2007 International Conference on Information and Communication Technology最新文献

筛选
英文 中文
Predicting Number of Attackers Using Regression Anlaysis 利用回归分析预测攻击者数量
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375402
Krishan Kumar, R. Joshi, K. Singh
{"title":"Predicting Number of Attackers Using Regression Anlaysis","authors":"Krishan Kumar, R. Joshi, K. Singh","doi":"10.1109/ICICT.2007.375402","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375402","url":null,"abstract":"Anomaly based DDoS detection involves deviation from thresholds set in normal condition. This deviation can be used for estimating number of attackers. We use ns-2 as simulation test bed for launching DDoS attacks using well known DDoS attack tools with varied number of attackers. A new relationship is established between estimated number of attackers and drift from normal value using Regression. Error in relationship is graphically depicted by highlighting number of false positives/negatives. An Internet type topology is used to test our scheme.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121010468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Extended Algorithm to Enhance the Performance of the Current NAPT 一种提高当前NAPT性能的扩展算法
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375401
M. S. Ferdous, F. Chowdhury, J. Acharjee
{"title":"An Extended Algorithm to Enhance the Performance of the Current NAPT","authors":"M. S. Ferdous, F. Chowdhury, J. Acharjee","doi":"10.1109/ICICT.2007.375401","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375401","url":null,"abstract":"In this paper, we present an enhanced version algorithm for Network Address Port Translation (NAPT) flavor of Traditional Network Address Translation (NAT). Current version algorithm of NAPT allows mapping of tuples of the type (Local Source IP addresses, Source TU port number) to tuples of the type (registered NAT router IP address, assigned TU port number). But our proposed enhanced algorithm utilizes not only Local Source IP address and Source Port number but also global Destination IP address (True IP) and Destination port number. This proposed algorithm slightly improves the efficiency of the current NAPT and reduces one of the constraints of the current NAPT.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127993716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Effect of Timing Synchronization Error on the Bit Error Rate Performance of an OFDM System 定时同步误差对OFDM系统误码率性能的影响
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375381
M. Harun-Owr-Roshid, S. Majumder
{"title":"Effect of Timing Synchronization Error on the Bit Error Rate Performance of an OFDM System","authors":"M. Harun-Owr-Roshid, S. Majumder","doi":"10.1109/ICICT.2007.375381","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375381","url":null,"abstract":"Performance of an orthogonal frequency division multiplexing (OFDM) transmission system is evaluated analytically taking into considerations the combined influence of receiver noise, Rayleigh fading and the timing error due to imperfect slot synchronization at the receiver. Performance results are presented in terms of bit error rate (BER) at a bit rate of 100 kbps in the presence of inter-channel interference (ICI) and intersymbol interference (ISI) and additive white Gaussian channel noise. The power penalty suffered by the system due to above system imperfections is also determined at a BER of 10-6. The results show that there is a significant degradation in system BER due to timing error. The computed results show that the penalty suffered by the system only due to timing synchronization error is about 2.0 dB corresponding to timing bit errors to the right of m = 10 and is 5.25 dB for m = 14.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126450902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Secure Quantization-Based Watermarking Scheme Using An Improved Statistical Model in the Wavelet Domain 基于改进小波域统计模型的安全量化水印方案
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375385
S. Rezazadeh, A. Rafiei
{"title":"A Secure Quantization-Based Watermarking Scheme Using An Improved Statistical Model in the Wavelet Domain","authors":"S. Rezazadeh, A. Rafiei","doi":"10.1109/ICICT.2007.375385","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375385","url":null,"abstract":"In this paper, we have proposed a secure semi-fragile watermarking technique for content authentication of digital images. A binary image is encrypted in an efficient way and then embedded as the watermark for tamper detection. The watermark is embedded by applying a quantization index modulation process on Euclidean norm of singular values of blocks in the wavelet domain. To avoid visual degradation of watermarked image, we have enhanced a model to take into consideration blocks statistics of the host image. Experimental results are presented for well known images to demonstrate effectiveness of our method.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132821860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Planar Tree Transformation through Flips 平面树通过翻转变换
