2012 Proceedings of IEEE Southeastcon最新文献

筛选
英文 中文
DDoS and other anomalous web traffic behavior in selected countries 在选定国家/地区的DDoS和其他异常网络流量行为
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6197004
K. B. Banks, J. Blackstone, S. Perry, W. Patterson, Patricio Gonzalez des Valle, S. Mujica, C. Aedo, A. Sánchez, J. P. M. Andrade, J. A. R. Stuardo
{"title":"DDoS and other anomalous web traffic behavior in selected countries","authors":"K. B. Banks, J. Blackstone, S. Perry, W. Patterson, Patricio Gonzalez des Valle, S. Mujica, C. Aedo, A. Sánchez, J. P. M. Andrade, J. A. R. Stuardo","doi":"10.1109/SECON.2012.6197004","DOIUrl":"https://doi.org/10.1109/SECON.2012.6197004","url":null,"abstract":"Distributed Denial of Service attacks (DDoS) are coordinated efforts, by human or machine, to overwhelm web sites, and at a minimum, to cause them to shut down. Increasingly, the use of this type of malicious software has grown exponentially in the past decade, and despite considerable research, it has proven very difficult to identify, detect or prevent such attacks. Our current research attempts to analyze the frequency of such attacks in a variety of countries, and to develop an index to identify countries which may have the greatest risk of DDoS attacks.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128196267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparison of routing and network coding in undirected network group communications 无向网络组通信中路由与网络编码的比较
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196916
Yangyang Xu, I. Butun, R. Sankar, N. Sapankevych, J. Crain
{"title":"Comparison of routing and network coding in undirected network group communications","authors":"Yangyang Xu, I. Butun, R. Sankar, N. Sapankevych, J. Crain","doi":"10.1109/SECON.2012.6196916","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196916","url":null,"abstract":"Traditional method of solving group communications problem is by placing a super source with unlimited bandwidth to all sources. In this paper, we show that this method cannot guarantee the fairness within different sources for routing. Also in certain scenarios, the method can lead to wrong conclusion of network achieving higher throughput than it can actually deliver. Two algorithms are presented, one for routing and one for network coding to guarantee that each source has the same fairness and get the sub-optimal throughput for group communications in undirected networks. The throughputs achieved using either of these algorithms (one for routing only and one for network coding) are much better than any current widely-used IP multicast protocols. Between the two proposed algorithms, the algorithm for network coding can have throughput benefit in some scenarios but not always. Here, we show through simulation that network coding does not have constant throughput benefit in undirected networks in group communications scenario with the consideration of fairness within different sources.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127861867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Conduction in metallic core/shell nanoclusters 金属核/壳纳米团簇中的传导
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196990
G. Moorthy, K. Daneshvar
{"title":"Conduction in metallic core/shell nanoclusters","authors":"G. Moorthy, K. Daneshvar","doi":"10.1109/SECON.2012.6196990","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196990","url":null,"abstract":"The conducting properties of core/shell nanoclusters of two different materials - one with a metal core/semiconductor shell, and the other with a metal core/insulator shell have been investigated. Experiments carried out for the two samples under the same conditions demonstrate distinct variations in the conducting properties of both. At increasing temperatures, the metal/semiconductor core/shell sample exhibits a sharp increase in conductivity at certain threshold temperatures, as opposed to the metal/insulator structure sample that displays a gradual, almost exponential increase in conductivity. These results have been discussed in terms of standard models.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127898813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relevance feature selection with data cleaning for intrusion detection system 基于数据清洗的入侵检测系统关联特征选择
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196965
S. Suthaharan, T. Panchagnula
