2010 Second International Conference on Future Networks最新文献

筛选
英文 中文
Study on Feature Selection and Weighting Based on Synonym Merge in Text Categorization 基于同义词合并的文本分类特征选择与加权研究
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.70
Zhenyu Lu, Yongmin Liu, Shuang Zhao, Xuebin Chen
{"title":"Study on Feature Selection and Weighting Based on Synonym Merge in Text Categorization","authors":"Zhenyu Lu, Yongmin Liu, Shuang Zhao, Xuebin Chen","doi":"10.1109/ICFN.2010.70","DOIUrl":"https://doi.org/10.1109/ICFN.2010.70","url":null,"abstract":"Feature selection and weighting is one of the key problem in text categorization. The chief obstacles to feature selection are noise and sparseness. This paper presents an approach of Chinese text feature selection and weighting based on semantic statistics. First, we use synonymous concepts to extract feature values in text based on Thesaurus which names TongYiCi CiLin. Then, we introduce a new weight function based on term frequency and entropy, which adjusts the effect of the feature term in the classifier according to the feature term’s strength. Experiments show that our method is much better than kinds of traditional feature selection methods and it improve the performance of text categorization systems.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129156150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A 10Gb/s Burst-Mode Laser Diode Driver for IEEE 802.3av 10G-EPON Applications 用于IEEE 802.3av 10G-EPON应用的10Gb/s突发模式激光二极管驱动器
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.88
Ye Lin, En Zhu, Gaowei Gu
{"title":"A 10Gb/s Burst-Mode Laser Diode Driver for IEEE 802.3av 10G-EPON Applications","authors":"Ye Lin, En Zhu, Gaowei Gu","doi":"10.1109/ICFN.2010.88","DOIUrl":"https://doi.org/10.1109/ICFN.2010.88","url":null,"abstract":"The IEEE standards board has announced the approval of the 10G-EPON standard, IEEE Std. 802.3av. In this paper, a 10Gb/s burst-mode laser diode driver for the symmetric-rate 10G-EPON ONU applications is described. It is designed with a low-cost 0.18µm CMOS process. Post-simulation results that it has a speed of 10.3125Gb/s, and is able to provide up to 35mA modulation current under a 1.8V power supply. The burst turn-on/-off delays are both less than 1ns. The dimension of the laser diode driver is 575µm × 675µm.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Wireless Network and Its Technology 无线网络及其技术研究
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.92
Ning Zhang, Hong Bao
{"title":"Research on Wireless Network and Its Technology","authors":"Ning Zhang, Hong Bao","doi":"10.1109/ICFN.2010.92","DOIUrl":"https://doi.org/10.1109/ICFN.2010.92","url":null,"abstract":"Wireless and mobile networks represent an active research and new technology development area. In this paper we analyze wireless network and discuss the applications of wireless technology. To fully support mobility, a next generation Internet must provide ways to name and route to a much richer set of network elements than just attachment points. It should support routing in terms of names, which identify the actual desired end points, rather than some particular characteristic, such as an address. A new architecture should provide data cleansing mechanisms that prevent corrupted data from propagating through the wireless network.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134345569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decision Tree Applied in Web-Based Intrusion Detection System 决策树在基于web的入侵检测系统中的应用
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.68
M. Wei, Yufang Liu, Xuebin Chen, Jianmin Li
{"title":"Decision Tree Applied in Web-Based Intrusion Detection System","authors":"M. Wei, Yufang Liu, Xuebin Chen, Jianmin Li","doi":"10.1109/ICFN.2010.68","DOIUrl":"https://doi.org/10.1109/ICFN.2010.68","url":null,"abstract":"This paper presented that intrusion detection is an effective technique to protect Web server. Misused-based intrusion detection is used to detect Web-based attacks. It went deeply into Decision Tree technique; the traditional misused-based matching method was improved by using decision tree technique and the speed of detection process has been significantly improved. Its efficiency was verified by example.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124710301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Silence Duration Based Uplink Scheduling Algorithm for Multiple VoIP Users in M-WiMAX 基于沉默时长的M-WiMAX多VoIP用户上行调度算法
