首页 > 最新文献

2008 IEEE International Multitopic Conference最新文献

英文 中文
Impact of nano particles on semiconductor manufacturing 纳米粒子对半导体制造的影响
Pub Date : 2008-12-23 DOI: 10.1109/INMIC.2008.4777715
F. Wali, D. Knotter, F. Kuper
Semiconductor industry faces a continuous challenge to decrease the transistor size as well as to increase the yield by eliminating defect sources. One of the sources of particle defects is ultra pure water used in different production tools at different stages of processing. In this paper, particle count data measured in ultra pure water is related to the yield of two large size products. An impact of nanoparticle present in ultra pure water on yield of up to 4-6 % has been found in two different products.
半导体工业面临着减小晶体管尺寸和通过消除缺陷源来提高良率的持续挑战。颗粒缺陷的来源之一是不同生产工具在不同加工阶段使用的超纯水。在超纯水中测得的颗粒数数据与两种大粒径产品的产率有关。在两种不同的产品中发现,超纯水中存在的纳米颗粒对产率的影响高达4- 6%。
{"title":"Impact of nano particles on semiconductor manufacturing","authors":"F. Wali, D. Knotter, F. Kuper","doi":"10.1109/INMIC.2008.4777715","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777715","url":null,"abstract":"Semiconductor industry faces a continuous challenge to decrease the transistor size as well as to increase the yield by eliminating defect sources. One of the sources of particle defects is ultra pure water used in different production tools at different stages of processing. In this paper, particle count data measured in ultra pure water is related to the yield of two large size products. An impact of nanoparticle present in ultra pure water on yield of up to 4-6 % has been found in two different products.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"42 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113941946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Graphical modeling and optimization of air interface standards for Software Defined Radios 软件无线电空中接口标准的图形化建模和优化
Pub Date : 2008-12-23 DOI: 10.1109/INMIC.2008.4777785
S. T. Gul, C. Moy, J. Palicot
Design of software defined radio (SDR) systems is very challenging because it is very difficult to design a system that preserves most of the properties of the ideal software radio while being realizable with current day technology. The complexity of such systems is the bottleneck and without a careful design approach, no feasible realization may appear. This article introduces a new methodology for selecting the common operators to design SDR. It aims at minimizing the resources use. An SDR consists of software components whose behavior can be changed by reconfiguration procedure. In a common operator design this change requires only an adjustment of certain parameters. In order to optimize the choice of these operators we first make an oriented graph that shows the interrelationship between various components of the system. Then, an architectural exploration extracts the common operators of a given multi-standard system. The need for optimization in software defined radios is underlined and the two selected techniques for the optimization are thoroughly described. The benefits of simulating annealing (SA) technique are exemplified by a comparison with exhaustive search strategies for optimization.
软件无线电(SDR)系统的设计是非常具有挑战性的,因为很难设计一个系统,既保留了理想的软件无线电的大部分特性,又可以用当前的技术实现。这种系统的复杂性是瓶颈,如果没有仔细的设计方法,就不会出现可行的实现。本文介绍了一种选择通用算子设计SDR的新方法。它的目的是尽量减少资源的使用。SDR由软件组件组成,这些组件的行为可以通过重新配置过程来改变。在普通操作器设计中,这种变化只需要对某些参数进行调整。为了优化这些操作符的选择,我们首先制作了一个有向图,显示了系统各个组件之间的相互关系。然后,对给定的多标准系统进行架构探索,从中提取出共同的操作符。强调了软件无线电优化的必要性,并对优化的两种选择技术进行了彻底的描述。通过与穷举搜索策略的比较,说明了模拟退火(SA)技术的优点。
{"title":"Graphical modeling and optimization of air interface standards for Software Defined Radios","authors":"S. T. Gul, C. Moy, J. Palicot","doi":"10.1109/INMIC.2008.4777785","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777785","url":null,"abstract":"Design of software defined radio (SDR) systems is very challenging because it is very difficult to design a system that preserves most of the properties of the ideal software radio while being realizable with current day technology. The complexity of such systems is the bottleneck and without a careful design approach, no feasible realization may appear. This article introduces a new methodology for selecting the common operators to design SDR. It aims at minimizing the resources use. An SDR consists of software components whose behavior can be changed by reconfiguration procedure. In a common operator design this change requires only an adjustment of certain parameters. In order to optimize the choice of these operators we first make an oriented graph that shows the interrelationship between various components of the system. Then, an architectural exploration extracts the common operators of a given multi-standard system. The need for optimization in software defined radios is underlined and the two selected techniques for the optimization are thoroughly described. The benefits of simulating annealing (SA) technique are exemplified by a comparison with exhaustive search strategies for optimization.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123860855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A pruned fuzzy k-nearest neighbor classifier with application to electrocardiogram based cardiac arrhytmia recognition 一种基于心电图的模糊k近邻分类器的心律失常识别
