2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)最新文献

筛选
英文 中文
Mobile-based continuous user authentication system for cloud security 基于移动端的云安全连续用户认证系统
Qing Li, Le Wang, Taeguen Kim, E. Im
{"title":"Mobile-based continuous user authentication system for cloud security","authors":"Qing Li, Le Wang, Taeguen Kim, E. Im","doi":"10.1109/ICNIDC.2016.7974559","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974559","url":null,"abstract":"Recently, Cloud based services have become very popular, and many people are willing to use cloud services because of their convenience. For instance, people would like to store their files in the cloud storage, and the files may contain important data or private information. If important files are accessed by unauthorized users due to unsecure cloud services, it may cause financial losses and people may be unwilling to use cloud services. Consequently, how to increase security of cloud services is quite important for the services to be successful and used widely. In addition, mobile devices have become more and more popular, and one of the main accessing devices to cloud services is mobile devices. In this paper, we propose a mobile-based continuous user authentication system to protect cloud service users.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125294445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A generation method for acoustic two-dimensional barcode 声学二维条码的生成方法
Ye Li, Xiaofeng Ma, Jingsai Jiang, P. Zhang, Yanhong Fan, Qiuyun Hao, H. V. Davyday
{"title":"A generation method for acoustic two-dimensional barcode","authors":"Ye Li, Xiaofeng Ma, Jingsai Jiang, P. Zhang, Yanhong Fan, Qiuyun Hao, H. V. Davyday","doi":"10.1109/ICNIDC.2016.7974585","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974585","url":null,"abstract":"With rapid development of information technology and upgrading of intelligent terminals, two-dimensional barcode has been widely used as a carrier to store, transfer and retrieve information. Due to the limited capacity, current two-dimensional barcodes are designed to embed text-only messages. In this paper, a generation method for acoustic two-dimensional barcode is proposed. It is based on speech compression, in which low encoding rate is obtained while maintaining high voice quality by introducing MELP compression method. The compressed data stream is then embedded to generate the two-dimensional barcode. In practical applications, the acoustic two-dimensional barcode can be easily scanned by the intelligent terminals installed with decoding software, and then the embedded speech can be decoded and played. When compression rate is equal to 600bps, the embedded speech length can up to 39s. Thus, the application of two-dimensional barcode can be effectively promoted.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123729533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference alignment in cognitive network with cooperative primary users 协同主用户认知网络中的干扰对齐
Jiazhen Li, Li Guo, Chao Dong, Tianyu Kang
{"title":"Interference alignment in cognitive network with cooperative primary users","authors":"Jiazhen Li, Li Guo, Chao Dong, Tianyu Kang","doi":"10.1109/ICNIDC.2016.7974574","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974574","url":null,"abstract":"This paper considers a network consists of multiple primary users (PUs) and secondary users (SUs). To seek for the pre- and post-coding matrices of the PUs and SUs that improve the system output, the author applies Max-SINR algorithm for the PUs and cognitive interference alignment (IA) for the SUs. Then by counting the number of variables and the number of equations in the IA condition, this paper analyzes the achievable DoF of all users. Simulation results show that the PUs using max-SINR achieve higher rate than using standard IA with negligible SUs rate reduction.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130418143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blind estimation of reverberation time using deep neural network 基于深度神经网络的混响时间盲估计
Myungin Lee, Joon‐Hyuk Chang
{"title":"Blind estimation of reverberation time using deep neural network","authors":"Myungin Lee, Joon‐Hyuk Chang","doi":"10.1109/ICNIDC.2016.7974586","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974586","url":null,"abstract":"In this paper, we propose a method to estimate reverberation time (T60) from the observed reverberant speech signal using deep neural network (DNN). Reverberation of speech signal is a critical issue in speech processing as the reverberation results smearing of the sound characteristics in both temporal and spectral domain resulting unfavorable effects on the performance of speech processing algorithms. Employing room acoustic characteristics of a reverberant speech can enhance the performance of the speech processing system so that the blind estimation of reverberation time has been studied based on the numerical interpretation of reverberation. In this paper, we adopt the speech decay rate and its distribution for each frequency bin as input feature vectors of DNN. Complex relation between each input feature vector and each T60 target label through multiple nonlinear hidden layers. We also introduce an approach to mitigate the computational complexity whilst maintaining rational performance.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127851207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A defense mechanism against the DNS amplification attack in SDN 一种针对SDN中DNS放大攻击的防御机制
X. Xing, Tao Luo, Jianfeng Li, Yang Hu
{"title":"A defense mechanism against the DNS amplification attack in SDN","authors":"X. Xing, Tao Luo, Jianfeng Li, Yang Hu","doi":"10.1109/ICNIDC.2016.7974530","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974530","url":null,"abstract":"As one of the most harmful DDoS (distributed deny of service) attacks, the DNS (domain name system) amplification attack has been a big threat to nowadays networks. Researchers have done much work to defend against this kind of attack in traditional networks. The SDN (software defined network) architecture, as a clear indication of future networking architecture, faces the same threat of DNS amplification attack. In this paper, we propose a defense mechanism consisting of three phases. The defense mechanism can easily detect the attacks, protect the victim quickly, then pinpoint all zombies and finally isolate them from the SDN network. Simulation results show that the proposed mechanism detects attacks accurately with low consumption, protects victim with quick response and has little impact on normal DNS queries of victim. Besides, after pinpointing and isolating all zombies in the network, the whole network's recovery speed is increased.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128069430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Shopping store management system based on IR-UWB radar sensors 基于IR-UWB雷达传感器的商场管理系统