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.59
Farouk Y. M. Alkadhi, Zheng Liu, Min Yang, Qiu-Hong Wang, J. Dai
{"title":"A Silence Duration Based Uplink Scheduling Algorithm for Multiple VoIP Users in M-WiMAX","authors":"Farouk Y. M. Alkadhi, Zheng Liu, Min Yang, Qiu-Hong Wang, J. Dai","doi":"10.1109/ICFN.2010.59","DOIUrl":"https://doi.org/10.1109/ICFN.2010.59","url":null,"abstract":"This paper proposes an efficient uplink scheduling algorithm that can perfectly support various VoIP CODECs with VAD/DTX/CNG in M-WiMAX considering the variants of silence duration between different voice users, solving the problems of uplink resources wastes and overwhelmingly large overhead that caused during silence period. In our proposed algorithm, efficient schemes is proposed to implement the uplink resource interval and allocation procedure, and the BS adapts this uplink resources interval according to the reserved bit in the generic MAC header of IEEE802.16e, which is utilized to indicate voice activity of each voice user . The performance analysis of the conventional algorithms (UGS, rtPS and ertPS) as well as the one proposed in this paper is also provided. Through the numerical validations, proposed algorithm performs efficiently than the conventional algorithms over enhancement of resource utilization, total throughput, and system capacity. Also, it is proved that our algorithm can support more voice users than the conventional algorithms.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127519197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy-efficient Distributed Detection in Wireless Sensor Networks 无线传感器网络中的节能分布式检测
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.24
Xuefen Zhang, Changchuan Yin, Guangxin Yue, Huarui Wu
{"title":"Energy-efficient Distributed Detection in Wireless Sensor Networks","authors":"Xuefen Zhang, Changchuan Yin, Guangxin Yue, Huarui Wu","doi":"10.1109/ICFN.2010.24","DOIUrl":"https://doi.org/10.1109/ICFN.2010.24","url":null,"abstract":"We consider energy-efficient Distributed Detection in wireless sensor networks. It is assumed that a group of sensors observe the same quantity in independent additive observation noises with possibly different variances. Each node computes a local statistic and communicates it to a fusion center over Rayleigh fading wireless channels.At the fusion,the linear minimum mean square error(LMMSE) is used. In this paper Two types of constraints are considered: 1) transmission power constraints at the nodes, and 2) the communication channel between the nodes and the decision center. we propose a optimal distributed estimation algorithm in energy-constrained wireless sensor networks. Finally, we demonstrate the applicability of our results through numerical examples.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124738600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Application of Vibration Signal Multi-fractal in Fault Diagnosis 振动信号多重分形在故障诊断中的应用
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.90
Yuan Yu, Li Baoliang, Shang Jingshan, Yao Shixuan
{"title":"The Application of Vibration Signal Multi-fractal in Fault Diagnosis","authors":"Yuan Yu, Li Baoliang, Shang Jingshan, Yao Shixuan","doi":"10.1109/ICFN.2010.90","DOIUrl":"https://doi.org/10.1109/ICFN.2010.90","url":null,"abstract":"Condition monitoring of machines through the analysis of their vibrations has been recognized to be a difficult issue, essentially because of the strong nonlinearity of the vibration signals. In this paper, vibration signal multifractal method was researched. multifractal on time-frequency domain was an energy fractal method and the signal feature extraction was based on the analysis of its energy distributing. The method analyzed signal on time-frequency domain to characterize the distributing of its frequency or energy, and the signal’s feature was extracted by fractal dimension. After the signal was changed to time-frequency domain by Hilbert-Huang transform, general dimension Dq would be calculated from the signal in time-frequency domain by least square method. In the end, examples of emulator and practical application proved that this integrated method was feasible.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124367766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Micro Secure Socket Layer for Micro Server 微服务器的微安全套接字层
