2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)最新文献

筛选
英文 中文
Research on convergence performance of distributed synchronization algorithm in WSNs based on node degree distribution 基于节点度分布的wsn分布式同步算法收敛性能研究
Lin Luo, S. Ni, Jingfeng Qian, Qi Yang
{"title":"Research on convergence performance of distributed synchronization algorithm in WSNs based on node degree distribution","authors":"Lin Luo, S. Ni, Jingfeng Qian, Qi Yang","doi":"10.1109/ICASID.2015.7405688","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405688","url":null,"abstract":"The study of the synchronization problems in wireless sensor networks (WSNs) is increasingly significant, researchers found that the topology of the network has an important impact on the convergence performance of the synchronization in WSNs. In this paper, we find that the WSNs can be described by RGGs, and the convergence rate of distributed synchronization algorithm depends on the second largest eigenvalue of the update matrix based on the RGG topology. Then we study on one of the basic topology properties of a distributed network, node degree distribution. In a certain RGG network model, the relation between node degree distribution and node number, communication radius is explored. What' s more, this paper gives the mathematical expression of the degree distribution with theoretical derivation. Then the simulations of node degree distribution are taken by changing the communication radius and node density to show that the theoretical derivation and the simulation result correspond. Further we verify the relation between average degree of the network and the second largest eigenvalue.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126379680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MPCC: Multi-path routing packet connect circuit for network-on-chip 用于片上网络的多路径路由数据包连接电路
Gaoming Du, Xin Yang, Fuzhan Chen, Duoli Zhang, Y. Song, Chen Peng
{"title":"MPCC: Multi-path routing packet connect circuit for network-on-chip","authors":"Gaoming Du, Xin Yang, Fuzhan Chen, Duoli Zhang, Y. Song, Chen Peng","doi":"10.1109/ICASID.2015.7405667","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405667","url":null,"abstract":"Packet Connect Circuit protocol is one of the NoC communication methods. Follow the PCC protocol, the data is transmitted in form of circuit through the route established by packet switching. However, there exists disadvantage in the traditional SPCC (single path Packet Connected Circuit, SPCC) routing algorithm whose rate of channel building will slow down when the chip is congest, resulting in the reduction of the whole communication efficiency directly. To solve this problem, this paper presented MPCC (multi-path Packet Connected Circuit, MPCC) routing algorithm to form a more efficient NoC communication structure which can brilliantly improve the efficiency of data transmission of NoC when it is crowded. The experiment shows that by the method of MPCC, the average packet delay of network decreases by 33.35% compared with S PCC routing algorithm.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evolutional-based network traffic flow behavior acquisition and fuzzy control system design 基于进化的网络交通流行为获取与模糊控制系统设计
Ming-Hui Ho, Donghui Guo, Hsuan-Ming Feng, Ching-Chang Wong
{"title":"Evolutional-based network traffic flow behavior acquisition and fuzzy control system design","authors":"Ming-Hui Ho, Donghui Guo, Hsuan-Ming Feng, Ching-Chang Wong","doi":"10.1109/ICASID.2015.7405674","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405674","url":null,"abstract":"A theory of IEEE 802.11e of the wireless channel service concept is applied in this paper. The integration of particle swarm optimization (PSO), fuzzy inference theory and Markov Chains model are proposed to design the evolutionary-based network traffic flow behavior acquisition and fuzzy control system. Markov Chains model simulates the flow saturation state of internal channel competitions to detect the channel busy probability with the regulation of backoff cycles. Wireless network flow model is developed to apply time serious service package based on the distribution of collided flow probability. The acquisition features of network traffic flow describe the package sending behavior to construct the fuzzy control architecture. Suitable fuzzy rules are selected by the PSO learning scheme to improve the flow congestion condition and shorten the service waiting time. Computer simulation results on two network station problems are derived to demonstrate the efficiency of the proposed methods.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125911363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource allocation mechanism based on two-step mapping for saving energy in wireless network virtualization 基于两步映射的无线网络虚拟化节能资源分配机制
Sai Zou, Yangxian Zhang, Yuliang Tang
{"title":"Resource allocation mechanism based on two-step mapping for saving energy in wireless network virtualization","authors":"Sai Zou, Yangxian Zhang, Yuliang Tang","doi":"10.1109/ICASID.2015.7405681","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405681","url":null,"abstract":"The current network is designed for peak loads, which results in lower network resource utilization and great energy waste. In case of meeting the wireless coverage and user requirements, how to make more base stations in wireless networks into a sleeping state has become an important means of energy saving. Virtualization network technology makes it possible that centralized scheduling wireless network resources and deploying intelligent energy perception network. According to the characteristics of the underlying virtual network mapping and base station energy consumption situation, the virtual cell resource mapping multi-objective decision making energy saving model is proposed in this paper. And then, the two-step mapping algorithm is used for solving the model. At last, the results of theoretical analysis and simulation experiments show that this algorithm can effectively reduce the system energy consumption.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131223144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A new method for human action recognition: Discrete HMM with improved LBG algorithm 一种新的人体动作识别方法:改进LBG算法的离散HMM
Zhongxin Qu, Tingshu Lu, XiaoJiong Liu, Qianqian Wu, Mingjiang Wang
