Journal of Advances in Computer Networks最新文献

筛选
英文 中文
Analysis of FLAC Music Pieces Recovery FLAC音乐片段复原分析
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2014.V2.97
Ruichen Jin, Jongweon Kim
{"title":"Analysis of FLAC Music Pieces Recovery","authors":"Ruichen Jin, Jongweon Kim","doi":"10.7763/JACN.2014.V2.97","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.97","url":null,"abstract":"In this paper, we propose a method of recovering the music piece of FLAC file downloaded by BitTorrent. It was decoded the split FLAC file via getting the complete frames from piece of FLAC file and adding the temporary header to decode. The percentage of successfully decoding is all above 90%. From the partial audio signal we extract the musical feature and calculate the cross-correlation with the features in database. The feature in database is extract from the complete music file. The Musical feature is detected by chromagram to get the key strength. The percentage of audio identification is growing tendency with the increase of piece size. It experiment shows probability of identify audio with getting the part of FLAC file distributed by BitTorrent.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115451690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Partial Identification Analysis for MP3 Music MP3音乐的部分识别分析
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2014.V2.101
Xun Jin, Jong Weon Kim
{"title":"Partial Identification Analysis for MP3 Music","authors":"Xun Jin, Jong Weon Kim","doi":"10.7763/JACN.2014.V2.101","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.101","url":null,"abstract":"With the advent of BitTorrent protocol, internet users can easily share their movie and music files. Although the BitTorrent provides a highly efficient mechanism, the illegal use of BitTorrent on unauthorized distributing of copyright- protected digital content is increasing rapidly. To prevent illegal distribution of copyrighted files from spreading over the internet, the file pieces split by torrent file must be detected as soon as possible. In this paper, we propose a method of audio recognition on a few pieces of audio files downloaded by BitTorrent client program. The audio identification algorithm is made up of beat tracking and chroma features. To identify audio in the piece, the beat-by-chroma representations obtained from the piece and original audio are cross-correlated and look for sharp peaks. The experimental results show probabilities of successfully identifying the pieces with different piece sizes and different number of pieces.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124409280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Finding the Weakest Link in the Interdependent Security Chain Using the Analytic Hierarchy Process 利用层次分析法寻找相互依赖的安全链中的最薄弱环节
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.18178/JACN.2015.3.4.190
Chongxia Pan, Weijun Zhong, Shue Mei
{"title":"Finding the Weakest Link in the Interdependent Security Chain Using the Analytic Hierarchy Process","authors":"Chongxia Pan, Weijun Zhong, Shue Mei","doi":"10.18178/JACN.2015.3.4.190","DOIUrl":"https://doi.org/10.18178/JACN.2015.3.4.190","url":null,"abstract":"with the rapid development of network finance and electronic commerce, the network and information security problems are more complex and prominent, and economics of information security has also become a hot research topic. This paper uses AHP (analytic hierarchy process) method to find the weakest link in the interdependent security chain. And the result can help information security investment decision-making. This paper firstly introduces research background including current research situations about interdependent security and the weakest link in network security. Then it introduces problems about the information system security in corporations’ security chain, finally modeling the AHP method to find the weakest link in interdependent security chain and gives a conclusion at last.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125240957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improve the DFI-based Network Traffic Classification Performance by Using QoS Metrics 利用QoS指标提高基于dfi的网络流分类性能
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.18178/JACN.2020.8.2.278
Yongcheng Zhou
{"title":"Improve the DFI-based Network Traffic Classification Performance by Using QoS Metrics","authors":"Yongcheng Zhou","doi":"10.18178/JACN.2020.8.2.278","DOIUrl":"https://doi.org/10.18178/JACN.2020.8.2.278","url":null,"abstract":"","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"63 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121005042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attacking Pattern Matching Algorithms Based on the Gap between Average-Case and Worst-Case Complexity 基于平均情况和最坏情况复杂度差距的攻击模式匹配算法
