2010 IEEE Youth Conference on Information, Computing and Telecommunications最新文献

筛选
英文 中文
Relay protocol improvement and frame structure design base on overhearing mechanism and physical network coding 基于监听机制和物理网络编码的中继协议改进和帧结构设计
2010 IEEE Youth Conference on Information, Computing and Telecommunications Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713109
Qiong Huang, Ming-jing Ni, Lun Tang, Rong Chai, Qianbin Chen
{"title":"Relay protocol improvement and frame structure design base on overhearing mechanism and physical network coding","authors":"Qiong Huang, Ming-jing Ni, Lun Tang, Rong Chai, Qianbin Chen","doi":"10.1109/YCICT.2010.5713109","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713109","url":null,"abstract":"Under the background of TDD mode and LTE-Advanced scene, in this paper, we combine physical network coding with relay technology in order to make physical network coding-decode and forward(PNC-DF)together with physical network coding-amplify and forward(PNC-AF)transfer mode can be used to improve network throughput by using interference. Because of the ability to listen to the multi-user relay service, we need to optimize and select user group of physical network coding. In this paper, we use over-hearing mechanism in order to optimize user group, even more we also need to improve the department of transport protocol on delay. At last, depending on improved transport protocol, we design two kinds of frame structure which could adapt to improved transfer model. The simulation result shows that PNC-DF and PNC-AF with over-hearing mechanism could reduce the bit error rate.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123816111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pixel level image fusion based on linear structure tensor 基于线性结构张量的像素级图像融合
2010 IEEE Youth Conference on Information, Computing and Telecommunications Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713105
B. Lu, Chunli Miao, Hui Wang
{"title":"Pixel level image fusion based on linear structure tensor","authors":"B. Lu, Chunli Miao, Hui Wang","doi":"10.1109/YCICT.2010.5713105","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713105","url":null,"abstract":"A pixel-level image fusion method based on linear structure tensor is proposed within wavelet framework. Structure tensor, which describes local structure information with its eigenvalues and eigenvectors, is adopted to design a feature selection algorithm to reconstruct high-frequency wavelet coefficients of fused image. Experimental results on grayscale and color images show that the linear structure tensor based fusion scheme can preserve more details.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134015231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
VNSS: A network security sandbox for virtual computing environment VNSS:面向虚拟计算环境的网络安全沙箱
2010 IEEE Youth Conference on Information, Computing and Telecommunications Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713128
Gao Xiaopeng, Wan Sumei, Chen Xianqin
{"title":"VNSS: A network security sandbox for virtual computing environment","authors":"Gao Xiaopeng, Wan Sumei, Chen Xianqin","doi":"10.1109/YCICT.2010.5713128","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713128","url":null,"abstract":"With the number of applications running upon the virtualized system increased, the virtual network circumstance becomes more and more complicated; the consequent security problems thereby have been a concern for industrial and academic fields. However, the current solutions are mostly confined to the enforcement of several patchy-works on system which still requires proficient hacking skills for administrators and cannot ensure continuous protection for VM, resulting in potential security risks. In this paper we present a framework (VNSS) which provides both guarantee of distinct security level requirement and full-lifecycle protection for VM. We have implemented a prototype system based on Xen hypervisor to evaluate our framework. The experiment results demonstrate that our framework can provide continuous protection for virtual network environment.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134251862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A decentralized approach with fewer coding nodes for network coding multicast 网络编码多播的一种编码节点少的分散方法
2010 IEEE Youth Conference on Information, Computing and Telecommunications Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713087
Xiao Sun
{"title":"A decentralized approach with fewer coding nodes for network coding multicast","authors":"Xiao Sun","doi":"10.1109/YCICT.2010.5713087","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713087","url":null,"abstract":"Previous works on network coding have mainly focused on the throughput and the cost of bandwidth, but few cares about saving resources used to code. In this paper we present a decentralized algorithm to construct network coding solutions, which reduces the number of coding nodes. We showed the dynamic topology greatly affected the network coding solutions, which may improve coding solution or reduce the coding nodes and we also analyzed some useful behaviors in feasible network coding solutions. By the nodes independently attempting those behaviors in dynamic topology, we introduce a fully decentralized algorithm of constructing coding solution. By simulation we found our approach has excellent performance, which achieves the approximate throughput compared to completely Randomized Network Coding, but only employing 10%–20% of nodes to code.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132786322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual speech recognition using Convolutional VEF snake and canonical correlations 基于卷积VEF蛇和典型相关的视觉语音识别
2010 IEEE Youth Conference on Information, Computing and Telecommunications Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713068
Kun Lu, Yuwei Wu, Yunde Jia
{"title":"Visual speech recognition using Convolutional VEF snake and canonical correlations","authors":"Kun Lu, Yuwei Wu, Yunde Jia","doi":"10.1109/YCICT.2010.5713068","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713068","url":null,"abstract":"This paper presents a novel approach for automatic visual speech recognition using Convolutional VEF snake and canonical correlations. The utterance image sequences of isolated Chinese words are recorded with a head-mounted camera, and we use Convolutional VEF snake model to detect and track lip boundary rapidly and accurately. Geometric and motion features are both extracted from lip contour sequences and concatenated to form a joint feature descriptor. Canonical correlation is applied to measure the similarity of two utterance feature matrices and a linear discriminant function is introduced to make further improvement on the recognition accuracy. Experimental results demonstrate that our approach is promising and the joint feature descriptor is more robust than individual ones.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133711435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A graph-model-based structure vulnerability Analyzing method on satellite network 基于图模型的卫星网络结构脆弱性分析方法
