed algorithm achieves high detection rates, providing excellent potential for further research and development towards practical tools for protection of SCADA systems.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133764778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Improved PCA Based Step Direction Estimation for Dead-Reckoning Localization 基于改进PCA的航迹推算步长方向估计
Haitao Bao, L. Wong
{"title":"Improved PCA Based Step Direction Estimation for Dead-Reckoning Localization","authors":"Haitao Bao, L. Wong","doi":"10.1109/CyberC.2013.63","DOIUrl":"https://doi.org/10.1109/CyberC.2013.63","url":null,"abstract":"Step direction estimation is one of the key procedures for step counting based dead-reckoning tracking using motion sensors. It is also quite challenging, especially when the captured motion data is tainted by the user's activity. The Principal Component Analysis (PCA) based algorithm has provided robust estimation results, regardless of the sensor's relative rotation compared to the human body. However, the PCA based algorithm only returns the principal axis, resolving the 180-degree ambiguity is another challenge. In this paper, the drawback of PCA is compensated with the sensor's orientation analysis, which returns the walking direction by analyzing the change of the sensor's orientation. In our adaptive method, the sensor's orientation analysis algorithm is executed when a direction change is detected by the PCA algorithm. Because of the low computational complexity and restricted usage of orientation analysis, the adaptive method introduces little overhead compared to the original PCA method. Experimental results show that the adaptive algorithm provides more robust and accurate results compared to the PCA algorithm.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133368819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Speaker Detection on Telephone Calls Using Fusion between SVMs and Statistical Measures 基于支持向量机与统计测度融合的通话说话人检测
Siham Ouamour-Sayoud, H. Sayoud
{"title":"Speaker Detection on Telephone Calls Using Fusion between SVMs and Statistical Measures","authors":"Siham Ouamour-Sayoud, H. Sayoud","doi":"10.1109/CyberC.2013.56","DOIUrl":"https://doi.org/10.1109/CyberC.2013.56","url":null,"abstract":"This paper focuses on automatic speaker detection and identification, which is considered as the procedure of detecting and identifying the active speaker in multi-speaker conversations. That is, an automatic detection system is proposed for the task of speaker mining in telephonic conversations. This new detection system is based on an interlaced segmentation algorithm which we called ISI (Interlaced Speech Indexing) and employs two types of classifiers: Support Vector Machines and statistical measures of similarity. The experimental evaluations are conducted on a real telephonic database composed of 28 recordings, each recording contains 1, 2, 3, 4 or 5 speakers speaking sequentially, the duration of each file is between 40 s and 50 s. The proposed system uses the MFSC (Mel Frequency Spectral Coefficients) features, which are extracted from the different speech segments. Furthermore, a fusion architecture is proposed and employed to enhance the results obtained by each classifier alone. Results show that the proposed approach is interesting in speaker detection.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"62 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114087968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Demodulation Technique for High Mobility OFDM Systems 高移动性OFDM系统的解调技术
Xuefei Wang, Shan Gao, Q. Zhong, Han Zhang
{"title":"A Demodulation Technique for High Mobility OFDM Systems","authors":"Xuefei Wang, Shan Gao, Q. Zhong, Han Zhang","doi":"10.1109/CyberC.2013.81","DOIUrl":"https://doi.org/10.1109/CyberC.2013.81","url":null,"abstract":"This paper presents a receive windowing (RW) based demodulation technique for mobile OFDM systems. With the aid of RWs, we firstly split an OFDM block into non-overlapped intervals, and then proposed a weighted combination to compensate for the channel time-variation across windowed blocks. The optimal design for RWs is considered with respect to maximizing the signal-to-interference plus noise ratio. Both theoretical analysis and simulation examples illustrate the superior performance of our method over the conventional demodulators.","PeriodicalId":133756,"journal":{"name":"2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"534-536 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116864836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信