2010 Second International Conference on Computer and Network Technology最新文献

筛选
英文 中文
Computer Controlled Intrusion-Detector and Automatic Firing-Unit for Border Security 边境安全计算机控制入侵探测器及自动发射装置
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.32
K. Vittal, Ajay Pai P., A. B., C. Rao
{"title":"Computer Controlled Intrusion-Detector and Automatic Firing-Unit for Border Security","authors":"K. Vittal, Ajay Pai P., A. B., C. Rao","doi":"10.1109/ICCNT.2010.32","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.32","url":null,"abstract":"This paper describes a novel computer-controlled intrusion-detector and automatic firing unit, which may be used for the surveillance of borders, either of a country, or of areas requiring high security, especially in regions of extreme climatic conditions, where it is difficult to deploy personnel. This system not only detects intrusion but also provides a video-coverage of the suspicious area, for remote vigilance, via a satellite based communication system. It is also provided with automatic firing echanisms which can be used to automatically locate and fire at the target. Thus, several kilometres of the borders, which would have otherwise required several hundred personnel, can be effortlessly monitored with this system, with only a few personnel. Since, the actual firing occurs only after an authoritative personnel has doubly confirmed the presence of an intruder, chances of firing at innocent people are completely ruled out. As thermal cameras are used for imaging, this system is immune to changes in ambient conditions, and therefore, is equally suited for operation during the night. This paper also throws light on the prototype of this system, which has been successfully developed.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116399956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Auto-CQT Control and Management Protocol Design 自动cqt控制和管理协议设计
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.86
Xiaowan Ke, Wenjing Li, Lanlan Rui, Xue-song Qiu, Shaoyong Guo
{"title":"Auto-CQT Control and Management Protocol Design","authors":"Xiaowan Ke, Wenjing Li, Lanlan Rui, Xue-song Qiu, Shaoyong Guo","doi":"10.1109/ICCNT.2010.86","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.86","url":null,"abstract":"When wireless communication comes into the era of the 3rd generation, teleservices would become unprecedented rich under the open service access (OSA). Obviously, QoS (quality of service) from customer’s view becomes one of the most important factors deciding the deployment strategies of services. CQT that is a typical measurement tool for end-to-end QoS is increasingly attracting the attention of industry. However, the existing automatic testing control mechanisms (ATCM) can not satisfy the complex testing requests. Therefore, this paper introduces a new kind of Auto-CQT Control and Management Interface Protocol with better flexibility and scalability between control system and testing terminals. ACCMP is designed on the basis of the smallest reusable testing units and a testing synchronization mechanism, so it can satisfy the complex combination test requirements of multiple services easily.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116547755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intrusion Detection and Attack Classification Using Feed-Forward Neural Network 基于前馈神经网络的入侵检测与攻击分类
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.28
Fariba Haddadi, Sara Khanchi, Mehran Shetabi, V. Derhami
{"title":"Intrusion Detection and Attack Classification Using Feed-Forward Neural Network","authors":"Fariba Haddadi, Sara Khanchi, Mehran Shetabi, V. Derhami","doi":"10.1109/ICCNT.2010.28","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.28","url":null,"abstract":"Fast Internet growth and increase in number of users make network security essential in recent decades. Lately one of the most hot research topics in network security is intrusion detection systems (IDSs) which try to keep security at the highest level. This paper addresses a IDS using a 2-layered feed-forward neural network. In training phase, “early stopping” strategy is used to overcome the “over-fitting” problem in neural networks. The proposed system is evaluated by DARPA dataset. The connections selected from DARPA is preprocessed and feature range is converted into [-1, 1]. These modifications affect final detection results notably. Experimental results show that the system, with simplicity in comparison with similar cases, has suitable performance with high precision.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122159267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
An Algorithm for Joint Multi-item Replenishment Problem under Trade Credits 贸易信用下的多项目联合补货算法
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.117
Yu-Chung Tsao, Lu-Wen Liao
{"title":"An Algorithm for Joint Multi-item Replenishment Problem under Trade Credits","authors":"Yu-Chung Tsao, Lu-Wen Liao","doi":"10.1109/ICCNT.2010.117","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.117","url":null,"abstract":"This study deals with the joint multi-item replenishment problem under trade credit. All existing studies about trade credit focused on single-item replenishment policy. However, joint multi-item replenishment has been widely applied in many industries to take advantage of trans port economies of scale. In this paper we extend the traditional inventory model by considering trade credit t and multi-item replenishment so as to better reflect the real-world business situation. The objective is to determine the optimal replenishment schedule for each item while minimizing the total cost. Two heuristics, Cost-balancing heuristic and Extreme finding heuristic, are developed to solve the problem. From computational analysis, we illustrate and compare the two heuristics. Our performance study shows that Extreme-finding heuristic is better than Cost-balancing heuristic.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125594961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Network Virtual Laboratory System 网络虚拟实验室系统的研究
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.92
He Wei
{"title":"Research on Network Virtual Laboratory System","authors":"He Wei","doi":"10.1109/ICCNT.2010.92","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.92","url":null,"abstract":"The virtual instrument’s gradually developing into the direction to network make Network Virtual Laboratory(NVL) becomes an important mode of laboratory construction. Starting from analysis on characteristics of virtual laboratory system, the paper carries through overall design on network virtual laboratory system, and designed the structure of system website and constitutes in detail. Then, the main functions of the NVL were discussed. The frequency characteristic measurement experiment based on NVL was designed to lay foundation for practical application of NVL.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126178658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Model of Order Promise Mechanism for TV Advertising 电视广告的订单承诺机制模型