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2013.V1.45
Yu Zhang, Ping Liu, Yanbing Liu, Aiping Li, Cuilan Du, Dongjin Fan
{"title":"Attacking Pattern Matching Algorithms Based on the Gap between Average-Case and Worst-Case Complexity","authors":"Yu Zhang, Ping Liu, Yanbing Liu, Aiping Li, Cuilan Du, Dongjin Fan","doi":"10.7763/JACN.2013.V1.45","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.45","url":null,"abstract":"We have developed an effective method to generate attack data for widely-used pattern matching algorithms. Perceived to be a fundamental problem in the field of computer science, pattern matching has received extensive attention in research and has been used in a variety of fields to include information retrieval, computational biology, information security, etc. The extensive applications of pattern matching are mainly rooted in the fact that pattern matching algorithms, such as SBOM and WuManber, typically have a low time-complexity. However, in the worst case time-complexities of algorithms are very high, making pattern matching algorithms vulnerable to algorithmic complexity attacks (in other words, one might significantly slow down pattern matching algorithms simply by feeding them with specifically-designed text). In this study, we investigated this potential vulnerability by proposing a dynamic programming method designed to attack text having knowledge of patterns. Experimental results suggest that SBOM and WuManber run the specifically-designed text slower than random text (real text). Interestingly, it has been observed that the attacking method is still effective even when parts of patterns are only known, meaning that even a leak of small proportions has the potential to lead to severe attacks. Finally, we propose some suggestions to reduce the risks of these attacks. To the best of our knowledge, this is the first time that an attacking pattern matching approach is proposed based on algorithm complexity.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127169262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Hybrid Classification Model Thanks to Artificial Neural Network and Artificial Immune Systems for Diagnosis of Epilepsy from Electroencephalography 基于人工神经网络和人工免疫系统的脑电图混合分类模型诊断癫痫
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2014.V2.77
Sem a Arslan, H. Işık
{"title":"The Hybrid Classification Model Thanks to Artificial Neural Network and Artificial Immune Systems for Diagnosis of Epilepsy from Electroencephalography","authors":"Sem a Arslan, H. Işık","doi":"10.7763/JACN.2014.V2.77","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.77","url":null,"abstract":"In this study, Artificial Neural Networks (ANN) and Artificial Immune (AI) techniques designed in the form of a hybrid structure are used for diagnosis of epilepsy patients via EEG signals. Attributes of EEG signals are needed to be determined by employing EEG signals which are recorded using EEG. In this process the raw digital signals data is received and is summarized in some respects. From this data, four characteristics are extracted for the classification process. 20% of available data is reserved for testing while 80% of available data is being reserved for training. These actions were repeated five times by performing cross-validation process. AIS is used for updating the weights during training ANN and a program is constituted for the classification of EEG signals. Education and recording processes were performed with different parameters by means of the constituted program. The obtained findings show that the proposed method was effective for achieving accurate results as much as possible with the use of ANN and AIS, together.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125408502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Compression Algorithm for Wireless Sensor Network 无线传感器网络的混合压缩算法
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2014.V2.100
A. .. Kishk, N. Messiha, N. El-Fishawy, Abdelrahman A. Elkafs, A. Madian
{"title":"Hybrid Compression Algorithm for Wireless Sensor Network","authors":"A. .. Kishk, N. Messiha, N. El-Fishawy, Abdelrahman A. Elkafs, A. Madian","doi":"10.7763/JACN.2014.V2.100","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.100","url":null,"abstract":"Discrete Wavelet Transform (DWT) was developed to improve the performance of data compression. Hybrid Fast Zonal-DCT with DWT is proposed to enhance the image compression during the transmission in WSN. The reduction in power consumption relies on data distribution in the clusters. The performance of the proposed algorithm is monitored by some metrics. The enhancement in image quality and compression ratio is achieved.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125497398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Powerful IPSec Multi-Tunnels Architecture 一个强大的IPSec多隧道架构
