{"title":"A New Intrusion Detection Method Based on Artificial Immune System","authors":"Baoyi Wang, Shaomin Zhang","doi":"10.1109/NPC.2007.117","DOIUrl":"https://doi.org/10.1109/NPC.2007.117","url":null,"abstract":"Use the algorithm of generating variable-radius detectors to generate detectors. Analyze different effects on detection results by choosing different radii. Test samples need to compare with all detectors to detect intrusions. When the number of detectors is large, the detection speed is slow. Cluster near detectors into an area. The test samples which fall in this area only compare with the detectors in this area not all detectors, so the times of comparing are reduced and the detection speed is increased. For the test sample falling in some area of non-self space which is not covered by any detector, comparing the minimum distance between this test sample and all self training samples with the minimum distance between this test sample and all detectors can judge whether this test sample is non-self It is proved by experiments that this method can increase the detection speed as well as detection rate.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131257039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Algorithm of Similarity Mining in Time Series Data on the Basis of Grey Markov Scgm(1,1) Model","authors":"Guoqiang Xiong, Qingjing Gao","doi":"10.1109/NPC.2007.118","DOIUrl":"https://doi.org/10.1109/NPC.2007.118","url":null,"abstract":"Aiming at two pivotal difficulties involved by similarity data mining in time series, namely effective mining of time series data with arbitrary length and that have biggish stochastic volatility, an algorithm of similarity mining in time series data on the basis of grey Markov SCGM (1, 1) model is proposed in this paper. Grey SCGM(1, 1) model is applied to seek for available information from time series data themselves, and then general change trend has been researched. Markov chain is applied to reveal stochastic volatility regularity and entropy is applied to measure similarity degree of time series. So applicable data scope of similarity mining in time series data is extended and efficiency of data mining is improved.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133244426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Processing Optimization for Injection Plastic Molding on Mold Design Grid","authors":"Cui Zhendong, Wang Xicheng, L. Zhijie","doi":"10.1109/NPC.2007.115","DOIUrl":"https://doi.org/10.1109/NPC.2007.115","url":null,"abstract":"According to the facts that optimization problems are always complex and requiring a long computing time, the grid is a good choice for solving this kind of problems. Based on the globus toolkits 4, a four-layer architecture mold design grid (MDG) platform is presented to meet the resources sharing and coordinated use equipments in solving the complex problem in the optimization design of injection mold. In this paper, a sequential approximation programming is presented to do processing optimization on the MDG. The optimization model is constructed by kriging surrogate function. As an example, the processing optimization of cellular phone cover is investigated, in which mold temperature, melt temperature and injection time are regarded as design variables. The optimization results show that the proposed optimization method can effectively improve the injection conditions, and the framework for optimization is well suitable for grid computing. The results by using different number grid nodes also show that the grid is high speed-up and efficiency.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132354724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Sensor Observation Data Registration based on Asynchronous Service Middleware","authors":"Nengcheng Chen, Zhong Zheng, Zeqiang Chen","doi":"10.1109/NPC.2007.25","DOIUrl":"https://doi.org/10.1109/NPC.2007.25","url":null,"abstract":"Recent advances in sensor web geospatial data capture, such as high resolution satellite images as well as corresponding web ready data processing and modeling technologies, have led to the generation of large amounts of datasets on real-time or near realtime observation and measurement. The quality of observation data register has become a 'bottleneck' of sensor web-based applications. In order to improve the quality of sensor data register, Sensor Observation Service (SOS) register middleware is put forward, which includes geospatial sensor observation service (SOS), geospatial catalogue service based on ebRIM, SOS register mediator service, sensor data granule information extraction service, and sensor data granule record generation service. The content and sequence of SOS observation 'synchronous' and 'asynchronous' data register strategy based on service middleware is described. The prototype system is designed and implemented by OGC CSW specification and SWE SOS standard. The EO-1 SOS register is tested, including 2420 WCSLayer observation records in a specified time, and the performance is evaluated. The experimental result shows the efficiency of the 'asynchronous' strategy proposed in this paper is 0.3- 0.4 times fast than that of the 'synchronous'.