{"title":"A Multicast Routing Algorithm Applied to HIP-Multicast Model","authors":"Xueyong Zhu, Zhiguo Ding, Xinling Wang","doi":"10.1109/NCIS.2011.42","DOIUrl":"https://doi.org/10.1109/NCIS.2011.42","url":null,"abstract":"Secure HIP-multicast model provides the effective mechanisms of the management, authentication and authorization to group members. But it lacks an appropriate multicast routing algorithm. Here we present a new multicast routing algorithm applied to the HIP-multicast model. The new algorithm decomposes the HIP-multicast tree into a center tree and several sub-trees, and introduces the weight of the nodes and the weight ratio of the links. The results of theory and simulation show that the new algorithm overcomes the shortcomings of traditional multicast routing algorithms and can be applied to the HIP-multicast model.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127504021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Divide-and-Conquer System Based Neural Networks for Forecasting Time Series","authors":"Suixun Guo, Rongbo Huang","doi":"10.1109/NCIS.2011.100","DOIUrl":"https://doi.org/10.1109/NCIS.2011.100","url":null,"abstract":"This paper presents a Divide-and-Conquer System based Neural Networks (DCSNN) for forecasting time series. This DCSNN is composed of several sub-RBF networks which takes each low-dimensional sub-input as its input. The output of DCSNN is the sum of each sub-RBF networks' output. The algorithm of DCRBF is given and its forecasting ability also is discussed in this paper. The experimental results have shown that the DCSNN is outperforms the conventional RBF for forecasting time series.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130092370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Precoding Method for Joint Processing in CoMP","authors":"Binbin Wang, Bingbing Li, Mingqian Liu","doi":"10.1109/NCIS.2011.33","DOIUrl":"https://doi.org/10.1109/NCIS.2011.33","url":null,"abstract":"Coordinated Multiple Point (CoMP) transmission is considered as one of candidate technologies for LTE-Advanced. CoMP improves average cell-edge user throughput as well as cell throughput and ensures the fairness of all uses. There are two categories in CoMP, Joint Processing (JP) and Coordinated Scheduling/Beam forming(CS/CB). In this paper, a novel precoding schemes based on Tomlinson-Harashima Precoding (THP) was proposed for JP. The proposed scheme aimed to minimize the error probability of the overall system by nonlinear processing and jointly ordered channels decomposition in the base stations. Simulation results show that this scheme has a significant gain over existing schemes in terms of system error rate.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128886209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Evaluation Method of Network Attack Resistance Ability","authors":"Huimei Wang, Ming Xian, Guoyu Wang","doi":"10.1109/NCIS.2011.145","DOIUrl":"https://doi.org/10.1109/NCIS.2011.145","url":null,"abstract":"Attack Resistance Testing (ART) is challenging because a system's authors have to play the double role of attackers and defenders. Evaluation of network attack resistance ability is an invaluable mechanism for ART. To objectively evaluate the attack resistance ability, we introduce the cloud theory, which realize the transform between quality and quantity. We propose the cloud evaluation model and algorithm of network attack resistance ability. The proposed model is three-fold: (1) We propose a series of network attack resistance metrics that measure the attack impact and attack cost during an attack. (2) We present the weight of evaluation metrics using 1-dimensional normal distribution clouds, which cut down the evaluation results' impressible. (3) We illustrate the algorithm of the attack resistance ability evaluation model. We successfully demonstrate that our evaluation method using cloud model is brief and effective.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121486298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Application of DWDM on Educational MAN","authors":"Jinshan Zhu, Jiangkang Guo, Yan Zhang","doi":"10.1109/NCIS.2011.97","DOIUrl":"https://doi.org/10.1109/NCIS.2011.97","url":null,"abstract":"By presenting the technical program by DWDM technology to eliminate the blind spot of connection between Ningbo MAN and CERNET, this paper mainly discusses an innovational mode of DWDM in its management and business in one of the core network of CNGI-CERNET2, Net of Things and Zhejiang Academic Digital Library(ZADL).","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122514747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Realization of a SVS Algorithm Based on STFT and NDFT","authors":"Rongxi Chen, Zhixing Luo, Yu-bin Zhong, Xueliang Luo, Yiming Gao, Guoli Zheng","doi":"10.1109/NCIS.2011.178","DOIUrl":"https://doi.org/10.1109/NCIS.2011.178","url":null,"abstract":"In this paper, a singing voice splitting (SVS) system is researched and implemented by short-time Fourier transform (STFT) and Nonuniform Discrete Fourier Transform (NDFT). Specifically, there are four processes: T-F decomposition, main pitch detection, T-F information extraction and singing synthesis. Firstly, choose STFT as T-F analysis tool. Then, use NDFT realizing main pitch detection. Next, extract various order harmonics of each frame of music signals, getting the short-time spectrum. Finally, gain singing signals from the short-time spectrum by overlap-add (OLA) algorithm. The experiment result shows that the SVS system based on STFT and NDFT can effectively split singing signals.