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375332
M. Kamrul Islam, S. Haque
{"title":"Planar Tree Transformation through Flips","authors":"M. Kamrul Islam, S. Haque","doi":"10.1109/ICICT.2007.375332","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375332","url":null,"abstract":"A flip or edge-replacement is considered as a transformation by which one edge e of a geometric object is removed and an edge f (f ne e) is inserted such that the resulting object belongs to the same class as the original object. Here, we consider planar trees as geometric objects. In this paper, we present a technique for transforming a given planar tree into another one for a set S of n points in general position in the plane. We show that any planar tree can be transformed into another planar tree by at most 2n-k-s-2 (0(n)) flips (k > 0 and s > 0 are defined later) which is an improvement of the result in [3].","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133652458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Three Level Broker Framework for Global Service - Oriented Utility Grid 面向全球服务的公用事业网格的三级代理框架
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375372
K. Narmadha, S. Selvi
{"title":"A Three Level Broker Framework for Global Service - Oriented Utility Grid","authors":"K. Narmadha, S. Selvi","doi":"10.1109/ICICT.2007.375372","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375372","url":null,"abstract":"The topology of brokers is very important in a global service-oriented utility grid for serving both the users' and service providers' interests. A three level broker framework is proposed in this paper in which the brokers are not bound to any particular domain. Hence the users and service providers are free to choose the broker they wish. The framework is designed in such a way that the brokers are organized into three levels. A Level 1(L1) broker is assisted by many Level 2(L2) brokers and a L2 broker may be assisted by many Level 3(L3) brokers. Users interact with LI brokers only. L2 brokers are classified according to the type of resources. L3 brokers are classified based on the resources under a L2 broker. A L1 broker contacts L2 brokers, which in turn may contact L3 brokers for selecting the requested resources.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125204191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bit Error Rate and Crosstalk Performance in Optical Cross Connect without Wavelength Converter 无波长转换器光交叉连接中的误码率和串扰性能
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375379
Ngee Thiam Sim, S. Majumder, M.S. Islam
{"title":"Bit Error Rate and Crosstalk Performance in Optical Cross Connect without Wavelength Converter","authors":"Ngee Thiam Sim, S. Majumder, M.S. Islam","doi":"10.1109/ICICT.2007.375379","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375379","url":null,"abstract":"Aa analytical approach is presented for modeling crosstalk and to evaluate the bit error rate (BER) performance in a wavelength division-multiplexing (WDM) network for link with optical cross connect (OXC) without wavelength converter. Factors that affect the magnitude of crosstalk in the OXC are investigated and parameters that play important role in determining magnitude of crosstalk and BER are identified. The effects of OXC induced crosstalk on the BER performance is evaluated at a bit rate of 10 Gb/s by optimizing different parameters.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130778179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Publications and Domain Knowledge to Build Research Profiles: An Application in Automatic Reviewer Assignment 使用出版物和领域知识来建立研究概况:在自动审稿人分配中的应用
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375347
H. Biswas, M. Hasan
{"title":"Using Publications and Domain Knowledge to Build Research Profiles: An Application in Automatic Reviewer Assignment","authors":"H. Biswas, M. Hasan","doi":"10.1109/ICICT.2007.375347","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375347","url":null,"abstract":"Peer-review has been a common practice for quality control in scholarly publications for decades. The ubiquity of the Internet and, subsequently, the availability of easy-to-use Web-based systems (both free and commercial) has made the peer-review process fast, cost-effective and convenient. In a typical scenario, authors upload papers online and manually assign topic-areas; reviewers also sign up by letting the system know about their area of expertise. A rudimentary Paper-Reviewer matching is usually performed by the system and validated by the Program-Chair (for conferences) or by the Editor-in-Chief (for journals). As argued in relevant literature, the peer-review process suffers from several flaws including author's or reviewer's bias in choosing topic-areas and expertise, as well as