2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

筛选
英文 中文
Stochastic Optimization Problem through Particle Swarm Optimization Algorithm 基于粒子群算法的随机优化问题
Fangguo He, Wenlue Chen
{"title":"Stochastic Optimization Problem through Particle Swarm Optimization Algorithm","authors":"Fangguo He, Wenlue Chen","doi":"10.1109/NSWCTC.2009.355","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.355","url":null,"abstract":"In this paper, two classes of stochastic optimization problems, which are expected value models and chance-constrained programming, are introduced. In order to solve the problems, the method of stochastic simulation is used to generate training samples for neural network, and then particle swarm optimization algorithm and neural network are integrated to produce a hybrid intelligent algorithm. Two numerical examples are provided to illustrate the effectiveness of the hybrid particle swarm optimization algorithm.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1801 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129644563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Reciprocity Characteristic of Smart Antennas in CDMA System CDMA系统中智能天线的互易特性
Xiangdong Jia, Haibao Ding
{"title":"The Reciprocity Characteristic of Smart Antennas in CDMA System","authors":"Xiangdong Jia, Haibao Ding","doi":"10.1109/NSWCTC.2009.298","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.298","url":null,"abstract":"Smart antennas (SA) has not been applied widely in 3G except TD-SCDMA. As to the application of SA in CDMA system, we argued that people hold certain incorrect view, especial the reciprocity characteristic. Generally, people consider that only using a set of SA, we can simultaneously realize multiple CDMA channels directional transmission on a single carrier frequency with the same uplink & downlink SNR gain, and the transmitting beamforming can be realized by amplitude-weight transmitting baseband signal just like the receiving beamforming. For these views about the SA direction-transmission principle in CDMA system, we did careful analysis. We proved that these opinions mentioned above are incorrect. In order to take good use of smart antennas (SA) in the CDMA system, we also proposed a feasible carrier weight method.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129944303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Wireless Network Technology and its Applications 无线网络技术及其应用
Ning Zhang, Hong Bao
{"title":"Wireless Network Technology and its Applications","authors":"Ning Zhang, Hong Bao","doi":"10.1109/NSWCTC.2009.255","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.255","url":null,"abstract":"In this paper we analyze wireless network and discuss the applications of wireless technology. In wireless network, the wireless devices should be able to operate independently of the broader Internet. In particular, there may be times during which the connection of a wireless device or network to the Internet is not available. During these times, wireless devices should be able to operate stably in modes disconnected from the rest of the infrastructure, as well as be able to opportunistically establish \"local\" ad-hoc networks using their own native protocols. This will require that devices are capable of discovering each other without the assistance of the broader network, as well as require that devices use local addressing and routing schemes.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130116848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Investigating the Optimum Carrier Sensing Range in Wireless Ad Hoc Networks 无线自组织网络中最优载波感知距离的研究
Chongqing Zhang, Qiang Xu
{"title":"Investigating the Optimum Carrier Sensing Range in Wireless Ad Hoc Networks","authors":"Chongqing Zhang, Qiang Xu","doi":"10.1109/NSWCTC.2009.349","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.349","url":null,"abstract":"Based on a realistic interference model and an effective framework for determining the optimum carrier sensing range. This paper investigates the changing rules of the optimum carrier sensing range of several types of wireless networks. Simulations are also performed using ns-2, and the results validate the effectiveness of the framework.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128905971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Research on Routing Protocol of Sense Wireless Network Based on the Greedy Algorithm 基于贪心算法的感知无线网络路由协议研究
Yuan Xin, Xu Guang-hua, Chen Xiao-jun
{"title":"The Research on Routing Protocol of Sense Wireless Network Based on the Greedy Algorithm","authors":"Yuan Xin, Xu Guang-hua, Chen Xiao-jun","doi":"10.1109/NSWCTC.2009.159","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.159","url":null,"abstract":"In the application of wireless sensor networks (WSN), the balance of energy consumption plays an important role in extending the life cycle of WSN. Aim at energy consumption of Wireless sensors network, a dynamic cluster-based routing protocol based on the greedy algorithm (GDCRP). In the protocol, nodes run for the cluster head according to the energy and location. The elected cluster head has optimal value of energy and location. When the cluster is formed, the sink node initiates the request of routing establishment; the cluster heads choose the nodes that send it the packet as the upper nodes according to energy and hops count to the sink node. After a period of the network operating, then choose nodes according to the energy value and distance as the cluster head once again in order to avoid network failure because of one node failure. The protocol balances energy consumption of the network effectively, and extends the life cycle of the entire network.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130694108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research of P-code Direct Acquisition Technology p码直接获取技术研究