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122655813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Semantic Web Services Query Optimization Method Based on Social Tagging","authors":"Da Ning, Jianxiao Liu, Cheng Sheng","doi":"10.1109/NCIS.2011.155","DOIUrl":"https://doi.org/10.1109/NCIS.2011.155","url":null,"abstract":"How to find web services quickly and accurately has become an urgent need. This paper presents a semantic web services query optimization method based on social tagging, under the guidance of the user behavior model for general service semantic of social tagging, a multidimensional-based social tagging method is proposed, it allows the user to tag the services from the perspectives of function attributes, non-functional attributes and contextual attributes of the services, recognizing the semantic annotation types of services, reducing the search scope and improving service query efficiency, Also FOAF(Friend of A Friend)-based social-semantic web community and social tagging ontology(STO) are established, Through the analysis of user attributes, tag attributes and service attributes and the relationship among them, the system will use the rule of ontology reasoning to find the web services to meet user demand, enhancing services searching of precision and completion. Finally, experimental analysis shows the feasibility and effectiveness of this method.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131757636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the Information Database and Retrieval System of Aircraft Development Based on CALS","authors":"Dongmei Ni, Li Wang, Guoping Xia","doi":"10.1109/NCIS.2011.118","DOIUrl":"https://doi.org/10.1109/NCIS.2011.118","url":null,"abstract":"On the basis of the analysis of the major elements and the keystone of the CALS, this paper proposed the information database and retrieval system of aircraft development based on CALS, which is divided into four parts, Client browser, Mesosphere, Heterogeneous database system and Communications layer.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126997229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sub-array Digital Multiple Beamfroming Technology on PowerPc+FPGA Architecture","authors":"Qiu-Fei Yan, Zhao-yang Xu, Zhao Yu","doi":"10.1109/NCIS.2011.190","DOIUrl":"https://doi.org/10.1109/NCIS.2011.190","url":null,"abstract":"Phased array radar is very important in modern radar development, and sub-array digital multiple beam forming technology is the most significant technology in phased array radar. Digital multiple beam forming on each antenna element about large phased array radar is impossible because it needs so many A/D channels, sub-array digital multiple beam forming method can resolve this problem. This article mainly about, 1.Sub-array digital beam forming and low side lobe methods with radar work on search mode. 2.Sub-array digital beam forming (sum beam, azimuth difference beam, elevation difference beam) and low side lobe methods with radar work on tracking mode. 3. The function implementation of sub-array digital multiple beam forming with Power Pc+FPGA architecture. In this article, when radar work on different mode, there are different low side lobe weight Methods. When radar work on search mode, the low side lobe weight is on each antenna element controlled by digital attenuator embed in T/R module, and when radar work on tracking mode the low side lobe weight is on sub-array channel with digital style. The Power Pc+FPGA architecture used for radar signal processing is pioneer in China, experiment results prove that this architecture is better than other architectures, the whole processing time is less than 1 us.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121852521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Yuan, Liang Hu, Hongtu Li, Kuo Zhao, Jiang-feng Chu, Yuyu Sun
{"title":"Key Replicating Attack on an Identity-Based Three-Party Authenticated Key Agreement Protocol","authors":"Wei Yuan, Liang Hu, Hongtu Li, Kuo Zhao, Jiang-feng Chu, Yuyu Sun","doi":"10.1109/NCIS.2011.147","DOIUrl":"https://doi.org/10.1109/NCIS.2011.147","url":null,"abstract":"In 2009, Mengbo Hou and Qiuliang Xu found the key replicating attack in the BR93 security model on a Certificateless two-party authenticated key agreement protocol proposed by Y.J Shi and J.H Li. In 2010, Marko Hölbl, Tatjana Welzer and Boštjan Brumen proposed a one-round identity-based three-party authenticated key agreement protocol using pairings called IDAK3-P1 and declared that the protocol had the attributes of known-key security, forward secrecy, key-compromise impersonation resilience, unknown key-share resilience and key control. In this paper, we make a systematic analysis on IDAK3-P1 and find it has similar structure as the Y.J Shi and J.H Li's protocol. We introduce Mengbo Hou and Qiuliang Xu's attack method in identifying the vulnerability of IDAK3-P1. Our analysis shows that the IDAK3-P1 is vulnerable to the key replicating attack in the BR model. Therefore, it doesn't possess the security attributes of implicit key authentication and key control as declared.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127566179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}