2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

筛选
英文 中文
User Oriented Modeling and Simulation in LEO Satellite Networks 面向用户的低轨道卫星网络建模与仿真
Shaodong Feng, Jia-fu He, Yongqiang Li, Guangxia Li
{"title":"User Oriented Modeling and Simulation in LEO Satellite Networks","authors":"Shaodong Feng, Jia-fu He, Yongqiang Li, Guangxia Li","doi":"10.1109/NSWCTC.2009.260","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.260","url":null,"abstract":"Modeling and simulation is a very powerful tool for the traffic analysis and performance evaluation in communication networks. LEO (low earth orbit) satellite system is so complex and dynamic that it is very difficult to find a mathematical model to describe it. In this paper, a novel modeling and simulation method has been proposed for LEO satellite communication networks. Different from the traditional method focused on the packet generation, our model framework is “user oriented” with several layers which can reflect the behavior of users in the network. Layers offer services to the higher layer and require services from the layer below. Such a “user oriented” top-down manner has a great superiority in describing complex communication system. This approach is then demonstrated on modeling ISL traffic load in LEO satellite communication networks. By this way we get an estimation of the ISL traffic load for different number of users with various traffic characteristics. Furthermore this can be a very useful reference for system design.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132483919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling Distributed Multi-Granularity P2P Traffic Identifying and Controlling System 分布式多粒度P2P流量识别与控制系统建模
Wang Jinsong, Wang Zhengxu, L. Tao, Liu Fan
{"title":"Modeling Distributed Multi-Granularity P2P Traffic Identifying and Controlling System","authors":"Wang Jinsong, Wang Zhengxu, L. Tao, Liu Fan","doi":"10.1109/NSWCTC.2009.315","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.315","url":null,"abstract":"As P2P applications and the amount of users continue to increase rapidly, the problems which the Internet faces, such as network congestion and the difficulty in ensuring Qos etc, become more and more serious. This paper design a model of Distributed Multi-Granularity P2P Traffic Identifying and Controlling in the light of large-scale and high-speed network environment, under the premise that it basically does not change the structure of network, not increase the special monitoring equipment and minimize the impact on the actual communication system, we resolve the entire network's P2P traffic identifying and controlling.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134538071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Wireless Sensor Network for Cropland Environmental Monitoring 用于农田环境监测的无线传感器网络
Hui Liu, Zhijun Meng, Maohua Wang
{"title":"A Wireless Sensor Network for Cropland Environmental Monitoring","authors":"Hui Liu, Zhijun Meng, Maohua Wang","doi":"10.1109/NSWCTC.2009.306","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.306","url":null,"abstract":"Wireless sensor network technology can provide optimal and integrated solution for distributed data collecting, delivering and analyzing in tough croplands environment. A wireless sensor network for cropland environmental monitoring is designed according to cropland application requirements. It consists of a set of sensor nodes for data sensing, a sink node for data aggregating and long-distance transmitting, and a base station for data storing and analyzing. In order to make sure of reliable communication performance, we have conducted radio propagation experiments in actual crop field. Antenna height is proven to be an important factor to propagation loss. Therefore, the lowest antenna height for cropland applications is discussed. Finally, we proposed regular patterns of sensor nodes deployment based on the communication range and the sampling range.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130695146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Dynamic Behavior Measurement Based on Interactive Markov Chain 基于交互马尔可夫链的动态行为测量
Xing Zhang, Chen Li, Ruihua Li
{"title":"Dynamic Behavior Measurement Based on Interactive Markov Chain","authors":"Xing Zhang, Chen Li, Ruihua Li","doi":"10.1109/NSWCTC.2009.160","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.160","url":null,"abstract":"To deal with challenges and problems in trust measurement, we propose a dynamic behaviors measurement model based on Interactive Markov Chain (IMC). In this model, we use two different ways to obtain system runtime expectations of performance and functions. The one way is Temporal Probability of Executing Routes (TPER), which introduces the relationship between behavior sequences and time. The other is Steady-state Distribution of Executing Routes (SDER), which solves the problem of linear model that can not measure branch and concurrent system. Compared with traditional methods, the IMC-based model provides more powerful ability to measure runtime behaviors in complex and branch system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133255625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fuzzy Comprehensive Appraisement Model Based on Markov Chain of Teaching Quality Evaluation on Physical Education 基于马尔可夫链的体育教学质量模糊综合评价模型
Liu Min-hang, Fu Yu-kun
{"title":"A Fuzzy Comprehensive Appraisement Model Based on Markov Chain of Teaching Quality Evaluation on Physical Education","authors":"Liu Min-hang, Fu Yu-kun","doi":"10.1109/NSWCTC.2009.327","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.327","url":null,"abstract":"On the basis of making full use of the computer technology, the Markov chain and the index system of the student's quality of sports, this article carries out a fuzzy evaluation to the quality of physical education and proves its feasibility with the examples. Nowadays, when the information technology, computer technology has been widely used in physical education, this kind of appraisal attempt has the positive practical significance","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128884207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Notice of Violation of IEEE Publication PrinciplesApplication of Markov Chain in IP Traffic Classification 违反IEEE发布原则的通知。马尔可夫链在IP流量分类中的应用