{"title":"Relevance feature selection with data cleaning for intrusion detection system","authors":"S. Suthaharan, T. Panchagnula","doi":"10.1109/SECON.2012.6196965","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196965","url":null,"abstract":"Labeled datasets play a major role in the process of validating and evaluating machine learning techniques in intrusion detection systems. In order to obtain good accuracy in the evaluation, very large datasets should be considered. Intrusion traffic and normal traffic are in general dependent on a large number of network characteristics called features. However not all of these features contribute to the traffic characteristics. Therefore, eliminating the non-contributing features from the datasets, to facilitate speed and accuracy to the evaluation of machine learning techniques, becomes an important requirement. In this paper we suggest an approach which analyzes the intrusion datasets, evaluates the features for its relevance to a specific attack, determines the level of contribution of feature, and eliminates it from the dataset automatically. We adopt the Rough Set Theory (RST) based approach and select relevance features using multidimensional scatter-plot automatically. A pair-wise feature selection process is adopted to simplify. In our previous research we used KDD'99 dataset and validated the RST based approach. There are lots of redundant data entries in KDD'99 and thus the machine learning techniques are biased towards most occurring events. This property leads the algorithms to ignore less frequent events which can be more harmful than most occurring events. False positives are another important drawback in KDD'99 dataset. In this paper, we adopt NSL-KDD dataset (an improved version of KDD'99 dataset) and validate the automated RST based approach. The approach presented in this paper leads to a selection of most relevance features and we expect that the intrusion detection research using KDD'99-based datasets will benefit from the good understanding of network features and their influences to attacks.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126684213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Real time reduction of HVAC noise using a FPGA 利用FPGA实时降低暖通空调噪声
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196893
P. Kasbekar, A. Wisler, I. Panahi
{"title":"Real time reduction of HVAC noise using a FPGA","authors":"P. Kasbekar, A. Wisler, I. Panahi","doi":"10.1109/SECON.2012.6196893","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196893","url":null,"abstract":"An important application of Active Noise Control (ANC) is to reduce noise produced by machinery in modern living places. We present an ANC system that is designed to cancel narrowband noise generated from the compressor of an HVAC (Heating, Ventilation, and Air-Conditioning) system in real time. To achieve cost effectiveness of the system, we propose a single-channel Feedback ANC implementation, which uses only a single speaker and a single microphone. The ANC algorithm is implemented on a NI 7833R Reconfigurable I/O (RIO) FPGA board. A leakage factor is required to ensure stability of the system because of the inherent quantization error in fixed-point implementation of ANC algorithms. To alleviate the effect of quantization error, the fixed-point length is increased from 24 bits to 32 bits, to improve the performance. By correctly choosing the leakage factor, the Leaky Feedback ANC implementation allows for stable reduction of the HVAC compressor noise ranging from 4.59 to 10.73 decibels (dB).","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116384029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Low cost semi-autonomous sentry robot 低成本半自动哨兵机器人
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196937
Sam Shue, C. Hargrove, J. Conrad
{"title":"Low cost semi-autonomous sentry robot","authors":"Sam Shue, C. Hargrove, J. Conrad","doi":"10.1109/SECON.2012.6196937","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196937","url":null,"abstract":"This paper describes the planning, design, and implementation of a low cost, semi-autonomous sentry robot (Turret). The robot has an automatic nerf gun mounted on the top of an all-terrain mobile platform. The sensors used for target tracking are low cost infrared proximity sensors. The robot can be set into an autonomous sentry mode, in which it can track targets and fire at them automatically, or a controlled mode, for driving the turret to a new location. This design uses much more cost effective and readily available hardware and materials, and also provides an improved tracking mechanism.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115508167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Adaptive neural network control system of path following for AUVs 水下机器人路径跟踪自适应神经网络控制系统
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196982
X. Bian, Jiajia Zhou, Zheping Yan, Heming Jia
{"title":"Adaptive neural network control system of path following for AUVs","authors":"X. Bian, Jiajia Zhou, Zheping Yan, Heming Jia","doi":"10.1109/SECON.2012.6196982","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196982","url":null,"abstract":"The path following control problem of autonomous underwater vehicles is addressed in this paper. In order to deal with the parameter variations and uncertainties due to time-varying hydrodynamic damps, the radial basis function neural network (RBF NN) is introduced to estimate unknown terms where an adaptive law is chosen to guarantee optimal estimation of the weight of NN. Based on the Lyapunov stability theorem, an adaptive NN controller is designed to guarantee all the error states in the path following system are asymptotically stable. In order to deal with the estimation error and current disturbance, a virtual control input is introduced to ensure that the error system, including position error and heading error, can be converged to zero. On other hand, the arc with an appropriate radius is specified for each waypoint to guarantee a high accuracy when the vehicle maintains a nominal constant speed. Two path profiles, one with straight lines, and the other with straight-line and arcs were used to evaluate the performance of the path following controller. Simulation results demonstrated that the proposed controller was effective to eliminate the disturbances caused by vehicle's nonlinear and model uncertainty.