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777725
F. A. Afsar, M. Akram, M. Arif, J. Khurshid
This paper renders a fuzzy nearest neighbor classifier with data pruning to reduce the number of stored prototypes to minimize memory and computational time requirements. The incorporation of fuzzy set theory into nearest neighbor classification makes the decision process more flexible and adaptable to noise in the data. We have also embodied an efficient approach for nearest neighbor search in our algorithm which results in significant reduction in computational time during training and classification. We present results of classification of different data sets from the University of California, Irvine (UCI) machine learning repository to illustrate the effectiveness of the suggested approach for classification purposes. We also give an application of the proposed classification methodology to electrocardiogram (ECG) based recognition of 9 types of arrhythmias using wavelet domain features. The results obtained (~97% accuracy), clearly indicate the effectiveness of this algorithm in the design of a practical ECG analyzer.
本文提出了一种带有数据修剪的模糊最近邻分类器,以减少存储的原型数量,从而最小化内存和计算时间需求。将模糊集理论引入到最近邻分类中,使得决策过程更加灵活,对数据噪声的适应能力更强。我们还在我们的算法中嵌入了一种有效的最近邻搜索方法,从而大大减少了训练和分类期间的计算时间。我们展示了来自加州大学欧文分校(UCI)机器学习存储库的不同数据集的分类结果,以说明所建议的分类方法的有效性。我们还将所提出的分类方法应用于基于小波域特征的9种心律失常的心电图识别。结果表明,该算法在实际心电分析仪设计中的有效性(准确率约为97%)。
{"title":"A pruned fuzzy k-nearest neighbor classifier with application to electrocardiogram based cardiac arrhytmia recognition","authors":"F. A. Afsar, M. Akram, M. Arif, J. Khurshid","doi":"10.1109/INMIC.2008.4777725","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777725","url":null,"abstract":"This paper renders a fuzzy nearest neighbor classifier with data pruning to reduce the number of stored prototypes to minimize memory and computational time requirements. The incorporation of fuzzy set theory into nearest neighbor classification makes the decision process more flexible and adaptable to noise in the data. We have also embodied an efficient approach for nearest neighbor search in our algorithm which results in significant reduction in computational time during training and classification. We present results of classification of different data sets from the University of California, Irvine (UCI) machine learning repository to illustrate the effectiveness of the suggested approach for classification purposes. We also give an application of the proposed classification methodology to electrocardiogram (ECG) based recognition of 9 types of arrhythmias using wavelet domain features. The results obtained (~97% accuracy), clearly indicate the effectiveness of this algorithm in the design of a practical ECG analyzer.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127301369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Enhanced adaptive, convergent and intelligent fault monitoring in distributed systems (eACID): Working and analysis 分布式系统中增强的自适应、融合和智能故障监测(eACID):工作与分析
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777783
S. Hussain, M. Qadir
Fault monitoring is an important concern to be addressed for distributed system. With the help of an efficient fault monitoring scheme, it would be easy to determine the crash and quickly take the recovery steps. Fault monitor typically detects faults by sending and receiving messages to remote objects. We enhanced our technique ACID further with experimenting with giving precedence to the most recent response in the queue and reducing the influence factor of the last response. We tested the enhanced technique eACID to the parameters i.e. adaptiveness to the environment, convergence to the optimal value of timeout and self intelligence for not loading or pushing the object that is being monitored . We experimented with our technique along with some other proposed techniques, our scheme; eACID gave better results when compared with the schemes.