Xuanjun Quan, D. Yim, S. Cho
{"title":"Shopping store management system based on IR-UWB radar sensors","authors":"Xuanjun Quan, D. Yim, S. Cho","doi":"10.1109/ICNIDC.2016.7974621","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974621","url":null,"abstract":"The impulse radio ultra-wideband (IR-UWB) radar technology is attracted strong attention for various applications such as crowdedness measurement, building energy management system, vital sign monitoring, and counting the number of inbound and outbound people. In this paper, we propose a shopping store management system based on IR-UWB radar sensors. In order to manage a shopping store, checking the number of entered customers and sweet spot of a store is necessary. Here, sweet spot means the average residence time of customers in one hour. To get these two information, two applications of IR-UWB radar sensor are required. One is counting the number of inbound and outbound people, and the other one is crowdedness measurement. To validate this system, we install this system in a real shopping store. The performance of the shopping store management system is given in this paper, and the results show that our system is applicable.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126501744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning mention and relation representation with convolutional neural networks for relation extraction 用卷积神经网络学习关联提取和关联表示
Shuohong Liang, Guang Chen, Wei Wang
{"title":"Learning mention and relation representation with convolutional neural networks for relation extraction","authors":"Shuohong Liang, Guang Chen, Wei Wang","doi":"10.1109/ICNIDC.2016.7974612","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974612","url":null,"abstract":"Most previous works for relation extraction are based on handcrafting sentence-level features such as part of speech, named entity and dependency tree path properties. This paper proposes a new approach to learn the embedding of the mentions and their relations using convolutional neural networks with a pairwise ranking loss function. Through the learned mention and relation embeddings we can get a score to evaluate the relevance of a given pair of mention and relation. We show that our approach using word embeddings as input features for our model can learn better mention and relation representation and is superior to state-of-the-art results.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127170591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Capacity analysis and comparison for cellular systems over different frequency bands 不同频段蜂窝系统的容量分析与比较
Zhan Xu, Jienan Liu, Wei Zhang, Shidong Zhou, Weuqi Waug
{"title":"Capacity analysis and comparison for cellular systems over different frequency bands","authors":"Zhan Xu, Jienan Liu, Wei Zhang, Shidong Zhou, Weuqi Waug","doi":"10.1109/ICNIDC.2016.7974551","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974551","url":null,"abstract":"Operating frequency bands of the third generation (3G) cellular system and the long-term evolution (LTE) are usually below 3GHz. However, due to the limitation on bandwidth available below 3GHz, the throughput or capacity of 3G and LTE systems cannot be increased easily. This research investigated the feasibility of the application of a wider spectrum in the higher frequency band, such as 6–15GHz band to provide higher capacity for future mobile access. We studied the cumulative distribution of user throughput in cellular communication systems over different frequency bands. In order to evaluate the cellular capacity over different frequency bands, we set up a general cellular simulation model with configurable parameters such as cellular size, user density and frequency reuse factor. We analyzed the capacity of higher frequency communication according to the WINNER II model. The simulation results show that for given transmission environments, higher frequency bands can achieve better system capacity performance.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115359271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Movement analysis during sleep using an IR-UWB radar sensor 使用IR-UWB雷达传感器分析睡眠期间的运动
Jae Min Lee, J. Choi, S. Cho
{"title":"Movement analysis during sleep using an IR-UWB radar sensor","authors":"Jae Min Lee, J. Choi, S. Cho","doi":"10.1109/ICNIDC.2016.7974622","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974622","url":null,"abstract":"An IR-UWB radar sensor could be used to monitor vital signs such as breathing, heartbeat rate, and movement during sleep with non-contact method. In most sleep monitoring system, heartbeat rate and respiration are mostly analyzed. In this paper, we propose an algorithm for analyzing the human body movements during sleep using an IR-UWB radar sensor. To catch the detail movements, we minimized the transition time for calculating a movement index. The movements are categorized as four kinds based on the moving part of body. The four parts are arms, legs, head, and body. Each part is also divided as three grades based on the moving degree. To prove the performance of our algorithm, we tested in real-world during 1 night. The test result proved utility of the proposed algorithm.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121415160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Cooperative spectrum sensing for non-time-slotted full-duplex cognitive radio networks 非时隙全双工认知无线电网络的协同频谱感知
Tianwei Hou, Xiaodong Ji, Zexu Li, Yong Li
{"title":"Cooperative spectrum sensing for non-time-slotted full-duplex cognitive radio networks","authors":"Tianwei Hou, Xiaodong Ji, Zexu Li, Yong Li","doi":"10.1109/ICNIDC.2016.7974552","DOIUrl":"https://doi.org/10.1109/ICNIDC.2016.7974552","url":null,"abstract":"A new cooperative spectrum sensing method for non-time-slotted full duplex cognitive radio networks (FD-CRNs) is proposed in this paper, with the self-interference channel considered as Nakagami-m fading channel, which is more practical compared with commonly used Rayleigh and Rice channel. Closed-form expressions of the probabilities of false alarm and detection are provided in this paper for non-time-slotted FD-CRNs case. Furthermore, a novel cooperative scheme is also proposed, and compared with traditional OR fusion rule, our cooperative scheme improves the throughput of secondary (unlicensed) user (SU) without affecting the throughput of the primary (licensed) user (PU), when the signal-to-noise ratio (SNR) of the SU is in a reasonable range. Numerical and simulation results demonstrate the advantage of our proposed scheme.","PeriodicalId":439987,"journal":{"name":"2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122021640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信