2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)最新文献

筛选
英文 中文
Multicast scheme with subgroups over heterogeneous cellular network 异构蜂窝网络上带子组的多播方案
Tang Liu, Hailun Xia, Chunyan Feng
{"title":"Multicast scheme with subgroups over heterogeneous cellular network","authors":"Tang Liu, Hailun Xia, Chunyan Feng","doi":"10.1109/ICNIDC.2016.7974605","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974605","url":null,"abstract":"Wireless multimedia traffic has increased considerably in recent years, which puts forward higher demand on the capacity of existing network. Multicast, as a transmission strategy with high spectral efficiency, has not been widely studied in heterogeneous cellular network (HetNet). Meanwhile, in order to overcome the shortcoming of conventional multicast scheme (CMS) that the throughput of multicast group is constrained by the user with lowest data rate, we propose a multicast scheme with subgroups over HetNet to effectively improve the system throughput. We formulate an expression of system throughput of the proposed multicast scheme with subcarrier and power constraints and maximize it by optimizing subgroups configuration. It can be proved to be a NP-hard combinatorial problem, then we decouple it into three subproblems, namely, user association (UA), subgroup formation (SF) and resource allocation (RA). In UA, we present a traffic-oriented access method based on reference signal receiving power (RSRP). In SF, the associated users are divided into several subgroups according to their channel state information (CSI) and the users in one subgroup are served with appropriate rate determinated by the CSI level of the subgroup. In RA, Round-Robin schedule and Equal Power schedule are adopted for subcarrier allocation and power allocation respectively. Simulation results show that the system throughput is significantly improved by using our scheme.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128492285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable collaborative filtering based on efficient identification of similar users 基于高效识别相似用户的可扩展协同过滤
Sang-Chul Lee, Si-Yong Lee, Dong-Kyu Chae, Sang-Wook Kim
{"title":"Scalable collaborative filtering based on efficient identification of similar users","authors":"Sang-Chul Lee, Si-Yong Lee, Dong-Kyu Chae, Sang-Wook Kim","doi":"10.1109/ICNIDC.2016.7974566","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974566","url":null,"abstract":"User-based collaborative filtering suffers from significant amount of computational overhead to find users similar to a target user. To reduce the overhead, we propose a novel method to identify unnecessary users and items in computing the similarity. Also, we propose a data structure to support the method quite efficiently. Through extensive experiments, we show the proposed method outperforms traditional methods up to 33.8 times.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129065831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A network risk assessment methodology for power communication business 电力通信业务网络风险评估方法
Ze Shao, Yang Wang, Xiangzhou Chen, Yan Zhang, Junqin He, Zhiqiang Wang
{"title":"A network risk assessment methodology for power communication business","authors":"Ze Shao, Yang Wang, Xiangzhou Chen, Yan Zhang, Junqin He, Zhiqiang Wang","doi":"10.1109/ICNIDC.2016.7974532","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974532","url":null,"abstract":"To improve the power communication network risk assessment techniques, we proposed a network risk assessment method for power business. The method is based on the risk assessment relationship model consisted of communication network and power network. According to the risk caused by different levels business faults in physical link layer, network topology layer and business layer, the model uses probabilistic methods to calculate the loss of business caused by network element fault, and then comes out the network risk for business. The simulation results show that this method is easy to understand, and can be deployed to identify the business weaknesses through the risk assessment results, targeted to enhance link reliability or adjust service deployment, reducing the risk of the network.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114404889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A low energy algorithm of wireless sensor networks based on fractal dimension 基于分形维数的无线传感器网络低能量算法
C. Fan, Ting Dong, Z. Wen, Qiong Wu
{"title":"A low energy algorithm of wireless sensor networks based on fractal dimension","authors":"C. Fan, Ting Dong, Z. Wen, Qiong Wu","doi":"10.1109/ICNIDC.2016.7974616","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974616","url":null,"abstract":"An optimization algorithm (LEA algorithm) of wireless sensor networks based on network fractal dimension calculation is proposed and intended to tackle energy limitation of nodes and their imbalanced energy consumption. Compared with LEA algorithm about the energy consumption, which is based on both long range dependence model (PFM model) and short range related model (TIAF model), where PFM and TIAF model are related to network structure dimension and network data flow dimension respectively, the Optimization algorithm not only calculates each cluster or sub-networks dimension in one round in order to decide which dimension is higher than the threshold and then makes changes, but also calculates data flow dimension in order to select a better route for data transmission. The methods of dimension calculation for network structure and data flow are simply fractal and multifractal. Simulation results show that the proposed method can more effectively lengthen the network lifetime and nodes working hours than the traditional methods.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127125870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The static detection analysis technology of Android source codes Android静态检测分析技术的源代码
Yanhui Guo, L. Yang, Xiaomeng Gao, Kun Wu
{"title":"The static detection analysis technology of Android source codes","authors":"Yanhui Guo, L. Yang, Xiaomeng Gao, Kun Wu","doi":"10.1109/ICNIDC.2016.7974582","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974582","url":null,"abstract":"With the increasingly rampant malicious attacks of Android terminal, this paper proposes a detection technology of Android platform source code security based on static analysis. The technology uses the existing static analysis technology of Java source code, and joins Android implicit methods invocation processing, at last gets the control flow graph and data flow graph, which are based on Android source code and have no breakpoint. The technology analysis the malicious behavior of Android source code depending on the information flow graph, and then get the main loophole and flaw existed in Android project. Using this technology to detect multiple open source Android projects, the experimental results show that this technology can effectively detect the main loophole and flaw existing in Android source code. What's more, the technology can display complete attack path, which is convenient for developers to modify and maintain the project. Therefore, this technology has high practical value.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127415211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cooperative video coding scheme with fountain code on the concentration on data size 与喷泉码合作的视频编码方案集中在数据量上