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.66
Nguyen Thanh Hoa, Kensuke Naoe, Yoshiyasu Takefuji
{"title":"Micro Secure Socket Layer for Micro Server","authors":"Nguyen Thanh Hoa, Kensuke Naoe, Yoshiyasu Takefuji","doi":"10.1109/ICFN.2010.66","DOIUrl":"https://doi.org/10.1109/ICFN.2010.66","url":null,"abstract":"In this paper, we propose Micro Secure Socket Layer (MSSL) for 8-bit flash micro controller that is about 1.3 Kbytes in code size. We have analyzed and compared various cryptographic protocols in TCP/IP stack for 5$ Micro Server to propose a simple secure layer based on simple handshake processing and encryption. Additionally, we analyzed MSSL performance, compared with the current security protocols and proved that MSSL can secure the connection between Micro Server and Internet. Security implementation for Micro Server, which has very limited size of memory with a small processer, is very difficult and challenging task. Conventional researches have focused mainly on creating small sensor system and Micro Server that has multi-function with low cost and small memory size, but without much security considerations. Crackers can easily access to the sensor nodes or Micro Server. Therefore, minimum security is needed in the ubiquitous sensor networks. The proposed MSSL is very small in code size so it can be implemented and is suitable for small sensors and Micro Server systems.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126270858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Bootloader Module is Designed and Implemented Based on a New Computer Architecture 基于一种新的计算机体系结构,设计并实现了一个引导加载模块
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.13
Jie Zhang, Fengjing Shao
{"title":"A Bootloader Module is Designed and Implemented Based on a New Computer Architecture","authors":"Jie Zhang, Fengjing Shao","doi":"10.1109/ICFN.2010.13","DOIUrl":"https://doi.org/10.1109/ICFN.2010.13","url":null,"abstract":"Focusing on the architecture characteristics of the new computer architecture sCPU-dBUS with high-security, this paper designs and implements a bootloader module based on the new high-security operating system with internal networking structure netOS-I which is only used by sCPU-dBUS. The bootloader module mainly contains initializing the hardware environment of new computer architecture sCPU-dBUS; establishing the memory mapping; setting up the environment for netOS-I, and then loading and starting up netOS-I.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132002269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis and Research of Cloud Computing System Instance 云计算系统实例分析与研究
2010 Second International Conference on Future Networks Pub Date : 2010-01-22 DOI: 10.1109/ICFN.2010.60
Shufen Zhang, Shuai Zhang, Xuebin Chen, Shangzhuo Wu
{"title":"Analysis and Research of Cloud Computing System Instance","authors":"Shufen Zhang, Shuai Zhang, Xuebin Chen, Shangzhuo Wu","doi":"10.1109/ICFN.2010.60","DOIUrl":"https://doi.org/10.1109/ICFN.2010.60","url":null,"abstract":"As a kind of emerging business computational model, Cloud Computing distribute computation task on the resource pool which consists of massive computers, accordingly ,the application systems can gain the computation strength, the storage space and software service according to its demand. Cloud computing can be viewed from two different aspects. One is about the cloud infrastructure which is the building block for the up layer cloud application. The other is of course the cloud application. By means of three technical methods, cloud computing has achieved two important goals for the distributed computing: high scalability and high availability. Scalability means that the cloud infrastructure can be expanded to very large scale even to thousands of nodes. Availability means that the services are available even when quite a number of nodes fail. This paper discusses the evolution process of cloud computing, the current technologies adopted in cloud computing, as well as the systems in enterprises. This paper introduced with emphasis the Amazon Elastic Compute Cloud, the cloud computing platform of Google and \"blue cloud\" of IBM, analyze and compare three kinds of cloud computing platform.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128027284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信