2010 IEEE International Conference on Wireless Communications, Networking and Information Security最新文献

筛选
英文 中文
Prediction model of network security situation based on regression analysis 基于回归分析的网络安全态势预测模型
Xia Wei-wei, Wang Hai-feng
{"title":"Prediction model of network security situation based on regression analysis","authors":"Xia Wei-wei, Wang Hai-feng","doi":"10.1109/WCINS.2010.5541853","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541853","url":null,"abstract":"This paper analyses and compares the existing network security situation evaluation methods, defines various network security evaluation concepts, and proposes a method for network security situation evaluation using virtual Honeynet. With the relationships among Honeynet active, host active of computer networks and IP active when network intrusion occurs, a binary linear regression prediction model is proposed. In the end, a prototype system is designed for data collection and regression fitting, and the validity of the regression prediction model is proved.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125252110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A novel model characteristics for noise-robust Automatic Speech Recognition based on HMM 一种基于HMM的噪声鲁棒自动语音识别新模型
M. S. Rafieee, A. Khazaei
{"title":"A novel model characteristics for noise-robust Automatic Speech Recognition based on HMM","authors":"M. S. Rafieee, A. Khazaei","doi":"10.1109/WCINS.2010.5541923","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541923","url":null,"abstract":"This paper proposes a new model for a noise-robust Automatic Speech Recognition (ASR) based on parallel branch Hidden Markov Model (HMM) structure with a novel approach for robust speech recognition. Automatic Speech Recognition applications such as voice command and control, audio indexing, speech-to-speech translation, do not usually work well in noisy environments. In this paper, we present the characteristics of a novel model by exploring vibrocervigraphic and electromyographic ASR methods and some other effective approaches to achieve the best results. By employing the proposed model, we obtain the word error rate, available bandwidths with cutoff frequencies, word recognition rate, etc. This paper includes advanced front-end processing with less computational requirements and a statistical modeling for large-vocabulary myoelectric speech. Therefore parameters estimation of ASR system like Mel-Frequency Cepstral Coefficients (MFCC) are investigated to create the statistically optimized model.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125713040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A multipath mitigation algorithm in Global Navigation Satellite Systems arrays using Independent Component Analysis 基于独立分量分析的全球卫星导航系统阵列多径缓解算法
Songtao Lu, Yun Zhao
{"title":"A multipath mitigation algorithm in Global Navigation Satellite Systems arrays using Independent Component Analysis","authors":"Songtao Lu, Yun Zhao","doi":"10.1109/WCINS.2010.5544048","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544048","url":null,"abstract":"it is recognized that Multipath remains as one of dominant source of errors in Global Navigation Satellite System (GNSS) receivers. Independent Component Analysis (ICA) has been widely used as an advanced processing tool for blind suppression of interfering signals in Direct Sequence Spread Spectrum (DSSS) communication systems by utilizing antenna arrays to extract interference signals, but very less literature is available on the performance of ICA in the navigation satellite systems application. We proposed ICA based blind multipath mitigation algorithm for estimation of GNSS multipath components. The proposed algorithm could effectively decompose the received pseudo-range into the independent multipath component and the noise component respectively, and hence provide necessary information about the delay estimation of these multipaths. The effectiveness of this method in multipath environment is demonstrated effectively, which has a better positioning performance over conventional scheme via simulations.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125870867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secret images sharing scheme using two-variable one-way functions 使用双变量单向函数的秘密图像共享方案
T. Alexandrova, Yoshiaki Suzuki, K. Okubo, N. Tagawa
{"title":"Secret images sharing scheme using two-variable one-way functions","authors":"T. Alexandrova, Yoshiaki Suzuki, K. Okubo, N. Tagawa","doi":"10.1109/WCINS.2010.5541840","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541840","url":null,"abstract":"In this paper a method for realizing (t, n) secret images sharing scheme has been proposed. The proposed algorithm for secret images sharing is realized by applying multi-secret sharing schemes based on two-variable one-way functions and Shamir's secret sharing schemes. In the proposed scheme participants only need to pool their pseudo-shares instead of disclosing their secret shares when recovering secret images. Thus, each participant can share many secret images by holding only one secret share. Moreover, the size of each share does not depend on the size of the secret image and this is an important property for the further process of the image shares. The proposed method is a multi-use scheme that can be used in different secret sharing sessions without redistributing participants' secret shares. Compared with other image secret sharing techniques another main advantage of the proposed method is that it does not generate share images which are difficult to manage.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127298049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Convergence characteristics analysis on blind separation of DS-CDMA signals with ICA method 基于ICA的DS-CDMA信号盲分离收敛特性分析
Miao Yu, Shiju Li, Jianzhong Chen
{"title":"Convergence characteristics analysis on blind separation of DS-CDMA signals with ICA method","authors":"Miao Yu, Shiju Li, Jianzhong Chen","doi":"10.1109/WCINS.2010.5541928","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541928","url":null,"abstract":"Blind estimation of information sequences and pseudo random sequences is of great importance for the security in DS-CDMA system, which remains a hot research topic in reconnaissance and supervision of wireless communication. In DS-CDMA system, the information sequences of different user's are independent and the pseudo random sequences are none correlation, thus independent component analysis (ICA) technology can be adopted to separate the DS-CDMA signals with little prior knowledge. Under non-cooperative situations, the interceptor could not aim at the beginning of the symbol accurately. The offset between the transmitter and the interceptor has great influence on the convergence characteristic of the blind separation algorithm of DS-CDMS signals with ICA method. Certain offsets deteriorate the convergence characteristic obviously. The relationship between the offset and the convergence characteristics is found out, which has great importance in choosing the offset in practice. The reason why certain offsets deteriorate the algorithm is analyzed from the idea of eigen value decomposition. The correctness of theory analysis is proved by the simulation results at last.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126394034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An attack-resilient Grid auditing infrastructure 抗攻击网格审计基础设施