{"title":"A new method for human action recognition: Discrete HMM with improved LBG algorithm","authors":"Zhongxin Qu, Tingshu Lu, XiaoJiong Liu, Qianqian Wu, Mingjiang Wang","doi":"10.1109/ICASID.2015.7405672","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405672","url":null,"abstract":"Hidden Markov Model (HMM) algorithm and Vector Quantization (VQ) algorithm are widely used in the field of speech recognition. The innovation of this paper will be the introduction of the above two algorithms into human action recognition and making them as a solution to recognize action of the continuous multi frames video. Simulated Annealing algorithm and the empty cavity processing algorithm improve vector quantization algorithm and obtain the global optimal codebook. The recognition result of the new algorithm is much better than the original algorithm and traditional algorithms. The new method realizes the identification of abnormal behavior.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132664385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The anomaly detection method based on artificial immune of distributed service 基于人工免疫的分布式服务异常检测方法
Jinmin Li, Tao Li
{"title":"The anomaly detection method based on artificial immune of distributed service","authors":"Jinmin Li, Tao Li","doi":"10.1109/ICASID.2015.7405657","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405657","url":null,"abstract":"Distributed service is an effective way to solve the massive user services. However, the dynamic combination of services can lead to uncertainty in service, what' s more, a large number of service's massive data lead to inefficiency in anomaly detection of service. So it increases the difficulty of the service anomaly detection. This paper inspired by the biological processes of artificial immune recognizing abnormality and propose a method which dynamically detect distributed services abnormal. First of all, we detect abnormal source through numerical differentiation method. Secondly, we draw the ideological of DCA, and through fusion invoking times and average times to calculating danger zone. We achieve the goal of dynamically detecting distributed services abnormal. At last, the experiments verify the feasibility of the method.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134332466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of a new database security model based on hopping mechanism 基于跳变机制的数据库安全模型的设计与实现
Zhan Cui, Jianping Zeng, Chengrong Wu, Shiyong Zhang
{"title":"Design and implementation of a new database security model based on hopping mechanism","authors":"Zhan Cui, Jianping Zeng, Chengrong Wu, Shiyong Zhang","doi":"10.1109/ICASID.2015.7405649","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405649","url":null,"abstract":"Database security is an important part of information security. With the background of login verification, this paper proposes a database security model based on hopping mechanism and gives theoretical analysis to it. In the theoretical analysis, we gives the specific expression of the probability of successful attack and theoretical deducation of the expression. Finally, we establish the prototype of the model and carry out an experiment to validate it. The final experiment shows that the result accords with the theoretical analysis and the model we established has a high efficiency in the database security and can offer a new direction for the database security research.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133415809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Speech enhancement using convolutive non-negative matrix factorization with multiple dictionaries 基于多字典卷积非负矩阵分解的语音增强
Shan He, Jiawen Wu, Lin Li
{"title":"Speech enhancement using convolutive non-negative matrix factorization with multiple dictionaries","authors":"Shan He, Jiawen Wu, Lin Li","doi":"10.1109/ICASID.2015.7405671","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405671","url":null,"abstract":"We introduce an effective framework for speech enhancement using convolutive nonnegative matrix factorization (CNMF) with no a prior knowledge of the clean speech or noise types. On the assumption that the speech signal is irrelevant to noisy signal, CNMF would attenuate the background noise from noisy speech with a mix dictionary which consists of speech bases and noise bases. To be practical, in training phrase, a universal speech dictionary is trained using clean speech utterances irrelevant to noisy speech, and noise dictionary is well-prepared on different kinds of noise signal. Then in the enhancement process only the speech bases are updated according to noisy utterances using Kullback-Leibler divergence (KLD). The experiments were implemented on the NOIZUES library with babble, pink and white noisy speech utterances in a wide range of input SNR from 0dB to 15dB. The results show that the proposed framework achieves better perceptual evaluation of speech quality (PESQ) scores and output SNR compared to other conventional methods.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124908869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved LS channel estimation algorithm of SC-FDMA 一种改进的SC-FDMA LS信道估计算法
Yating Luan, Chunrong Kan, Haoyang Du, Qian Zhao
{"title":"An improved LS channel estimation algorithm of SC-FDMA","authors":"Yating Luan, Chunrong Kan, Haoyang Du, Qian Zhao","doi":"10.1109/ICASID.2015.7405676","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405676","url":null,"abstract":"In the LTE uplink, Single Carrier Frequency Division Multiple Access (SC-FDMA) is adopted as its multiple access scheme. The Channel Estimation (CE) is one of the key technologies in mobile communication system. According to the latest LTE criterion, the pilot-aided CE algorithms of SC-FDMA are researched in this paper. Our research mainly discusses Least-Square (LS), the traditional LS based on Discrete Fourier transform (DFT) and the improved LS based on DFT. Finally, theoretical analysis and simulation result show that: The improved LS based on DFT has more superior estimation performance than the traditional LS based on DFT while it increases the computational complexity in the low SNR.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127440354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Two-staged Weighted Bit Flipping (WBF) decoding algorithm for LDPC codes LDPC码的两阶段加权比特翻转译码算法
Kexiang Ma, Jing Jin, Wei Li, Peng Zhang
{"title":"Two-staged Weighted Bit Flipping (WBF) decoding algorithm for LDPC codes","authors":"Kexiang Ma, Jing Jin, Wei Li, Peng Zhang","doi":"10.1109/ICASID.2015.7405679","DOIUrl":"https://doi.org/10.1109/ICASID.2015.7405679","url":null,"abstract":"In this paper, a two-staged decoding strategy which can be used for the Weighted Bit Flipping (WBF) based decoding algorithm for LDPC codes is presented. At the two stages, a parallel WBF and bit-flipping (BF) algorithms are adopted separately. Correspondingly, by the study of the iterative decoding process of the PWBF algorithm, a simple function is introduced to dynamically implement the switch of two decoding stages. The proposed algorithm can noticeably lower the error floor of PWBF algorithm with a modest increase in computation complexity and hardware cost. The validation of the proposed algorithm is verified by simulation.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129259268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信