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.57
Lu-Wen Liao, Yu-Chung Tsao
{"title":"The Model of Order Promise Mechanism for TV Advertising","authors":"Lu-Wen Liao, Yu-Chung Tsao","doi":"10.1109/ICCNT.2010.57","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.57","url":null,"abstract":"In this paper, we deal with the problem of the order promising for TV advertising. Traditionally, sales representative manually check commercial time slots according to customer requests. However, this check process is very complex and takes a long time, which results in losing sales opportunities and reducing customer satisfaction. Therefore, we propose an order promise mechanism using the Architecture of Integrated Information Systems modeling method, helping TV stations quickly response customer requirements and efficiently use valuable commercial time slots.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128835840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Multiple Pattern Detection Algorithm 动态多模式检测算法
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.90
Chouvalit Khancome, V. Boonjing
{"title":"Dynamic Multiple Pattern Detection Algorithm","authors":"Chouvalit Khancome, V. Boonjing","doi":"10.1109/ICCNT.2010.90","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.90","url":null,"abstract":"The multiple pattern matching has always been a significant principle for applying to a network security system. This principle is adapted to accommodate the target patterns to be detected in a pre-processing phase, and the objective text and the suspect patterns are simultaneously detected by comparing with the existing structure. This research article introduces a new algorithm of multi-string pattern matching by means of a new data structure called inverted lists. The inverted lists structure, inherited from the inverted index, is represented by the positions of characters which appear in the patterns. The new algorithm, which is more efficient time than the traditional algorithms, scans the given text in a single pass. More importantly, the structure of patterns is able to update the patterns over time.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113932929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Block-Level Data Migration in Tiered Storage System 分级存储中的块级数据迁移
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.61
Xiaonan Zhao, Zhanhuai Li, Xiao Zhang, Leijie Zeng
{"title":"Block-Level Data Migration in Tiered Storage System","authors":"Xiaonan Zhao, Zhanhuai Li, Xiao Zhang, Leijie Zeng","doi":"10.1109/ICCNT.2010.61","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.61","url":null,"abstract":"Managing data growth continues to be the biggest challenge for IT. And tiered storage, a solid way to Information Lifecycle Management (ILM), is very helpful to reduce the cost and improve the storage efficiency in data center. However, data migration is the primary challenge to implement tiered storage management, and it's hard to be resolved by traditional data migration solutions, which are mainly relying on experience of administrators and manual migration according to storage capacity usage and data access frequency. This paper proposes a novel bi-directional migration policy (migration with double thresholds based on feedback, MDTF), based on block-level data valuation and fully automation process. MDTF aims to achieve balance between storage QoS and migration costs by double thresholds, to narrow the migration scope of block-level data objects, and the analysis shows that MDTF is an efficient block-level data migration policy comparing with traditional migration policies.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132007194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Data Load Distribution by Semi Real Time Data Warehouse 半实时数据仓库的数据负载分配
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.104
M. Javed, A. Nawaz
{"title":"Data Load Distribution by Semi Real Time Data Warehouse","authors":"M. Javed, A. Nawaz","doi":"10.1109/ICCNT.2010.104","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.104","url":null,"abstract":"Today many organizations used data warehouse for strategic decision making. Today's real-time business stresses the potential to process increasingly volumes of data at very high speed in order to stay competitive in market. Data Warehouse is populated by data extraction, transformation and loading from different data sources by software utilities called ETL (Extraction, transformation & loading). ETL process is a time consuming process as it has to process large volume of data. ETL processes must have certain completion time window and ETL process must have to finish within this time window. In this paper we discusses a technique to distribute the volume of data to be extracted, transformed and loaded into data warehouse by merging both conventional and real-time techniques, so ETL process finishes its job within its time window by utilizing ETL idle time.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131112375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
TCP Performance Enhancement Using ECN and Snoop Protocol for Wi-Fi Network 利用ECN和Snoop协议增强Wi-Fi网络的TCP性能
2010 Second International Conference on Computer and Network Technology Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.36
M. Chawhan, A. Kapur
{"title":"TCP Performance Enhancement Using ECN and Snoop Protocol for Wi-Fi Network","authors":"M. Chawhan, A. Kapur","doi":"10.1109/ICCNT.2010.36","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.36","url":null,"abstract":"Providing Internet services over wireless links has grown rapidly in recent years. TCP (Transmission Control Protocol) has been performing well over the traditional wired networks where packet losses occur mostly because of congestion, it cannot react efficiently in wireless networks, which suffer from significant non-congestion-related losses due to reasons such as bit errors and handoffs. The paper shows how Explicit Congestion Notification (ECN), Snoop protocol and their combination can be used to improve the performance of TCP in Wi-Fi Bi-directional Network and in Handoff. ECN will help in congestion control and SNOOP will retransmit the packets that are lost from nodes in between, saving nearly half the retransmission time and avoiding the decreasing in transmission speed. This paper investigates the performance of above mentioned protocols over Wi-Fi wireless scenario which improves the various parameters of TCP such as throughput and goodput. The results of the same can be demonstrated on NS2 simulator.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130686322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信