故障监测是分布式系统需要解决的一个重要问题。在有效的故障监测方案的帮助下,可以很容易地确定崩溃并快速采取恢复步骤。故障监视器通常通过向远程对象发送和接收消息来检测故障。我们进一步增强了我们的ACID技术,在队列中优先考虑最近的响应,并降低了最后一个响应的影响因子。我们测试了增强技术eACID的参数,即对环境的适应性,收敛到最优超时值以及不加载或推送被监控对象的自我智能。我们试验了我们的技术和其他一些被提议的技术,我们的方案;与其他方案相比,eACID的效果更好。
{"title":"Enhanced adaptive, convergent and intelligent fault monitoring in distributed systems (eACID): Working and analysis","authors":"S. Hussain, M. Qadir","doi":"10.1109/INMIC.2008.4777783","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777783","url":null,"abstract":"Fault monitoring is an important concern to be addressed for distributed system. With the help of an efficient fault monitoring scheme, it would be easy to determine the crash and quickly take the recovery steps. Fault monitor typically detects faults by sending and receiving messages to remote objects. We enhanced our technique ACID further with experimenting with giving precedence to the most recent response in the queue and reducing the influence factor of the last response. We tested the enhanced technique eACID to the parameters i.e. adaptiveness to the environment, convergence to the optimal value of timeout and self intelligence for not loading or pushing the object that is being monitored . We experimented with our technique along with some other proposed techniques, our scheme; eACID gave better results when compared with the schemes.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126950883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An intelligent agri-information dissemination framework: An e-Government 智能农业信息发布框架:电子政务
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777796
Q. Ahmad, I. Sarwar
Farmers, specifically of developing countries, face problems like soil attrition, yield losses, reduced market prices, increased pesticides costs and economic barriers. These problems prevent these cultivators from adopting modern farming strategies and hence render them vulnerable. However, these farmers can use pre-hand information to make informed decisions with respect to all agricultural operation. We propose an agriculture information system (Agr-IS) based on ICTs and e-government infrastructure for the benefit of rural farmers by educating them on different aspects of sustainable agriculture (SA). The core functionality of proposed information system is supported by an intelligent Agro-DSS which receives information for various governmental agencies and dispatches the relevant information to the lower end farmers. Agro-DSS works in collaboration with Agr-IS, various other open source software (like Asterisk server), and SOA-based e-government infrastructure for the dissemination of up-to-date agricultural information in a readily accessible and easily understood form, to farmers, agricultural researchers, and advisers. In order to improve the governmental involvement in agriculture to leverage agricultural reforms, the capabilities of SOA are exploited using SOA-based e-government infrastructure. It will help significantly in bridging the gap between rural farmers and governmental agencies. With a diverse biophysical and socio-economic data and knowledge, the presented infrastructure will help reduce the uncertainty and improve decision making process by providing access to data, procedures and analytical capability.
