Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)最新文献

筛选
英文 中文
Performance of a queueing model with self-similar input traffic 具有自相似输入流量的排队模型的性能
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-03-30 DOI: 10.1109/SECON.2001.923084
C. Aduba, M. Sadiku
{"title":"Performance of a queueing model with self-similar input traffic","authors":"C. Aduba, M. Sadiku","doi":"10.1109/SECON.2001.923084","DOIUrl":"https://doi.org/10.1109/SECON.2001.923084","url":null,"abstract":"Studies have shown that self-similar (fractal) processes are an accurate representation for the data traffic in today's high-speed networks. Network arrivals modeled as a Poisson process or a compound Poisson process, though presenting analytical simplicity, do not capture the scale-invariant property of data traffic. The packet inter-arrival distribution clearly differs from the exponential form being assumed and this affects buffer sizing. This paper shows through simulation studies of how the buffer overflow probability can be estimated when the arrivals are generated using a heavy-tailed distribution. A G/D/1/B queue, with a general distribution type input process, deterministic service process, single server system and buffer size B, is assumed.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121953821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed security schemes for networks 分布式网络安全方案
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-03-30 DOI: 10.1109/SECON.2001.923099
S. Wunnava, E. Lule
{"title":"Distributed security schemes for networks","authors":"S. Wunnava, E. Lule","doi":"10.1109/SECON.2001.923099","DOIUrl":"https://doi.org/10.1109/SECON.2001.923099","url":null,"abstract":"This paper presents the design of a hardware based security processor module, for network-connected systems. The security processor is implemented based on data encryption standard (DES) using very high speed integrated circuit hardware description language (VHDL), the code is then targeted to a programmable logic device (PLD). The design techniques presented in this paper, present a product that can be developed and deployed rapidly. The product is then evaluated for both performance and reliability, this compared to a software implementation of the security processor.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"273 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123905666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting anomalous behavior: optimization of network traffic parameters via an evolution strategy 检测异常行为:通过进化策略优化网络流量参数
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-03-30 DOI: 10.1109/SECON.2001.923083
D.C. Bauer, J. Cannady, R.C. Garcia
{"title":"Detecting anomalous behavior: optimization of network traffic parameters via an evolution strategy","authors":"D.C. Bauer, J. Cannady, R.C. Garcia","doi":"10.1109/SECON.2001.923083","DOIUrl":"https://doi.org/10.1109/SECON.2001.923083","url":null,"abstract":"Detecting intrusions falls into two categories: anomaly detection and misuse detection. The former refers to the detection of abnormal behavior in the use of network services and computing resources. Misuse detection, on the other hand, relies on the identification of \"well defined patterns of attack that exploit\" vulnerabilities in network and computer software. Most of the commercially available intrusion detection products fall into this category. They work by \"mechanically... matching known patterns of attack against monitored activity\" within the packet payload only. On the other hand, some intrusion detection techniques focus on \"packet header information only\". Throughout academia and industry, there appears to be a lack of research in identifying probable attacks by combining the use of payload characteristics and packet header information, that is, by analyzing the entire packet. This paper addresses this void. This work poses the selection of packet information as an optimization problem for the purposes of anomaly detection. Specifically, using the characteristics of network attacks, we designed an evolution strategy (ES) that is able to detect anomalous network behavior and identify the source of the attack through the analysis of packet header and payload information. We demonstrate that evolution strategies are appropriate for those problems that require simultaneous optimization of multiple parameters in the context of network security. Preliminary results are very encouraging suggesting that network traffic can be parameterized, and, through the optimization of these parameters, evolution strategies can detect anomalous behavior in network traffic.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125783396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Internet enterprise engineering. A "zero-time" framework based on "T-strategy" 互联网企业工程。基于“t策略”的“零时间”框架
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-03-30 DOI: 10.1109/SECON.2001.923127
U. Tanik, M. Tanik, L. Jololian
