2011 International Conference on Network Computing and Information Security最新文献

筛选
英文 中文
Improved Burst Target Demand Assignment Multiple Access (BTDAMA) for GEO Satellite Networks 地球同步轨道卫星网络的改进突发目标需求分配多址(BTDAMA)
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.133
Xin Yuanbo, Zhou Xi, She Yang, Jiang Yuan
{"title":"Improved Burst Target Demand Assignment Multiple Access (BTDAMA) for GEO Satellite Networks","authors":"Xin Yuanbo, Zhou Xi, She Yang, Jiang Yuan","doi":"10.1109/NCIS.2011.133","DOIUrl":"https://doi.org/10.1109/NCIS.2011.133","url":null,"abstract":"This paper examines the relative performances of the BTDAMA (Burst Target Demand Assignment Multiple Access) schemes with different demand assignment strategies. A new satellite multiple access scheme employing hybrid demand assignment strategy (BTDAMA-HD) is proposed which combines the burst target demand assignment strategy of the BTDAMA schemes with the packets reserved demand assignment strategy of the variable rate DAMA schemes. The delay performances of BTDAMA-PD (pure demand assignment) and BTDAMA-HD were compared by computer simulation under Pareto ON/OFF traffic source. The results demonstrate that BTDAMA-HD can offer better delay and delay jitter performance over GEO satellite channel.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127114555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Color Image Blind Watermarking Algorithm Based on Chaotic Scrambling and Integer Wavelet 基于混沌置乱和整数小波的彩色图像盲水印算法
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.90
Wang Yongqi, Zhang Hui
{"title":"A Color Image Blind Watermarking Algorithm Based on Chaotic Scrambling and Integer Wavelet","authors":"Wang Yongqi, Zhang Hui","doi":"10.1109/NCIS.2011.90","DOIUrl":"https://doi.org/10.1109/NCIS.2011.90","url":null,"abstract":"In the paper, a novel color image blind watermarking algorithm is proposed based on discrete chaotic map and discrete integer wavelet transform. The scrambled watermark is encrypted and embedded into the low-frequency sub-bands after four sub-images of the Y branch of original image are transformed by integer wavelet transform, and the embedded positions are determined by logistic chaotic map, this watermarking scheme can realize blind extraction. Experimental results have proved that the method is robust enough to some image process such as noising, JPEG compression and cutting.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126367414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of Cell Mapping Method in Global Analysis of Fault Gear System 单元映射法在故障齿轮系统全局分析中的应用
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.167
Wang Yangang, Zheng Hai-qi, Gu Zhenzhen, G. Feng
{"title":"Application of Cell Mapping Method in Global Analysis of Fault Gear System","authors":"Wang Yangang, Zheng Hai-qi, Gu Zhenzhen, G. Feng","doi":"10.1109/NCIS.2011.167","DOIUrl":"https://doi.org/10.1109/NCIS.2011.167","url":null,"abstract":"Cell mapping method is a numerical computing technology solving the global behavior of complex nonlinear system. In this paper, the simple Cell Mapping method is used as global analysis of the dynamical behavior of nonlinear gear system under different degree of wear faults. By comparing the domains of attraction and cell of attraction under different degree of wear faults, the nonlinear system dynamic global developing rule of the gear wear fault was obtained, which offers a new method for the nonlinear gear system fault diagnosis.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126473938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Surface Interpolation Approach for Bidimensional Empirical Mode Decomposition 一种新的二维经验模态分解曲面插值方法
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.163
Cuiyun Li, Pan Han, H. Ji
{"title":"A Novel Surface Interpolation Approach for Bidimensional Empirical Mode Decomposition","authors":"Cuiyun Li, Pan Han, H. Ji","doi":"10.1109/NCIS.2011.163","DOIUrl":"https://doi.org/10.1109/NCIS.2011.163","url":null,"abstract":"The surface interpolation of the scattered points is the key technology in Bidimensional Empirical Mode Decomposition (BEMD) algorithm that determines the quality of Bidimensional Intrinsic Mode Functions (BIMF). The traditional interpolation method commonly has high complexity and often results in boundary effects. A new interpolation method based on the nonparametric kernel regression (KR) with the Nadaray-Watson filter is proposed. The accuracy of the interpolation can be modified by the filter parameter, and the direction of the filter is adaptive to maintain the characteristic of the result surface. Simulation results show that the surface interpolation based on KR can reduce the complexity of the algorithm and avoid the boundary effects, improving the performance of BEMD in edge detection.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121531970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Subjective Trust Management Model Based on AHP for MANETs 基于AHP的主观信任管理模型