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129553861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Reliability and effectiveness of cable types used in technical telecommunications systems 技术电信系统中使用的电缆类型的可靠性和有效性
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196960
I. Kateeb, M. S. Peluso, M. Bikdash, P. Chopade
{"title":"Reliability and effectiveness of cable types used in technical telecommunications systems","authors":"I. Kateeb, M. S. Peluso, M. Bikdash, P. Chopade","doi":"10.1109/SECON.2012.6196960","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196960","url":null,"abstract":"The fundamental building block of the Telecommunications industry is the cabling systems underpinning the networks. Over the years we have seen tremendous change in the reliability and effectiveness of this core component of the network. This paper will provide a survey and discussion of the uses of the primary types of cabling in broad deployment in our networks. It will examine how different cabling types can be used in WAN networks. It will explore the effectiveness of reprovisioning cable designed for single service applications to multi-service broadband networks. It will also review the current economic models relating to cable deployments. Finally predictions will be made on the future of WAN deployments.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130161844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative study of high voltage IGBTs with enhanced conductivity modulation 增强电导率调制的高压igbt的比较研究
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196955
K. Padmanabhan, P. Shea, Z. Shen
{"title":"Comparative study of high voltage IGBTs with enhanced conductivity modulation","authors":"K. Padmanabhan, P. Shea, Z. Shen","doi":"10.1109/SECON.2012.6196955","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196955","url":null,"abstract":"A new device structure for enhancing conductivity modulation in the Insulated Gate Bipolar Transistor (IGBT) is numerically studied. An N-type hole barrier layer and a deep P+ plug emitter tie are added to the conventional IGBT structure. It is observed that the addition of the P+ plug alone results in a reduction in switching power losses and no change in VCE(sat), however the avalanche breakdown voltage (BV) and short circuit ruggedness of the device are improved. A further 0.4 V improvement in VCE(sat) is observed when the P+ plug is implemented in conjunction with an N hole barrier. This is accomplished without the usual degradation of BV and ruggedness normally associated with other N hole barrier structures. The design space of the new IGBT structure is thoroughly characterized using 2-D TCAD simulation.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124461049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A packet loss tolerant algorithm for information hiding in voice over IP IP语音信息隐藏的丢包容忍算法
2012 Proceedings of IEEE Southeastcon Pub Date : 2012-03-15 DOI: 10.1109/SECON.2012.6196945
H. Neal, H. ElAarag
{"title":"A packet loss tolerant algorithm for information hiding in voice over IP","authors":"H. Neal, H. ElAarag","doi":"10.1109/SECON.2012.6196945","DOIUrl":"https://doi.org/10.1109/SECON.2012.6196945","url":null,"abstract":"Steganography is the science of hiding information in such a way that an adversary wouldn't know it existed. As a result of research in this field, there are now many practical steganography tools for mediums that aren't processed in real time. However, research on real time mediums, for example Voice over Internet Protocol (VoIP), isn't as mature. While significant and ever-improving research has been done towards increasing throughput and decreasing signs of tampering in VoIP steganography, some research lacks important considerations that hinder development of practical tools. In this paper, we propose an algorithm that enables data hiding in G.711, the most commonly used voice codec for VoIP devices, while gracefully handling packet loss. We use important performance metrics to evaluate our algorithm, namely, throughput, noise-to-signal ratio and the Perceptual Evaluation of Speech Quality algorithm. We demonstrate that our algorithm performs well compared to other algorithms proposed in the literature in real world environments where packet loss is inevitable, by maintaining high throughput and good speech quality.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信