Hao Yu, Yumei Wang, Yu Liu
{"title":"Cooperative video coding scheme with fountain code on the concentration on data size","authors":"Hao Yu, Yumei Wang, Yu Liu","doi":"10.1109/ICNIDC.2016.7974592","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974592","url":null,"abstract":"In wireless video broadcast system, Cooperative coding technique combines the cooperative communications with channel coding technique so as to guarantees high performance, which could bring better experience for users. But the high performance is as the cost of more bandwidth to serve more data size. In this paper, we propose a cooperative coding scheme using fountain code to decrease the data size we need to transport. We present the cooperative coding schemes with decode-forward (DF) mode. The experiment results show that this scheme decreases the data size that we need to transport compared with those using LDPC codes and improves the throughput.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125682389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SDN-based container management scheme with flexibly addresses allocation capability 基于sdn的容器管理方案,具有灵活的地址分配能力
Yaodong Huang, Xiaohong Huang, Pei Zhang
{"title":"SDN-based container management scheme with flexibly addresses allocation capability","authors":"Yaodong Huang, Xiaohong Huang, Pei Zhang","doi":"10.1109/ICNIDC.2016.7974525","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974525","url":null,"abstract":"The rapid development of container-based virtualization provides an alternative to virtual machine technology used in cloud environment. However, we notice that the shortcoming in networking of this technology, such as complexity in communication between containers in different hosts and the waste of network addresses when directly allocating public IP addresses to containers, limits its availability on complicated scenarios. In order to solve these problems, we propose a solution named SDN-based NGroups Management Scheme (SNMS). In our solution, containers are organized into different NGroups, and public network addresses are allocated to NGroups too. Containers in the same NGroup can communicate with each other using “localhost” as target, and clients outside of an NGroup can fetch services using this NGroup's address. We adopt SDN technology to route traffic in order to accomplish these objectives. In this paper, we present detailed design for the solution and build a prototype based on our design. By using our prototype, container's position has nothing to do with service providing, and public network addresses are greatly saved because containers inside an NGroup share the same network configuration to the outside world. In the meantime, the performance of creating containers and HTTP downloading in our prototype is not bad than, in some case even better than, those in existing solutions nowadays.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124368031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of timer interrupt interval on file system synchronization overhead 定时器中断间隔对文件系统同步开销的影响
H. Son, Seongjin Lee, Y. Won
{"title":"Effect of timer interrupt interval on file system synchronization overhead","authors":"H. Son, Seongjin Lee, Y. Won","doi":"10.1109/ICNIDC.2016.7974543","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974543","url":null,"abstract":"File system metadata is indispensable in both describing the data and maintaining the file system. Despite the importance of metadata in the file system, the overhead of maintaining the metadata cannot be taken lightly. It is because the metadata also have to be persisted on the storage device and it consumes IO bandwidth as well as creates journaling overhead. In this paper, we find that the random write with synchronous performance of a storage is significantly affected by not only the hardware performance but also timer interrupt interval of the kernel. Extending the timer interrupt interval allows reducing the write volume and increasing the random write followed by fsync() performance of EXT4 file system. We propose intermittent mtime timestamp update on Coarse grain mtime interval instead of Fine grain mtime interval. The experiment results with mtime update interval of 1 second show that the total write volume is decreased by 75% and 28%, respectively compared to total write volume of 1 ms and 10 ms mtime interval, and the throughput increased 3.1× and 1.2× compared to 1 ms and 10 ms mtime interval. Coarse grain mtime update is resolve to the journaling overhead issues while still logging mtime timestamp.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116577705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
No noticeable difference evaluation of image data compression 图像数据压缩无明显差异评价
E. Jang
{"title":"No noticeable difference evaluation of image data compression","authors":"E. Jang","doi":"10.1109/ICNIDC.2016.7974626","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974626","url":null,"abstract":"In this paper, a new way of evaluating image compression performance is proposed in order to reflect the human visual perception perspective in image compression and its applications: “No noticeable difference (NND) is allowed in commercial use.” Various methodologies have been proposed and utilized to evaluate image compression performance with both objective and subjective measures for the given rate-distortion curve, which is used to claim that a codec is better than another in a quantitative manner. In this paper, a NND-based subjective experiment is carried out to see if the existing standard image codecs such as JPEG and JPEG2000 still make a reasonable difference in performance. The experimental results on standard test images reveal that there is no great difference in performance between the two standard codecs including a few cases where JPEG outperformed JPEG2000.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133916428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast subpixel displacement estimation for images using chirp transform algorithm 基于chirp变换算法的图像快速亚像素位移估计
Hayato Iwata, M. Abe, M. Kawamata
{"title":"Fast subpixel displacement estimation for images using chirp transform algorithm","authors":"Hayato Iwata, M. Abe, M. Kawamata","doi":"10.1109/ICNIDC.2016.7974596","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974596","url":null,"abstract":"This paper proposes a fast estimation method of subpixel displacement of images using the phase-only correlation with chirp transform algorithm. The subpixel displacement estimation using phase-only correlarion has high robustness and accuracy but requires high computational cost. The chirp transform is used to the subpixel displacement estimation to reduce the computational cost when the range of displacement to be estimated is limited to small area. The proposed method is applied to the displacement estimation of images, and is able to reduce computation time to 1/3 of that of a conventional method.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133937501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信