Zhou Xusheng, Wang Zhiming
{"title":"Notice of Violation of IEEE Publication PrinciplesApplication of Markov Chain in IP Traffic Classification","authors":"Zhou Xusheng, Wang Zhiming","doi":"10.1109/NSWCTC.2009.151","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.151","url":null,"abstract":"Service classification is becoming a central issue because of the emergence of new services (P2P, VoIP, Streaming video, etc.) which raises new challenges in resource reservation, pricing, network monitoring, etc. In order to identify a specific signature to an application, we first of all model the sequence of its packets at the transport layer by means of a first order Markov chain. Then, we decide which service should be associated to any new sequence by means of standard decision techniques. The evaluation of this automatic recognition procedure using a monitor port on campus network switch demonstrates the feasibility and the excellent performance of this approach.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"21 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127613483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Effective Binary Image Watermarking Algorithm Based on Stochastic Tree Division 基于随机树分割的有效二值图像水印算法
Chao-yang Zhang, Zhilua Hu
{"title":"An Effective Binary Image Watermarking Algorithm Based on Stochastic Tree Division","authors":"Chao-yang Zhang, Zhilua Hu","doi":"10.1109/NSWCTC.2009.344","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.344","url":null,"abstract":"Aiming at the binary text image’s characteristics of simple pixel, complex texture and bad immunity of information concealment, a digital watermarking embedment location choosing method based upon compatible roughness class has been put forward. This method divides binary text images into different equivalence classes. Equivalence classes are further divided into different subclasses according to each pixel’s degree and texture changes between blocks. Through properties’ combination, the embedment block and location which are fit for watermarking are screened out. At last, different binary text images are chosen for emulation experiment.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127826957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Temperature and Humidity Monitoring under Mine Based on Optical Fiber Communication System 基于光纤通信系统的井下温湿度监测研究
W. Xiaolei, Wu Bingxin, Fu Bangsheng, P. Sheng
{"title":"Research on Temperature and Humidity Monitoring under Mine Based on Optical Fiber Communication System","authors":"W. Xiaolei, Wu Bingxin, Fu Bangsheng, P. Sheng","doi":"10.1109/NSWCTC.2009.258","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.258","url":null,"abstract":"For the problem of temperature drift, inexact and great transmission loss of the monitoring of environment temperature and humidity under the mine, this paper proposes the temperature and humidity monitoring and optical fiber communication transmission system under the mine based on TMS320LF2812(DSP) by controlling the digital temperature sensor. The system adopts RS232 serial communication, uploads data by optical communication. Data are dealed with by host computer to improve the speed and capability of system .The actual test results show that the system can work stably ,the measuring accuracy of temperature and humidity is up to 0.1¿ and 1%RH. It can realize reliable data transmission.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"507 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131408061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hidden Markov Model Based Real Time Network Security Quantification Method 基于隐马尔可夫模型的实时网络安全量化方法
Weiming Li, Zhengbiao Guo
{"title":"Hidden Markov Model Based Real Time Network Security Quantification Method","authors":"Weiming Li, Zhengbiao Guo","doi":"10.1109/NSWCTC.2009.375","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.375","url":null,"abstract":"Exactly assessing the security risk of a network is the key to improving the security level of the network. The Hidden Markov Model based real time network security risk quantification method can get the risk value dynamically and in real-time, whose input is Intrusion Detection System alerts. The method is better than the traditional static assessment method. The paper resolves main fault of this method, which improves its accuracy and simplifies the configuration by automatically working out matrixes in HMM. In an experimental study we demonstrate the usefulness of our techniques.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115378808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Short-Term Load Forecasting Based on the BKF-SVM 基于BKF-SVM的短期负荷预测
Kebin Cui, Yingshuang Du
{"title":"Short-Term Load Forecasting Based on the BKF-SVM","authors":"Kebin Cui, Yingshuang Du","doi":"10.1109/NSWCTC.2009.170","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.170","url":null,"abstract":"Support vector machine has been widely used in the area of load forecasting, but there are still many disadvantages that are large processed data and slow processing speed etc when training data.. According to the disadvantages, this paper proposes a kind of forecasting method of SVM based on Boolean kernel function. In order to determine the super parameters which exert a direct influence on the ability of extension of SVM, the fixed step iteration method is presented, achieving the automatic selection of super parameters. The practical example shows that the system with BKF-SVM(Boolean Kernel Functions of SVM) method, comparing with the RBF-SVM method, when being applied to short-term load-forecasting has got higher prediction accuracy with such advantages as simple structure and good generalization performance without over-fitting phenomenon.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115424315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信