2010 IEEE Youth Conference on Information, Computing and Telecommunications Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713084
Xiang Li, Bai Lin, DaQi Li
{"title":"A graph-model-based structure vulnerability Analyzing method on satellite network","authors":"Xiang Li, Bai Lin, DaQi Li","doi":"10.1109/YCICT.2010.5713084","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713084","url":null,"abstract":"The satellite network has features like complex, dynamic and fuzzy. Compared to ground information systems, satellite network has more vulnerabilities that are hard to anticipate, and needs a beforehand study to ensure its safely construction. This article uses a vulnerability Analyzing method based on graph model. It uses the relatively still structure as stand point in the dynamic satellite network environment. It synthetically analyses relative vulnerabilities in the network from node level, chain level and access path level. Through simulations with the GIG application layer network structures as the scenarios, this kind of satellite network structure vulnerability analysis method gets its veracity and application value proved.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116306559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Focused passive synthetic aperture 聚焦被动合成孔径
2010 IEEE Youth Conference on Information, Computing and Telecommunications Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713069
Xiongfei Zeng, Zheng Li, Haining Huang, Guiqing Sun
{"title":"Focused passive synthetic aperture","authors":"Xiongfei Zeng, Zheng Li, Haining Huang, Guiqing Sun","doi":"10.1109/YCICT.2010.5713069","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713069","url":null,"abstract":"High accurate ranging for near-field sources requires that the array aperture should be long enough, especially for the weak underwater acoustic signal with very low frequency. The passive synthetic aperture technique can increase the array aperture artificially by the motion of physical array and signal processing. This paper applies it to the near-field ranging with focused beamforming, which provides a feasible ranging method for near-field weak signal. Theoretical analysis and simulation results both indicate: 1) the proposed method can achieve high ranging precision for near-field sources; 2) because of the error accumulation, the times of extending array would affect the ranging precision directly, and if the sizes of synthetic apertures are same, the fewer times array is extended, the better performance it owns, on the contrary, the ranging precision is independent on the speed of the towed array.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"758 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122986179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study on the parameters of the semi-fragile watermarking based on JPEG properties 基于JPEG属性的半脆弱水印参数研究
2010 IEEE Youth Conference on Information, Computing and Telecommunications Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713082
Jun Xiao, Jiaorao Su, Zhiqiang Ma
{"title":"Study on the parameters of the semi-fragile watermarking based on JPEG properties","authors":"Jun Xiao, Jiaorao Su, Zhiqiang Ma","doi":"10.1109/YCICT.2010.5713082","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713082","url":null,"abstract":"As a new authentication technique for digital information, semi-fragile watermarking has gained great development, and since JPEG compression is one of the usually used image processing methods, more and more semi-fragile watermarking algorithms based on JPEG compression standard are proposed, but how to make full use of the properties of JPEG compression is still a problem. In this paper, the theory of semi-fragile watermarking based on properties of JPEG and DCT coefficients are introduced, and the parameters that affect the performances are analyzed theoretically and experimentally. The result of study shows that the positions of DCT coefficients used to generate watermark, the number of watermarks generated from a couple of blocks and the positions used to hide watermarks have great effect on the performances of the algorithm. Unless some special requirements exist, both the positions of coefficients used to generate and embed watermark should be chosen according to the order of zig-zag, and usually the best performance can be obtained when only one bit watermark is generated from a couple of blocks.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115888412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SVM inverse model-based heading control of unmanned surface vehicle 基于SVM逆模型的无人水面航行器航向控制
2010 IEEE Youth Conference on Information, Computing and Telecommunications Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713064
Sun Qiaomei, Ren Guang, Yue Jin, Qi Xiaowei
{"title":"SVM inverse model-based heading control of unmanned surface vehicle","authors":"Sun Qiaomei, Ren Guang, Yue Jin, Qi Xiaowei","doi":"10.1109/YCICT.2010.5713064","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713064","url":null,"abstract":"This paper describes a control methodology of SVM inverse model for unmanned surface vehicle (USV) system heading control. The method is composed of SVM inverse model and PID feedback compensation that are illustrated in detail. In the MATLAB platform, unmanned surface vehicle module and SVM control module were established. The whole system simulation was conducted. The experiments results show that the proposed SVM inverse model approach can achieve effective control of USV.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"343 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122545896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
AdaGP-Rank: Applying boosting technique to genetic programming for learning to rank AdaGP-Rank:将提升技术应用于遗传规划学习排序
2010 IEEE Youth Conference on Information, Computing and Telecommunications Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713094
Feng Wang, Xin Xu
{"title":"AdaGP-Rank: Applying boosting technique to genetic programming for learning to rank","authors":"Feng Wang, Xin Xu","doi":"10.1109/YCICT.2010.5713094","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713094","url":null,"abstract":"One crucial task of learning to rank in the field of information retrieval (IR) is to determine an ordering of documents according to their degree of relevance to the user given query. In this paper, a learning method is proposed named AdaGP-Rank by applying boosting techniques to genetic programming. This approach uses genetic programming to evolve ranking functions while a process inspired from AdaBoost technique helps the evolved ranking functions concentrate on the ranking of those documents associating those ‘hard’ queries. Based on the confidence coefficients, the ranking functions obtained at each boosting round are then combined into a final strong ranker. Experiments conform that AdaGP-Rank has general better performance than several state-of-the-art ranking algorithms on the benchmark data sets.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132535298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信