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2014.V2.125
Abdulellah A. Alsaheel, Ahmad S. Almogren
{"title":"A Powerful IPSec Multi-Tunnels Architecture","authors":"Abdulellah A. Alsaheel, Ahmad S. Almogren","doi":"10.7763/JACN.2014.V2.125","DOIUrl":"https://doi.org/10.7763/JACN.2014.V2.125","url":null,"abstract":"This paper aims to introduce IPSec protocol, including its architecture, protocols family and implementations. We propose a performance evaluation setup which allows IPSec implementers to evaluate their IPSec implementation. IPSec as it is known as a set of protocols that work together, with utilizing multiple components in the IPSec architecture to serve one purpose, which is securing the internet Protocol (IP) packets. Security services provided by IPSec in general include: confidentiality, integrity check and authenticity of the data. Since measuring the performance can vary and this variation would end up in inconsistent measuring. This paper represents a good methodology to test IPSec performance and introduces a powerful IPSec architecture that utilizes multi-tunnels.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126767740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Memory Recollection and Retrieval Based on Monitoring Human and Object in the iSpace 基于空间中人与物监控的记忆回忆与检索
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.7763/JACN.2013.V1.20
Kazufumi Saito, Akira Yoshimura, Joo-Ho Lee
{"title":"Memory Recollection and Retrieval Based on Monitoring Human and Object in the iSpace","authors":"Kazufumi Saito, Akira Yoshimura, Joo-Ho Lee","doi":"10.7763/JACN.2013.V1.20","DOIUrl":"https://doi.org/10.7763/JACN.2013.V1.20","url":null,"abstract":"Abstract—In this paper, we propose a memory recollection and retrieval system using spatial log data in daily living which allows users to see behavior of the past, unconscious behavior and object-oriented behavior in the Intelligent Space. The proposed system consists of multiple camera devices and it utilizes various kinds of data; human identification, human motion, object instance, weather information, illuminance, heuristic information, etc. We constructed the system, focused on objects, in the Intelligent Space. To generate Metadata, based on collected log data to achieve the system of Recollection and Retrieval, several algorithms were used. For example, we used various image-processing algorithms of human detection, face recognition, object recognition, etc. for monitoring human and object. This paper presents the prototype of Recollection and Retrieval System, and updates original dataset, useful for various purposes in the Intelligent Space. Moreover, we improved the system performance of detecting object position compared to previous results.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115057114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of DWMT Transceiver for ADSL Channel with Overlap FDE in Presence of AWGN, Crosstalk and Impulse Noise ADSL信道重叠FDE在AWGN、串扰和脉冲噪声存在下的性能分析
Journal of Advances in Computer Networks Pub Date : 1900-01-01 DOI: 10.18178/JACN.2015.3.4.179
Arsla Khan, S. Baig, S. Shin
{"title":"Performance Analysis of DWMT Transceiver for ADSL Channel with Overlap FDE in Presence of AWGN, Crosstalk and Impulse Noise","authors":"Arsla Khan, S. Baig, S. Shin","doi":"10.18178/JACN.2015.3.4.179","DOIUrl":"https://doi.org/10.18178/JACN.2015.3.4.179","url":null,"abstract":"Discrete wavelet Multi-tone (DWMT) was proposed to overcome the problems of Discrete Multi-tone (DMT) for wireline channels. DWMT based system poses more resistance against inter-symbol interference (ISI) because of tight filters and more spectral efficiency due to absence of cyclic prefix as compared to DMT based system. However, no equalization technique has been standardized yet for DWMT transceiver. In this paper, we are proposing Overlap frequency domain equalization (FDE) for DWMT transceiver for ADSL channel in presence of additive white Gaussian noise (AWGN), crosstalk and impulse noise (IN). From simulations results, we can analyze that Bit error rate (BER) performance of Time domain equalization (TDE) is comparable with Overlap FDE but the main advantage lies in lower computational complexity.","PeriodicalId":232851,"journal":{"name":"Journal of Advances in Computer Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116382929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信