Christopher Kunz, J. Wiebelitz, Matthew Smith
{"title":"An attack-resilient Grid auditing infrastructure","authors":"Christopher Kunz, J. Wiebelitz, Matthew Smith","doi":"10.1109/WCINS.2010.5541857","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541857","url":null,"abstract":"As recent experiments have shown, current Grid infrastructures are highly vulnerable against root exploits. In these attacks legitimate Grid user credentials were used to compromise vulnerable Grid head and worker nodes. Any such attack against a distributed working environment is critical.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123684378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Measurement of mobile radio propagation channel in ruins 废墟中移动无线电传播信道的测量
Ling Chen, T. Ostertag, M. Loschonsky, L. Reindl
{"title":"Measurement of mobile radio propagation channel in ruins","authors":"Ling Chen, T. Ostertag, M. Loschonsky, L. Reindl","doi":"10.1109/WCINS.2010.5541724","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541724","url":null,"abstract":"Within a running project, I-LOV1, wireless communication channel model for mobile communications is developed based on measurements in reconstructed disaster and salvage scenarios. Due to complex environment in ruins, great multipath interference can take place, which strongly impacts communication quality and localization accuracy. Besides numerous measurements investigated in environments such as urban, outdoor-to-indoor or indoor, only a few are in ruins. This paper presents the first results of channel propagation measurements under collapsed buildings at GSM 900 and GSM 1800 bands. Measurement campaigns were performed in two typical collapsed structures: stratified and chaotic rubbles. The statistical properties of path-loss (PL) and RMS delay spread (DS) are reported.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121671545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
WiFi GPS based combined positioning algorithm 基于WiFi GPS的组合定位算法
Soumaya Zirari, P. Canalda, F. Spies
{"title":"WiFi GPS based combined positioning algorithm","authors":"Soumaya Zirari, P. Canalda, F. Spies","doi":"10.1109/WCINS.2010.5544653","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5544653","url":null,"abstract":"If nowadays, positioning becomes more and more accurate, and covers better and better a territory (indoor and outdoor), it remains territories where traditional (and basic) positioning system (GPS, gsm or WiFi) and hybrid ones (GPS- gsm, GPS-WiFi, GPS-WiFi-gsm, …) are insufficient and requires research investment treating combined positioning. In this paper we propose a GPS-WiFi combined positioning algorithm, based on trilateration technique. Real experiments and other simulation are conduced and demonstrate accuracy gains, even where various criteria dilution of precision (GPS dop's criteria, or ours WiFi geometrical and signal attenuation's dop proposal, or hybrid dop one's) indicate all the disruption of positioning service. A testbed scenario issued from a real urban campus environment validates not only our GPS-WiFi combined positioning algorithm but also an implementation of pertinent positioning techniques and dop's criteria. This work constitutes a further step to better position everywhere and to ensure continuity of a positioning service.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122506950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
A method for specific emitter identification based on empirical mode decomposition 基于经验模态分解的特定发射极识别方法
Chunyun Song, Jianmin Xu, Yi Zhan
{"title":"A method for specific emitter identification based on empirical mode decomposition","authors":"Chunyun Song, Jianmin Xu, Yi Zhan","doi":"10.1109/WCINS.2010.5541885","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541885","url":null,"abstract":"Real radio and radar signals turn out to be non-stationary and nonlinear time series, and estimating instantaneous parameters of such signals in time domain will benefit detecting and identifying specific emitters, such as civil or military radios. However, conventional methods such as Wavelet and Wigner-Ville distribution (WVD) methods are difficult to deal with these transient signals when the signal is no-stationary. To provide more efficient approach for estimating instantaneous parameters of non-stationary and identifying specific emitter with high accuracy, a new method based on empirical mode decomposition (EMD) for analyze no-stationary signal is proposed in this paper. The results show that the instantaneous frequency estimates generated by the EMD method are more accurate than those obtained by the Wavelet technique.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116601368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A modified Min-Sum algorithm for low-density parity-check codes 低密度奇偶校验码的改进最小和算法
W. Han, Jianguo Huang, Fangfei Wu
{"title":"A modified Min-Sum algorithm for low-density parity-check codes","authors":"W. Han, Jianguo Huang, Fangfei Wu","doi":"10.1109/WCINS.2010.5541818","DOIUrl":"https://doi.org/10.1109/WCINS.2010.5541818","url":null,"abstract":"A modified Min-Sum algorithm for low-density parity check codes is proposed in this paper. The inaccurate check node messages of the Min-Sum algorithm compared to the belief propagation (BP) algorithm are compensated by modified variable node messages, which is different from the normalized Min-Sum algorithm. The modified factor is obtained before decoding program and only one extra multiplication is needed in one cycle. So the increased complexity is fairly low. The simulation results show that the bit error rate (BER) and average number of iteration of the modified Min-Sum algorithm are very close to the BP algorithm, the modified algorithm can improve the BER performance compared to the Min-Sum algorithm while added complexity slightly.","PeriodicalId":156036,"journal":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123135074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信