{"title":"Improved Burst Target Demand Assignment Multiple Access (BTDAMA) for GEO Satellite Networks","authors":"Xin Yuanbo, Zhou Xi, She Yang, Jiang Yuan","doi":"10.1109/NCIS.2011.133","DOIUrl":"https://doi.org/10.1109/NCIS.2011.133","url":null,"abstract":"This paper examines the relative performances of the BTDAMA (Burst Target Demand Assignment Multiple Access) schemes with different demand assignment strategies. A new satellite multiple access scheme employing hybrid demand assignment strategy (BTDAMA-HD) is proposed which combines the burst target demand assignment strategy of the BTDAMA schemes with the packets reserved demand assignment strategy of the variable rate DAMA schemes. The delay performances of BTDAMA-PD (pure demand assignment) and BTDAMA-HD were compared by computer simulation under Pareto ON/OFF traffic source. The results demonstrate that BTDAMA-HD can offer better delay and delay jitter performance over GEO satellite channel.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127114555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Color Image Blind Watermarking Algorithm Based on Chaotic Scrambling and Integer Wavelet","authors":"Wang Yongqi, Zhang Hui","doi":"10.1109/NCIS.2011.90","DOIUrl":"https://doi.org/10.1109/NCIS.2011.90","url":null,"abstract":"In the paper, a novel color image blind watermarking algorithm is proposed based on discrete chaotic map and discrete integer wavelet transform. The scrambled watermark is encrypted and embedded into the low-frequency sub-bands after four sub-images of the Y branch of original image are transformed by integer wavelet transform, and the embedded positions are determined by logistic chaotic map, this watermarking scheme can realize blind extraction. Experimental results have proved that the method is robust enough to some image process such as noising, JPEG compression and cutting.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126367414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Cell Mapping Method in Global Analysis of Fault Gear System","authors":"Wang Yangang, Zheng Hai-qi, Gu Zhenzhen, G. Feng","doi":"10.1109/NCIS.2011.167","DOIUrl":"https://doi.org/10.1109/NCIS.2011.167","url":null,"abstract":"Cell mapping method is a numerical computing technology solving the global behavior of complex nonlinear system. In this paper, the simple Cell Mapping method is used as global analysis of the dynamical behavior of nonlinear gear system under different degree of wear faults. By comparing the domains of attraction and cell of attraction under different degree of wear faults, the nonlinear system dynamic global developing rule of the gear wear fault was obtained, which offers a new method for the nonlinear gear system fault diagnosis.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126473938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Surface Interpolation Approach for Bidimensional Empirical Mode Decomposition","authors":"Cuiyun Li, Pan Han, H. Ji","doi":"10.1109/NCIS.2011.163","DOIUrl":"https://doi.org/10.1109/NCIS.2011.163","url":null,"abstract":"The surface interpolation of the scattered points is the key technology in Bidimensional Empirical Mode Decomposition (BEMD) algorithm that determines the quality of Bidimensional Intrinsic Mode Functions (BIMF). The traditional interpolation method commonly has high complexity and often results in boundary effects. A new interpolation method based on the nonparametric kernel regression (KR) with the Nadaray-Watson filter is proposed. The accuracy of the interpolation can be modified by the filter parameter, and the direction of the filter is adaptive to maintain the characteristic of the result surface. Simulation results show that the surface interpolation based on KR can reduce the complexity of the algorithm and avoid the boundary effects, improving the performance of BEMD in edge detection.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121531970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Subjective Trust Management Model Based on AHP for MANETs","authors":"Hui Xia, Zhiping Jia, Xin Li, Fengchao Zhang","doi":"10.1109/NCIS.2011.80","DOIUrl":"https://doi.org/10.1109/NCIS.2011.80","url":null,"abstract":"Due to the anonymity, self-organization and multi hops routing of nodes in MANETs (mobile ad hoc networks), a network is lack of the identification of nodes' credibility. As a result, the confidentiality and integrity of information in the dissemination process is vulnerable to attacks by malicious nodes, the interactive quality of overall networks is also easily affected. A subjective trust management model for MANETs (AHPStrust) based on Analytic Hierarchy Process is proposed in this paper, which is used to solve these questions, for example, to quantify and evaluate the trustworthiness of nodes, to enhance the networks' ability of trust management decisions and to reduce the harm of malicious nodes. In this paper, we propose the trust evaluation mechanism with detailed influencing factors, and use AHP to successfully construct a fully trust hierarchical model with corresponding mathematical description and derivation rules. Analysis and simulation results show that our model (AHPStrust) is more effective than the existing model (CFStrust) along with 10% proportion of malicious nodes in the network, the satisfactory interaction rate increases by 5%, the proportion of good recommendation increases by 4%, the correct identification rate of nodes' properties increases by 6%.