{"title":"Internet enterprise engineering. A \"zero-time\" framework based on \"T-strategy\"","authors":"U. Tanik, M. Tanik, L. Jololian","doi":"10.1109/SECON.2001.923127","DOIUrl":"https://doi.org/10.1109/SECON.2001.923127","url":null,"abstract":"The Electronic Enterprise Engineering (EEE) is the collective best practices for the technology-driven architecting of enterprises to directly achieve enterprise objectives (M. Tanik; P. Ng; R. T. Yeh, 1998). Two important aspects of engineering enterprises are the time-to-market and the positioning of the enterprise in the market based on its core competency (R. T. Yeh; K. Pearlson; G. Kozmetsky, 2000). In addition, agile organizations should utilize a service-based process model (C.V. Ramamoorthy, 2000), which allows them to adapt in a timely manner to changing market conditions. This can be achieved by using a component-based enterprise application integration approach (L. Jololian, 2000). In this paper, the authors present a framework for the development of a particular application of the EEE concepts to the Engineering of Internet enterprises, referred to as Internet Enterprise Engineering (IEE). They believe that enterprises in the 21st Century will have to adopt such a model in order to be competitive in the market place.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126959777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficient division in the binary representation of complex numbers 复数二进制表示中的有效除法
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-03-30 DOI: 10.1109/SECON.2001.923114
D. Blest, T. Jamil
{"title":"Efficient division in the binary representation of complex numbers","authors":"D. Blest, T. Jamil","doi":"10.1109/SECON.2001.923114","DOIUrl":"https://doi.org/10.1109/SECON.2001.923114","url":null,"abstract":"Computer operations involving complex numbers, essential in such applications as digital signal processing and image processing, are usually performed in a \"divide-and-conquer\" approach dealing separately with the real and imaginary parts and then accumulating the results. There have been several proposals to treat complex numbers as a single unit but all seem to have floundered on the basic problem of the division process without which, of course, it is impossible to carry out all but the most basic arithmetic. This paper resurrects an early proposal to express complex numbers in a single \"binary\" representation and provides a fail-safe procedure for obtaining the quotient of two complex numbers expressed in this representation.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116211005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Measurement of thermocouple time constants using LabVIEW as part of an engineering recruiting weekend for high school seniors 利用LabVIEW测量热电偶时间常数,作为高中毕业生工程招聘周末的一部分
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-03-30 DOI: 10.1109/SECON.2001.923123
E. M. O’Brien, A. S. Collins, W. Moses
{"title":"Measurement of thermocouple time constants using LabVIEW as part of an engineering recruiting weekend for high school seniors","authors":"E. M. O’Brien, A. S. Collins, W. Moses","doi":"10.1109/SECON.2001.923123","DOIUrl":"https://doi.org/10.1109/SECON.2001.923123","url":null,"abstract":"Sixty-three highly qualified high school seniors with and interest in engineering were invited to the Mercer Campus to compete for scholarships. To help them gain an appreciation for engineering, the students were given a pre-laboratory exercise to complete at home and an on campus laboratory experience. Temperature measuring systems using thermocouples and LabVIEW software were used to introduce them to first-order system responses. They were all able to determine the time constants of two systems from the temperature versus time recording as captured with LabVIEW. Results from an exiting student exam showed that they left with an increase awareness of what engineering is and what engineers do. They also seemed to enjoy the experience.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127018887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic multiobjective optimization of war resource allocation using adaptive genetic algorithms 基于自适应遗传算法的战争资源分配动态多目标优化
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-03-30 DOI: 10.1109/SECON.2001.923107
S. Palaniappan, S. Zein-Sabatto, A. Sekmen
{"title":"Dynamic multiobjective optimization of war resource allocation using adaptive genetic algorithms","authors":"S. Palaniappan, S. Zein-Sabatto, A. Sekmen","doi":"10.1109/SECON.2001.923107","DOIUrl":"https://doi.org/10.1109/SECON.2001.923107","url":null,"abstract":"Genetic algorithms (GA) are often well suited for multiobjective optimization problems. The major objective of this research is to optimize the war resource allocations of sorties, for a given war scenario, using genetic algorithms. The war is simulated using THUNDER software. THUNDER software is a stochastic, two-sided, analytical simulation of campaign-level military operations. The simulation is subject to internal unknown noises similar to real war cases. Due to these noises and discreteness in the simulation, as well as in real wars, an adaptive GA approach has been applied to solve this multiobjective optimization problem. Transforming this multiobjective optimization problem to a form suitable for direct implementation of GA was a major accomplishment of this research. A suitable fitness function was chosen after careful research and testing on the GA. Furthermore, the GA parameters were adaptively set to yield smoother and faster fitness convergence. Two fuzzy logic mechanisms were used to adapt the GA parameters. In the first mechanism, the mutation and crossover rates were changed adaptively. In the second mechanism, the fitness function coefficients are changed dynamically in each run. Testing results showed that the adaptive GA outperforms the conventional GA search in this multiobjective optimization problem and was effectively able to allocate forces for war scenarios.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115752482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Speech annunciation from highway surface grooves 公路表面沟槽的语音报信