inter-reviewer agreement, etc. In this research, we explore automatic reviewer assignment for papers by solely considering the content of the papers and the true profile of the reviewers. In this research, we experimented with three approaches to calculate paper-reviewer relevance using the Vector Space Model. We used a set of 10 papers, 30 reviewers and the real paper-reviewer assignment information from a real-conference; and justifed the result of automatic paper-reviewer assignment based on the above three approaches. We noticed that the overlap between real-assignment and automatic-assignment is poor (with only 55-66% of the reviewers being in common). Such a result was not surprising to us, since we are aware that reviewers often express their frustrations claiming that some papers assigned them are not in line with their preferences and expertise. The data-set we used was rather small and suffered from data-sparseness problem and therefore we tried to analyze the automatic-assignment rationales through unbiased human judgment to identify the effect of the above-mentioned approaches in automatic reviewer assignment. We concluded that combining domain-knowledge with automatically extracted keywords (i.e., ontology-driven topic inference using automatically-extracted keywords) could potentially identify the most relevant candidate-reviewers for a paper.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134488207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Development and Performance Analysis of An Adaptive and Scalable Image Compression Scheme with Wavelets 基于小波的自适应可伸缩图像压缩方案的开发与性能分析
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375387
K. H. Talukder, K. Harada
{"title":"Development and Performance Analysis of An Adaptive and Scalable Image Compression Scheme with Wavelets","authors":"K. H. Talukder, K. Harada","doi":"10.1109/ICICT.2007.375387","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375387","url":null,"abstract":"This paper presents an enhanced 2D wavelet based gray scale still image compression scheme and its performance analysis and evaluation over other system. The 2D image compression and reconstruction methods based on the Haar wavelet are developed with some enhanced features. Some of the principal factors used for the evaluation of the new adaptive system include the compression ratio, the peak signal to noise ratio (PSNR), the number of wavelet decomposition, different thresholding techniques etc. The perception based subjective (mean opinion score (MOS)) and objective (picture quality scale (PQS)) evaluation methods are also applied and their effectiveness is evaluated. The extent to which the quality of the image is degraded by wavelet compression and decompression methods is analysed. The arguments of the usefulness of wavelet transformation for image compression over today's method are presented based on the experimental results obtained.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134579485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Combined CDMA-SDMA Performance Analysis and Code Assignment Algorithm CDMA-SDMA组合性能分析与编码分配算法
2007 International Conference on Information and Communication Technology Pub Date : 2007-03-07 DOI: 10.1109/ICICT.2007.375378
N. Odeh, S. Khatun, B. Ali, A. Ismail
{"title":"Combined CDMA-SDMA Performance Analysis and Code Assignment Algorithm","authors":"N. Odeh, S. Khatun, B. Ali, A. Ismail","doi":"10.1109/ICICT.2007.375378","DOIUrl":"https://doi.org/10.1109/ICICT.2007.375378","url":null,"abstract":"This paper present a novel performance enhancement for combined code division multiple access (CDMA) and space division multiple access (SDMA) scheme using SDMA grouping on top of code and spatial signatures. This paper is divided into two parts. In the first part, the system performance of combined CDMA-SDMA scheme is evaluated under Additive White Gaussian Noise (AWGN) channel for a single sectored cell. A fixed number of available codes L kept in a central pool can be utilized by K users, where, K>L. The same code can be assigned to a group of users according to their angle of arrival (which is known as SDMA group). Here, the analytical model of bit error rate (BER) for any arbitrary number of users has been derived and evaluated. In the second part of this paper, a simple code assignment algorithm is proposed to assign a already used code to a new user by which, the orthogonality between users can be maximized. The results show that the system capacity is noticeably improved with the combined system compared to the pure CDMA system. Further enhancement can be obtained when SDMA grouping is considered with orthogonal code assignment to users those belongs to different SDMA groups. Finally, the code assignment algorithm shows that high number of users can be accommodated by a fixed small number of codes.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133766233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信