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124425852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detector Generation Algorithm Based on Online GA for Anomaly Detection","authors":"Chen Jinyin, Yang Dongyong","doi":"10.1109/NCIS.2011.125","DOIUrl":"https://doi.org/10.1109/NCIS.2011.125","url":null,"abstract":"T Detector plays an important role in intrusion detection system in artificial immune system, which makes detector generation algorithm especially significant. Traditional NSA cannot satisfy current network demands because the affinity limit r is difficult to fix in prior. A novel online GA-based algorithm is come up with self-adaptive mutation probability, in which affinity limit r is self-adaptive. Compared with GA-based detector maturation algorithm, detectors in online GA-based algorithm evolve online during the detection process which realizes self-organization and online learning to be adaptive to dynamic network. Finally simulation results testify that TP (true positive) value and FP (false positive) value of online GA-based algorithm is much better than NSA, GA-based and IGA-based algorithms without significant algorithm complexity increase.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127427098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dynamic Access Control Scheme for Outsourced Database","authors":"Xiaoming Wang, Yanhui Zhang","doi":"10.1109/NCIS.2011.9","DOIUrl":"https://doi.org/10.1109/NCIS.2011.9","url":null,"abstract":"A dynamic access control scheme is proposed for Outsourced Database. In proposed scheme, we employ polynomial function and double decryption as the basic means of constructing dynamic access control procedure in order to avoid the need for public key cryptography and reduce shortage overhead. The proposed scheme is transparent to user when the users are added and removed since they are not involved in the process. Moreover, there is no-interaction between database owner and server, server and user as well as database owner and user. The analysis of security and performance shows that the proposed scheme cannot only protect outsource database, but also can easily and efficiently add new users and revoke users. Therefore, it is more efficient and more practical scheme for outsourced database.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132660989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method on Personalized Privacy Preserving Multi-classification","authors":"Yan Fu, Chongjing Sun, Junlin Zhou, Yuke Fang","doi":"10.1109/NCIS.2011.59","DOIUrl":"https://doi.org/10.1109/NCIS.2011.59","url":null,"abstract":"Privacy-preserving data mining has become important since data mining has been widely used in many fields. Various privacy preserving techniques have been proposed to preserve the sensitive data. In this paper, we address two algorithms which can build classifiers accurately with less privacy disclosure in distributed system. These schemes can satisfy the different privacy disclosure level need of every client, which can meet clients' personalized needs. Besides this, our methods can be used for multi-classification.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133783186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Pulse Design Method for the Compatibility of UWB and IEEE 802.11a WLAN Systems","authors":"Xiao-jing Shi","doi":"10.1109/NCIS.2011.34","DOIUrl":"https://doi.org/10.1109/NCIS.2011.34","url":null,"abstract":"The spectrum compatibility of UWB and IEEE 802.11a WLAN systems is investigated in this paper. A UWB pulse designed method is developed based on the cognitive radio technology and Parks-McClellan algorithm. Under the three-dimensional interference model, the interference performance of UWB on WLAN is analyzed and simulated. The simulation results show that the pulse spectrum not only satisfies the requirement of FCC mask but also avoids WLAN system. The comparison of bit error rate performance is presented by using the proposed pulses and the fifth-order derivative Gaussian pulse to the time hopping UWB system in the additive white Gaussian noise channel. And the proposed pulse has better bit error rate performance than the fifth-order derivative Gaussian pulse.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131230578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guang-Jun Zhang, Jue Wang, H. Yao, Xiang-Bo Wang, Jianxue Xu
{"title":"Coherence Resonance of Excitable Chaotic Spiking Hindmarsh-Rose Neuron Model","authors":"Guang-Jun Zhang, Jue Wang, H. Yao, Xiang-Bo Wang, Jianxue Xu","doi":"10.1109/NCIS.2011.106","DOIUrl":"https://doi.org/10.1109/NCIS.2011.106","url":null,"abstract":"In contrast to the previous researches on coherence resonance (CR), which have dealt with CR of periodic spiking neuron model, in this paper the characteristic of CR of chaotic neuron model, is researched. Whether CR of chaotic excitable neuron model can occur typically is of particular importance in neurophysiology, where CR is positive effect on transmission of neural information because noise can make the unordered chaotic spiking series of neurons more ordered. Here we show, based on a physical analysis and numerical evidence, that CR in the chaotic region of system bifurcation parameter can occur in the Hind marsh-Rose (HR) neuron model. Different from the previous results about CR that the occurrence and characterisitc of CR are dependent on the distance between the bifurcation point and bifurcation parameter, the occurrence and characterisitc of CR in this case are independent on the value of bifurcation parameter. CR in this case, which is relevant to an experimental phenomenon observed in neural electro physiology experiment, can be expected to occur commonly in other chaotic spiking neuron model.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133773938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}