农民,特别是发展中国家的农民,面临着诸如土壤磨损、产量损失、市场价格下降、农药成本增加和经济壁垒等问题。这些问题阻碍了这些种植者采用现代农业策略,从而使他们变得脆弱。然而,这些农民可以利用事先掌握的信息对所有农业经营作出明智的决定。我们建议建立一个基于信息通信技术和电子政务基础设施的农业信息系统(Agr-IS),通过对农民进行可持续农业(SA)不同方面的教育,使他们受益。拟议的信息系统的核心功能由智能农业决策支持系统支持,该系统接收各种政府机构的信息,并将相关信息发送给低端农民。农业决策支持系统与Agr-IS、各种其他开源软件(如Asterisk服务器)和基于soa的电子政务基础设施合作,以易于访问和易于理解的形式向农民、农业研究人员和顾问传播最新的农业信息。为了提高政府对农业的参与,以利用农业改革,SOA的功能通过基于SOA的电子政务基础设施得到充分利用。这将大大有助于弥合农村农民与政府机构之间的差距。拥有多样化的生物物理和社会经济数据和知识,所展示的基础设施将通过提供数据、程序和分析能力,帮助减少不确定性,改善决策过程。
{"title":"An intelligent agri-information dissemination framework: An e-Government","authors":"Q. Ahmad, I. Sarwar","doi":"10.1109/INMIC.2008.4777796","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777796","url":null,"abstract":"Farmers, specifically of developing countries, face problems like soil attrition, yield losses, reduced market prices, increased pesticides costs and economic barriers. These problems prevent these cultivators from adopting modern farming strategies and hence render them vulnerable. However, these farmers can use pre-hand information to make informed decisions with respect to all agricultural operation. We propose an agriculture information system (Agr-IS) based on ICTs and e-government infrastructure for the benefit of rural farmers by educating them on different aspects of sustainable agriculture (SA). The core functionality of proposed information system is supported by an intelligent Agro-DSS which receives information for various governmental agencies and dispatches the relevant information to the lower end farmers. Agro-DSS works in collaboration with Agr-IS, various other open source software (like Asterisk server), and SOA-based e-government infrastructure for the dissemination of up-to-date agricultural information in a readily accessible and easily understood form, to farmers, agricultural researchers, and advisers. In order to improve the governmental involvement in agriculture to leverage agricultural reforms, the capabilities of SOA are exploited using SOA-based e-government infrastructure. It will help significantly in bridging the gap between rural farmers and governmental agencies. With a diverse biophysical and socio-economic data and knowledge, the presented infrastructure will help reduce the uncertainty and improve decision making process by providing access to data, procedures and analytical capability.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114144009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient and robust approach of iris recognition through Fisher Linear Discriminant Analysis method and Principal Component Analysis method 基于Fisher线性判别分析和主成分分析的虹膜识别方法
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777739
Q. Emad ul Haq, M. Javed, Q. Sami ul Haq
Iris recognition has emerged as a vital and tested methodology for research investigations and routine security applications in the context of increasing security requirements. Thus biometrics has attained a very significant place in human verification and identification. In this paper, an efficient and precised methodology is brought out through using Fisher linear discriminant analysis method and principal component analysis method. These methodologies create different sections in low dimensional sub space. The suggested system in this research work contains four components i.e. preprocessing, segmentation, feature extraction and matching. The preprocessing part again consist of pupil localization, image refinement, iris localization and normalization procedures. The suggested algorithm in this research paper was tested on CASIA Iris image database. The soundness and time efficiency of the suggested algorithm proves it as perfect technique for real time applications.
在日益增长的安全需求背景下,虹膜识别已成为研究调查和常规安全应用的重要和经过测试的方法。因此,生物识别技术在人体验证和身份识别中占有非常重要的地位。本文通过运用Fisher线性判别分析方法和主成分分析方法,提出了一种有效而精确的方法。这些方法在低维子空间中创建不同的部分。本研究提出的系统包括预处理、分割、特征提取和匹配四个部分。预处理部分包括瞳孔定位、图像细化、虹膜定位和归一化等步骤。本文提出的算法在CASIA虹膜图像数据库上进行了测试。该算法的有效性和实时性证明了它是实时应用的理想技术。
{"title":"Efficient and robust approach of iris recognition through Fisher Linear Discriminant Analysis method and Principal Component Analysis method","authors":"Q. Emad ul Haq, M. Javed, Q. Sami ul Haq","doi":"10.1109/INMIC.2008.4777739","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777739","url":null,"abstract":"Iris recognition has emerged as a vital and tested methodology for research investigations and routine security applications in the context of increasing security requirements. Thus biometrics has attained a very significant place in human verification and identification. In this paper, an efficient and precised methodology is brought out through using Fisher linear discriminant analysis method and principal component analysis method. These methodologies create different sections in low dimensional sub space. The suggested system in this research work contains four components i.e. preprocessing, segmentation, feature extraction and matching. The preprocessing part again consist of pupil localization, image refinement, iris localization and normalization procedures. The suggested algorithm in this research paper was tested on CASIA Iris image database. The soundness and time efficiency of the suggested algorithm proves it as perfect technique for real time applications.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128554240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cell phone jammer 手机干扰器
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777805
S.W. Shah, M. I. Babar, M. N. Arbab, K. Yahya, G. Ahmad, T. Adnan, A. Masood
This paper describes the design and implementation of two alternative techniques for jamming cell-phone communication, noise attack and spectrum distortion technique. Foreign leading electronic companies have already introduced the first technique of jamming through noise attack or denial of service, in market. Our aim is to come up with a new technique which is more robust and cost effective. In this research paper, we have compared the performance of old jamming technique with the new technique in various aspects like cost, power consumption, design complexity, robustness, coverage area, components availability and performance.