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-03-30 DOI: 10.1109/SECON.2001.923122
C. Carnal, R. Kisner, J. Hylton, W. B. Snyder, S. S. Stevens
{"title":"Speech annunciation from highway surface grooves","authors":"C. Carnal, R. Kisner, J. Hylton, W. B. Snyder, S. S. Stevens","doi":"10.1109/SECON.2001.923122","DOIUrl":"https://doi.org/10.1109/SECON.2001.923122","url":null,"abstract":"Grooves are embedded in the pavement along the shoulders of many interstate highways in the United States to alert straying drivers with a rumbling sound. Using specially encoded grooves, speech can be annunciated instead. A groove pattern was devised that resembles a recorded phrase of human speech. The original recording was filtered to remove high frequency noise and then dynamically compressed into an equal amplitude square wave with variable pulse width. Before committing significant funding to build and test the encoded strip, the phenomenon was empirically modeled using system identification on the sound of an automobile being driven over existing rumble strips. The input was a simple periodic square wave pattern. Then, several phrases from different speakers were encoded into strip signals and used as inputs for the model. A subjective evaluation was performed to determine the most intelligible case. The selected strip was constructed by milling the groove pattern into sheets of aluminum. Tests with a truck found the fidelity of the sound was intelligible and resembled the simulated sound. An U.S. patent application has been filed.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114160399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The application of a current-dependent arc model to arcing at a main distribution panel, a sub-panel and a branch circuit 电流相关电弧模型在主配电板、副配电板和支路上的应用
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-03-30 DOI: 10.1109/SECON.2001.923090
T. Gammon, J. Matthews
{"title":"The application of a current-dependent arc model to arcing at a main distribution panel, a sub-panel and a branch circuit","authors":"T. Gammon, J. Matthews","doi":"10.1109/SECON.2001.923090","DOIUrl":"https://doi.org/10.1109/SECON.2001.923090","url":null,"abstract":"An arcing fault is a dangerous and unpredictable form of short circuit. Higher arcing-fault current magnitudes are often associated with greater levels of danger. Higher arc currents certainly correlate with greater potential arc-flash hazards and explosions. Within a building system, the largest arcing-fault current is available at the main distribution panel. Since an arcing fault at a sub-panel or in a branch circuit is lower in magnitude and presents less flash-hazard danger, the insidious danger is often overlooked. The magnitude of the arcing-fault current at these locations is often insufficient to immediately trip overcurrent devices, resulting in the escalation of the arcing fault. Despite modern advances in system protection, people are injured or killed each year as a result of arcing faults, initiated through either accidental physical contact or a glow-to-arc transition. The initial phases of this research involved reviewing the arc physics and re-examining the early arc models developed for low-voltage systems and developing better arc models to predict arc current magnitudes in building systems. This paper evaluates the dangers associated with arcing faults at a main distribution panel, a sub-panel, and a branch circuit of a typical building system. Factors determining arc tenacity are addressed.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114222506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance of the Reliable All-informed Voice Networking (RAVEN) system in dynamic network topologies 可靠全知情语音网络(RAVEN)系统在动态网络拓扑中的性能
Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208) Pub Date : 2001-03-30 DOI: 10.1109/SECON.2001.923086
A.C. Pease, H. Russell
{"title":"Performance of the Reliable All-informed Voice Networking (RAVEN) system in dynamic network topologies","authors":"A.C. Pease, H. Russell","doi":"10.1109/SECON.2001.923086","DOIUrl":"https://doi.org/10.1109/SECON.2001.923086","url":null,"abstract":"The RAVEN system comprises several networking algorithms designed to provide improved quality of service (QoS) for multiple voice, video, and data sessions in a direct-sequence (DS) mobile packet-radio network. The focus in this paper is on the interaction between the adaptive-transmission protocol (ATP) and least-resistance routing (LRR), two of the algorithms the RAVEN system uses for efficient network throughput. The end-to-end (ETE) efficiency of the RAVEN system is dependent on the cooperation of these protocols, and we examine their performance under multiple mobility models. Each radio generates packet radio organization packets (PROPs) to update the routing tables. We examine the sensitivity of the network performance in terms of throughput and energy efficiency at the rate that PROPs are generated.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125754462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信