{"title":"Improved Active Queue Management Algorithm for High Performance Networks","authors":"Long Ge, Jinsheng Sun, Zhiquan Wang","doi":"10.1109/ICCSN.2009.125","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.125","url":null,"abstract":"On the problem of some Active Queue Management (AQM) algorithms having long time adjustment and being not able to stabilize the queue length to the desired one in dynamic network environment. An improved AQM algorithm for high performance networks based on integral-separated PID and incomplete-derivative PID is proposed. Its performance is evaluated by simulation experiments, which demonstrate that the proposed algorithm is able to speed up the queue convergence and is more robust under various network parameters.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123362865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification and Analyses of Business Process Anomalies","authors":"Gun-Woo Kim, Jeong Hwa Lee, J. Son","doi":"10.1109/ICCSN.2009.154","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.154","url":null,"abstract":"Business Process may have unexpected design anomalies in modeling phase. If business process engine executed without anomalies detection, the inappropriate progress will be executed and that will be lead to massive loss of costs and human capitals in organization. To ensure that there is no design anomalies in business process modeling phase and to detect anomalies of predefined actions within modeling tools are important issues in business process management. In this paper, we provide classification and analyses of business process anomalies, which can effectively use to detect or verification in business process modeling phase.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Solution for IPv6 Network Topology Discovery Based on Source Routing Mechanism","authors":"Zhu Mingming, Lu Junyong","doi":"10.1109/ICCSN.2009.116","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.116","url":null,"abstract":"While the source routing mechanism has a unique advantage on enhancing the coverage of IPv6 network topology discovery, it is considered to be inefficient in the current IPv6 network topology discovery technology. Research into the nature of source routing mechanism reveals the fact that the total number of targets to be probed grows rapidly during the progress of topology discovery. This means probing process has to face a huge probing space and this is the main reason for the inefficiency. This paper described how probing space expands, analyzed the reasons why probing space expands, then offered a solution to suppress this fast expansion to improve the efficiency of source routing mechanism. The experiment results showed that the improved solution suppressed more than 65% of the probing space expansion effectively on the premise of not affecting coverage rate.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114252535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UBSFQ: An Urgency-Based Start-time Fair Queuing Scheduling","authors":"Liu Wen-bo, Guo Yun-fei, Ma Hai-long, Zhang Fan","doi":"10.1109/ICCSN.2009.69","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.69","url":null,"abstract":"How to provide a broad range of QoS guarantees in a packet network is an important issue. In order to achieve QoS guarantees, good traffic schedulers are indispensable. In this paper, a packet scheduling discipline UBSFQ and its simulation are proposed. According as the implementation and result of our simulations, this scheduling discipline is computational efficient, and can resolve the unstable packet latencies problem, and shares both the bounded-delay and fairness properties of GPS.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114274849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical PI Design by Using Closed-Loop Stability Constraints and H8 Theory for Relativity Rotary Machine","authors":"Shuang Liu, B. Liu","doi":"10.1109/ICCSN.2009.89","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.89","url":null,"abstract":"In order to suppress the torsional vibration of rotary machine, a PI controller was analytically derived based on stability of the closed-loop system and H∞ mixed sensitivity function. This novel design procedure is adapted to some unstable and critically stable systems, and a single parameter T1 is included in the controller, which can be determined by the disturbance rejection capability and robust stability, at the same time, two performances can arrive at a better compromise by tuning T1. At last, the simulation examples and experiment were provided to show the superiority of the proposed method.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114012339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Tariq, Yong Pyo Kim, Jun Hwan Kim, Yong-Jin Park, Eui-Hyun Jung
{"title":"Energy Efficient and Reliable Routing Scheme for Wireless Sensor Networks","authors":"Muhammad Tariq, Yong Pyo Kim, Jun Hwan Kim, Yong-Jin Park, Eui-Hyun Jung","doi":"10.1109/ICCSN.2009.101","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.101","url":null,"abstract":"Energy efficient and reliable data forwarding becomes important if resources are limited such as in Wireless Sensor Networks. Although Directed Diffusion, a data centric routing approach is widely used in Wireless Sensor Networks,it is inefficient in terms of reliability and energy efficiency. In this paper we present a new routing scheme for Wireless Sensor Networks, in which routing is based on Radio-aware Metric, which contains radio information at the Medium Access Control (MAC) layer. In this new routing scheme, data are forwarded to a designated neighbor, instead of flooding exploratory data into the whole network like with Directed Diffusion. Simulation results show that compared to Directed Diffusion, our proposed routing scheme is almost 4.3 times more efficient in terms of energy consumption and 2.6 times more reliable in terms of data delivery. Our work relies on interaction between routing and MAC layers, with the overall goal of achieving energy efficiency and reliability through cross layer optimization.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122613658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Mine Through-Earth Communication System Based on Spectrum Spreading Technology","authors":"Zhang Qinghui, Zhang Donglin","doi":"10.1109/ICCSN.2009.91","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.91","url":null,"abstract":"Based on the analysis on the through-earth communication using the basic principle of information theory, spectrum spreading technology is adopted to solve the problem that the received signal in through-earth communication is weak. And the technology scheme of through-earth communication is designed. Finally the reliability of the scheme is verified by simulation.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122644590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on ZigBee Network Routing Based on Nodal Heterogeneity","authors":"Liu Dan, Qi Hong","doi":"10.1109/ICCSN.2009.49","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.49","url":null,"abstract":"ZigBee is a kind of low rate, low cost and low power technology to be used in cheap, fixed, portable and mobile devices in wireless personal network. In ZigBee mesh network, the routing algorithms about the two kinds of nodes RN+ and RN- have been studied in this paper. With the increasing number of RN- in the total routers, the packet delivery ratios decrease slowly, but the difference is smaller; the routing overheads decrease one by one while the 40% and 60% percentage of RN-, the overhead are 40.2 and 49 respectively; the end to end delay is almost 0.043s with the 40% and 60% percentage of RN-. The results show that the 40% percentage of RN- is more excellent in deciding routing performance.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131417954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using API Sequence and Bayes Algorithm to Detect Suspicious Behavior","authors":"Cheng Wang, J. Pang, Rongcai Zhao, Xiaoxian Liu","doi":"10.1109/ICCSN.2009.60","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.60","url":null,"abstract":"Computer viruses have become the main threat of the safety and security of industry. Unfortunately, no mature products of anti-virus can protect computers effectively. This paper presents an approach of virus detection which is based on analysis and distilling of representative behavior characteristic and systemic description of the suspicious behaviors indicated by the sequences of APIs which called under Windows. Based on decompilation analysis, according to the determinant of Bayes Algorithm, and by the validation of abundant sample space, the technique implements the virus detection by suspicious behavior identification.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131537677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Paper Application of Partial Coefficient Update LMS Algorithm to Suppress Narrowband Interference in DSSS System","authors":"Zhangsheng Wang, Ming Lv, B. Tang","doi":"10.1109/ICCSN.2009.139","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.139","url":null,"abstract":"Transform Domain LMS is discussed in this paper and a partial coefficient update LMS adaptive algorithm (P-LMS) is proposed to suppress narrowband interference in DSSS system. In the new algorithm, it only updates a portion of the coefficients of the adaptive filter, so it reduces a lot of computation. It is convenient to implement on FPGA/DSP. The algorithm also has faster convergence speed and little steady state error. The algorithm is applied to the DSSS system to suppress narrowband interference system and it works very well. Computer simulation results confirm the theoretical analysis.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132325348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}