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.80
Hui Xia, Zhiping Jia, Xin Li, Fengchao Zhang
{"title":"A Subjective Trust Management Model Based on AHP for MANETs","authors":"Hui Xia, Zhiping Jia, Xin Li, Fengchao Zhang","doi":"10.1109/NCIS.2011.80","DOIUrl":"https://doi.org/10.1109/NCIS.2011.80","url":null,"abstract":"Due to the anonymity, self-organization and multi hops routing of nodes in MANETs (mobile ad hoc networks), a network is lack of the identification of nodes' credibility. As a result, the confidentiality and integrity of information in the dissemination process is vulnerable to attacks by malicious nodes, the interactive quality of overall networks is also easily affected. A subjective trust management model for MANETs (AHPStrust) based on Analytic Hierarchy Process is proposed in this paper, which is used to solve these questions, for example, to quantify and evaluate the trustworthiness of nodes, to enhance the networks' ability of trust management decisions and to reduce the harm of malicious nodes. In this paper, we propose the trust evaluation mechanism with detailed influencing factors, and use AHP to successfully construct a fully trust hierarchical model with corresponding mathematical description and derivation rules. Analysis and simulation results show that our model (AHPStrust) is more effective than the existing model (CFStrust) along with 10% proportion of malicious nodes in the network, the satisfactory interaction rate increases by 5%, the proportion of good recommendation increases by 4%, the correct identification rate of nodes' properties increases by 6%.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124425852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detector Generation Algorithm Based on Online GA for Anomaly Detection 基于在线遗传算法的异常检测检测器生成算法
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.125
Chen Jinyin, Yang Dongyong
{"title":"Detector Generation Algorithm Based on Online GA for Anomaly Detection","authors":"Chen Jinyin, Yang Dongyong","doi":"10.1109/NCIS.2011.125","DOIUrl":"https://doi.org/10.1109/NCIS.2011.125","url":null,"abstract":"T Detector plays an important role in intrusion detection system in artificial immune system, which makes detector generation algorithm especially significant. Traditional NSA cannot satisfy current network demands because the affinity limit r is difficult to fix in prior. A novel online GA-based algorithm is come up with self-adaptive mutation probability, in which affinity limit r is self-adaptive. Compared with GA-based detector maturation algorithm, detectors in online GA-based algorithm evolve online during the detection process which realizes self-organization and online learning to be adaptive to dynamic network. Finally simulation results testify that TP (true positive) value and FP (false positive) value of online GA-based algorithm is much better than NSA, GA-based and IGA-based algorithms without significant algorithm complexity increase.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127427098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Dynamic Access Control Scheme for Outsourced Database 外包数据库的动态访问控制方案
Xiaoming Wang, Yanhui Zhang
{"title":"A Dynamic Access Control Scheme for Outsourced Database","authors":"Xiaoming Wang, Yanhui Zhang","doi":"10.1109/NCIS.2011.9","DOIUrl":"https://doi.org/10.1109/NCIS.2011.9","url":null,"abstract":"A dynamic access control scheme is proposed for Outsourced Database. In proposed scheme, we employ polynomial function and double decryption as the basic means of constructing dynamic access control procedure in order to avoid the need for public key cryptography and reduce shortage overhead. The proposed scheme is transparent to user when the users are added and removed since they are not involved in the process. Moreover, there is no-interaction between database owner and server, server and user as well as database owner and user. The analysis of security and performance shows that the proposed scheme cannot only protect outsource database, but also can easily and efficiently add new users and revoke users. Therefore, it is more efficient and more practical scheme for outsourced database.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132660989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Method on Personalized Privacy Preserving Multi-classification 一种个性化隐私保护多分类新方法