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"564 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133847299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Effectiveness of Flexible Deterministic Packet Marking for DDoS Defense","authors":"Y. Xiang, Wanlei Zhou, Zhongwen Li, Qun Zeng","doi":"10.1109/NPC.2007.57","DOIUrl":"https://doi.org/10.1109/NPC.2007.57","url":null,"abstract":"IP traceback is one of the defense mechanisms for distributed denial of service (DDoS) attacks. However, most traceback schemes consume extensive resources such as CPU, memory, disk storage and bandwidth and require a large amount of IP packets to reconstruct sources, which makes them impractical and ineffective. In this paper, we present a new flexible IP traceback scheme called flexible deterministic packet marking (FDPM). The flexibilities of FDPM are in two ways, one is that it can adjust the length of marking field according to the network protocols deployed, thus it can work well even in an environment with different network protocols; the other is that it can adjust the marking rate according to the load of participating router, while it still can maintain the marking function. In order to verify the effectiveness of FDPM for DDoS defense in terms of marking efficiency, maximum forwarding rate, and number of packets for reconstruction, we tested FDPM by both simulation and Linux router implementation with an emphasis on the latter. The experiments demonstrate that the built-in overload prevention mechanism, flow-based marking, can isolate and mark the most possible DDoS attack packets, while keeping the load of the participating router in a reasonably low degree. The real hardware implementation confirms that this flexible capability is important when traceback mechanisms are used in a real DDoS defense scenario.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115835123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web and Mobile Data Management","authors":"Xiaofeng Meng, Wei Liu","doi":"10.1109/NPC.2007.155","DOIUrl":"https://doi.org/10.1109/NPC.2007.155","url":null,"abstract":"The rapid prevalence of Web and mobile devices are making themselves becoming huge data sources. This new infrastructure presents tremendous challenges for data management technology, and traditional data management technologies such as query processing, transaction management, workflow etc. must all be re-evaluated in this emerging environment. Furthermore, non-traditional issues, such as Web and mobile data management, must all be addressed. This paper aims to investigate this interesting issue, focusing on the challenges and opportunities for the technologies of Web and mobile data management.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123340347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Realization of CGI in Embedded Dynamic Web Technology","authors":"Chen Tian-huang, Huang Jia-xi","doi":"10.1109/NPC.2007.39","DOIUrl":"https://doi.org/10.1109/NPC.2007.39","url":null,"abstract":"A new method, CGI (common gateway interface), based on CSP (C language service page) was developed by analyzing the realized method of CGI as well as comparing the advantages and disadvantages. At last, according to this new approach, a new design of dynamic Web server based on S3C4 4B0X and uClinux was given, which was used to manage and control the embedded devices by browser connected to the Web server.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124222704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach of Available Bandwidth Estimation for Heterogeneous Networks","authors":"Yuhua Liu, Hao Huang, Kaihua Xu","doi":"10.1109/NPC.2007.95","DOIUrl":"https://doi.org/10.1109/NPC.2007.95","url":null,"abstract":"Reliable transport protocols such as the transmission control protocol (TCP) are tuned to perform well in traditional wired networks where packet losses occur mostly because of congestion. However, networks with wireless and lossy links also suffer from significant packet losses due to bit errors and hand-offs. TCP Westwood (TCPW) is a recently proposed sender-side modification of TCP congestion control. The main point is to investigate those proposed bandwidth estimate algorithms in TCPW and then propose an enhanced one. We use simulation to validate the performance of the new algorithm.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125784694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Rapid Algorithm to Find Replacement Services for K-Shortest Path Problem with QoS Constraints","authors":"Jianqiang Hu, Xingzhi Feng, Zhiwei Zhang, Quanyuan Wu","doi":"10.1109/NPC.2007.135","DOIUrl":"https://doi.org/10.1109/NPC.2007.135","url":null,"abstract":"During the execution of composite service, if one service component in critical path fails, or becomes overloaded not to be accessed, a mechanism is needed to ensure that the whole running process isn't interrupted. The failed service needs be replaced quickly and efficiently by switching to a new path. Recent researches on this problem don't consider the influence of the QoS criteria of service candidates or the connection state of the overlay network, so the algorithms are easily disabled. In this paper, we solve the maximum utility path problem that is motivated by recent interest in k-shortest path problem. A new algorithm WSC_KUPB (web service composition k-maximum utility path backup) is described to enumerate the k maximum utility of simple loopless paths in a digraph. We construct utility path tree by using the utility function as the evaluation standard. And we enumerate every edge in cut edge set across two utility path trees; compute the utility value of the new path. Finally the optimal path with the maximum total utility is chosen as a backup path. The test result shows the algorithm performs very well in the efficiency and availability as compared to other relevant algorithms.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129694549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Views on Neighbor Selection in BitTorrent","authors":"Yingchun Lei, L. Yang, Qi Jiang, Chanle Wu","doi":"10.1109/NPC.2007.122","DOIUrl":"https://doi.org/10.1109/NPC.2007.122","url":null,"abstract":"BitTorrent is a protocol for P2P content distribution, which has become an important Internet application in recent years. In this paper, we measure the performance of BitTorrent, explain its key elements, and analyze its efficiency. Our contributions are as follows: (1) present an effective way to measure the performance of P2P content distribution systems; (2) quantify Bit-Torrent's Neighbor Selection which impair its efficiency; (3) design a ShareStorm protocol which avoids the BitTorrent flaws. Our preliminary experiment shows that in terms of download time, ShareStorm outperforms BitTorrent by 50+%.","PeriodicalId":278518,"journal":{"name":"2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128530156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}