本文介绍了干扰手机通信的两种替代技术——噪声攻击和频谱失真技术的设计和实现。国外主要电子公司已经在市场上首次推出了通过噪声攻击或拒绝服务进行干扰的技术。我们的目标是提出一种更可靠、更经济的新技术。本文从成本、功耗、设计复杂度、鲁棒性、覆盖面积、器件可用性和性能等方面比较了旧干扰技术与新干扰技术的性能。
{"title":"Cell phone jammer","authors":"S.W. Shah, M. I. Babar, M. N. Arbab, K. Yahya, G. Ahmad, T. Adnan, A. Masood","doi":"10.1109/INMIC.2008.4777805","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777805","url":null,"abstract":"This paper describes the design and implementation of two alternative techniques for jamming cell-phone communication, noise attack and spectrum distortion technique. Foreign leading electronic companies have already introduced the first technique of jamming through noise attack or denial of service, in market. Our aim is to come up with a new technique which is more robust and cost effective. In this research paper, we have compared the performance of old jamming technique with the new technique in various aspects like cost, power consumption, design complexity, robustness, coverage area, components availability and performance.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128649910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Modified Reverse AODV routing algorithm using route stability in mobile ad hoc networks 移动自组网中基于路由稳定性的改进反向AODV路由算法
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777745
M. Zarei, K. Faez, J.M. Nya
In this paper a new on-demand routing protocol for mobile ad hoc networks is presented based on link/route stability estimation. AODV decreases maintenance overhead in ad hoc networks, but some path breaks can significantly cause overhead. Reverse AODV (RAODV) routing algorithm is one of the AODV versions which reduces overhead of routing. Here, we applied link/route stability in RAODV for decrease overhead of discovery and maintenance of routing, a new protocol then was created. Our protocol also increased the packet delivery ratio in mobile ad hoc networks (MANET's). When an active route fails, the source node with the awareness of stabilities of routes, can select the best route in set of available routes. We proposed a stability estimation method and applied that in an optimized version of ad hoc on demand distance vector (AODV) routing algorithm by doing some modification at RAODV algorithm. In our algorithm namely Modified Reverse Ad Hoc On-demand Vector (MRAODV), the route request packet didn't change and it is like as AODV, but rout reply packet must be changed for route stability estimation purpose. Computer simulation using ns-2 simulator was performed to compare with other methods and effectiveness of the proposed method was quantitatively validated.
提出了一种基于链路/路由稳定性估计的移动自组网按需路由协议。AODV减少了自组织网络中的维护开销,但是一些路径中断可能会显著地导致开销。反向AODV (Reverse AODV, RAODV)路由算法是减少路由开销的AODV版本之一。在这里,我们在RAODV中应用了链路/路由稳定性,以减少路由发现和维护的开销,从而创建了一个新的协议。我们的协议还提高了移动自组织网络(MANET)的分组传送率。当活动路由失效时,具有路由稳定性意识的源节点可以从一组可用路由中选择最佳路由。提出了一种稳定性估计方法,并通过对AODV算法进行修改,将其应用于优化版的AODV路由算法中。在改进的反向Ad Hoc按需向量(MRAODV)算法中,路由请求包不发生变化,与AODV类似,但为了估计路由的稳定性,必须改变路由应答包。利用ns-2模拟器进行了计算机仿真,与其他方法进行了比较,定量验证了所提方法的有效性。
{"title":"Modified Reverse AODV routing algorithm using route stability in mobile ad hoc networks","authors":"M. Zarei, K. Faez, J.M. Nya","doi":"10.1109/INMIC.2008.4777745","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777745","url":null,"abstract":"In this paper a new on-demand routing protocol for mobile ad hoc networks is presented based on link/route stability estimation. AODV decreases maintenance overhead in ad hoc networks, but some path breaks can significantly cause overhead. Reverse AODV (RAODV) routing algorithm is one of the AODV versions which reduces overhead of routing. Here, we applied link/route stability in RAODV for decrease overhead of discovery and maintenance of routing, a new protocol then was