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.59
Yan Fu, Chongjing Sun, Junlin Zhou, Yuke Fang
{"title":"A New Method on Personalized Privacy Preserving Multi-classification","authors":"Yan Fu, Chongjing Sun, Junlin Zhou, Yuke Fang","doi":"10.1109/NCIS.2011.59","DOIUrl":"https://doi.org/10.1109/NCIS.2011.59","url":null,"abstract":"Privacy-preserving data mining has become important since data mining has been widely used in many fields. Various privacy preserving techniques have been proposed to preserve the sensitive data. In this paper, we address two algorithms which can build classifiers accurately with less privacy disclosure in distributed system. These schemes can satisfy the different privacy disclosure level need of every client, which can meet clients' personalized needs. Besides this, our methods can be used for multi-classification.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133783186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Pulse Design Method for the Compatibility of UWB and IEEE 802.11a WLAN Systems UWB与IEEE 802.11a无线局域网兼容的脉冲设计方法
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.34
Xiao-jing Shi
{"title":"A Pulse Design Method for the Compatibility of UWB and IEEE 802.11a WLAN Systems","authors":"Xiao-jing Shi","doi":"10.1109/NCIS.2011.34","DOIUrl":"https://doi.org/10.1109/NCIS.2011.34","url":null,"abstract":"The spectrum compatibility of UWB and IEEE 802.11a WLAN systems is investigated in this paper. A UWB pulse designed method is developed based on the cognitive radio technology and Parks-McClellan algorithm. Under the three-dimensional interference model, the interference performance of UWB on WLAN is analyzed and simulated. The simulation results show that the pulse spectrum not only satisfies the requirement of FCC mask but also avoids WLAN system. The comparison of bit error rate performance is presented by using the proposed pulses and the fifth-order derivative Gaussian pulse to the time hopping UWB system in the additive white Gaussian noise channel. And the proposed pulse has better bit error rate performance than the fifth-order derivative Gaussian pulse.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131230578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Coherence Resonance of Excitable Chaotic Spiking Hindmarsh-Rose Neuron Model 可激发混沌脉冲Hindmarsh-Rose神经元模型的相干共振
2011 International Conference on Network Computing and Information Security Pub Date : 2011-05-14 DOI: 10.1109/NCIS.2011.106
Guang-Jun Zhang, Jue Wang, H. Yao, Xiang-Bo Wang, Jianxue Xu
{"title":"Coherence Resonance of Excitable Chaotic Spiking Hindmarsh-Rose Neuron Model","authors":"Guang-Jun Zhang, Jue Wang, H. Yao, Xiang-Bo Wang, Jianxue Xu","doi":"10.1109/NCIS.2011.106","DOIUrl":"https://doi.org/10.1109/NCIS.2011.106","url":null,"abstract":"In contrast to the previous researches on coherence resonance (CR), which have dealt with CR of periodic spiking neuron model, in this paper the characteristic of CR of chaotic neuron model, is researched. Whether CR of chaotic excitable neuron model can occur typically is of particular importance in neurophysiology, where CR is positive effect on transmission of neural information because noise can make the unordered chaotic spiking series of neurons more ordered. Here we show, based on a physical analysis and numerical evidence, that CR in the chaotic region of system bifurcation parameter can occur in the Hind marsh-Rose (HR) neuron model. Different from the previous results about CR that the occurrence and characterisitc of CR are dependent on the distance between the bifurcation point and bifurcation parameter, the occurrence and characterisitc of CR in this case are independent on the value of bifurcation parameter. CR in this case, which is relevant to an experimental phenomenon observed in neural electro physiology experiment, can be expected to occur commonly in other chaotic spiking neuron model.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133773938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信