Qina Yong, Zhang Bang-ning, Guo Dao-sheng, Ye Zhan
{"title":"Research of P-code Direct Acquisition Technology","authors":"Qina Yong, Zhang Bang-ning, Guo Dao-sheng, Ye Zhan","doi":"10.1109/NSWCTC.2009.34","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.34","url":null,"abstract":"The article provides a new design of P-code direct acquisition module based on segmented coherent accumulation at frequency domain. Firstly, realizable solution of acquisition system is given, and its principle is introduced. Subsequently, according to specific environment where navigation terminal works, probability of detection and average acquisition time of acquisition system are deduced. The conclusion is proved by simulation, and average acquisition time and probability of detection are analyzed in different condition. Research shows that the P-code direct acquisition module works effectively at low signal-to-noise rate in high dynamic environment.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130735301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Remediation Model and Its Realization Based on Trusted Network 基于可信网络的修复模型及其实现研究
J. Zhang, Yanheng Liu, Jian Wang, Xiaomin Liu
{"title":"Research on Remediation Model and Its Realization Based on Trusted Network","authors":"J. Zhang, Yanheng Liu, Jian Wang, Xiaomin Liu","doi":"10.1109/NSWCTC.2009.101","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.101","url":null,"abstract":"Although trusted computing group proposed the concept of trusted remediation, the detailed implementations are not given, and also how to build isolated environment was not involved. A new trusted remediation model called TRNM was put forward. Also the implementations of the presented model were given. Moreover, the communication and authentication process of presented model were discussed. Simulations results show that by the proposed model, not only the safety and reliability of network can be ensured, but also the convenient and reliable remediation services are able to be provided to those terminals without according with the security policy of local network.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130470276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Method of Breadth-first Searches with AI-Properties of VCN 一种基于VCN ai特性的宽度优先搜索新方法
Qiusun Ye
{"title":"A Novel Method of Breadth-first Searches with AI-Properties of VCN","authors":"Qiusun Ye","doi":"10.1109/NSWCTC.2009.121","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.121","url":null,"abstract":"This paper makes an analyzing and discussing of Breadth-first Search technology of both FCN and VCN in searching without information, and points out that, merits and demerits of two Numbers on searching without information. And then, it gives a novel realization method of Breadth-first Search in problem-solving which sometimes we should think simultaneously over the intelligent properties of VCN, and gives out an example of the problem-solving method, i.e. the problem-solving such as catching fish with casting a net or boy-herder picks peaches by climbing up a tree.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127820710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Programs Behaviors on Context Dependency
Pan Jianjing, Peng Xinguang
{"title":"Detection of Programs Behaviors on Context Dependency","authors":"Pan Jianjing, Peng Xinguang","doi":"10.1109/NSWCTC.2009.143","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.143","url":null,"abstract":"Anomaly detection of privileged program behaviors is one of the most important means to ensure the system security. An alternative modeling method is proposed based on the BP neural network classifier, which builds upon the concept of the context dependency short sequences and the specially designed m-nearest algorithm. It is because that the neural network classifiers have the advantages of high generalization capability on unknown data, and the context dependency can more accurately determine the nature of local behaviors for the short sequences, behavior detection performance of program traces was evidently improved as compared with the previous modeling method.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127900745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability Analysis of Intelligent Network System 智能网络系统脆弱性分析
Danfeng Yan, Fangchun Yang
{"title":"Vulnerability Analysis of Intelligent Network System","authors":"Danfeng Yan, Fangchun Yang","doi":"10.1109/NSWCTC.2009.27","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.27","url":null,"abstract":"All attacks come from the successful utilization of the vulnerabilities of the telecommunication network or systems by the attackers. So it is the first important thing to clear the vulnerability of certain network or system. The theoretic methods are available to analyze the shortcomings of network topology and actions. Lots of vulnerabilities are found by practical work. This paper analyzes and summarizes the vulnerabilities of intelligent network system from realization application cases. It is valuable to the father research and development work.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123262163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信