created. Our protocol also increased the packet delivery ratio in mobile ad hoc networks (MANET's). When an active route fails, the source node with the awareness of stabilities of routes, can select the best route in set of available routes. We proposed a stability estimation method and applied that in an optimized version of ad hoc on demand distance vector (AODV) routing algorithm by doing some modification at RAODV algorithm. In our algorithm namely Modified Reverse Ad Hoc On-demand Vector (MRAODV), the route request packet didn't change and it is like as AODV, but rout reply packet must be changed for route stability estimation purpose. Computer simulation using ns-2 simulator was performed to compare with other methods and effectiveness of the proposed method was quantitatively validated.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132047692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Intrusion Detection System for IP Multimedia Subsystem using K-Nearest Neighbor classifier 基于k近邻分类器的IP多媒体子系统入侵检测系统
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777775
A. H. Farooqi, Ali Munir
IP multimedia subsystem (IMS) is a new next generation networking architecture that will provide better quality of service, charging infrastructure and security. The basic idea behind IMS is convergence; providing a single interface to different traditional or modern networking architectures allowing better working environment for the end users. IMS is still not commercially adopted and used but research is in progress to explore it. IMS is an IP based overlay next generation network architecture. It inherent number of security threats of session initiation protocol (SIP), TCP, UDP etc as it uses SIP and IP protocols. Some of them can degrade the performance of IMS seriously and may cause DoS or DDoS attacks. The paper presents a new approach keeping a vision of secure IMS based on intrusion detection system (IDS) using k-nearest neighbor (KNN) as classifier. The KNN classifier can effectively detect intrusive attacks and achieve a low false positive rate. It can distinguish between the normal behavior of the system or abnormal. In this paper, we have focused on the key element of IMS core known as proxy call session control function (PCSCF). Network based anomaly detection mechanism is proposed using KNN as anomaly detector. Experiments are performed on OpenIMS core and the result shows that IMS is vulnerable to different types of attacks such as UDP flooding, IP spoofing that can cause DoS. KNN classifier effectively distinguishes the behavior of the system as normal or intrusive and achieve low false positive rate.
IP多媒体子系统(IMS)是一种新的下一代网络体系结构,它将提供更好的服务质量、收费基础设施和安全性。IMS背后的基本思想是融合;为不同的传统或现代网络体系结构提供单一接口,为最终用户提供更好的工作环境。IMS仍未在商业上采用和使用,但正在进行研究以探索它。IMS是一种基于IP的下一代覆盖网络体系结构。由于它使用SIP和IP协议,它固有的会话发起协议(SIP)、TCP、UDP等安全威胁的数量。其中一些会严重降低IMS的性能,并可能引起DoS或DDoS攻击。本文提出了一种基于入侵检测系统(IDS)的基于k近邻(KNN)分类器的安全IMS实现方法。KNN分类器可以有效检测入侵攻击,实现低误报率。它可以区分系统的正常或异常行为。在本文中,我们重点讨论了IMS核心的关键元素——代理呼叫会话控制功能(PCSCF)。提出了一种以KNN作为异常检测器的基于网络的异常检测机制。在OpenIMS核心上进行了实验,结果表明IMS容易受到不同类型的攻击,如UDP泛洪攻击、IP欺骗攻击等。KNN分类器有效地区分了系统的正常行为和侵入行为,实现了较低的误报率。
{"title":"Intrusion Detection System for IP Multimedia Subsystem using K-Nearest Neighbor classifier","authors":"A. H. Farooqi, Ali Munir","doi":"10.1109/INMIC.2008.4777775","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777775","url":null,"abstract":"IP multimedia subsystem (IMS) is a new next generation networking architecture that will provide better quality of service, charging infrastructure and security. The basic idea behind IMS is convergence; providing a single interface to different traditional or modern networking architectures allowing better working environment for the end users. IMS is still not commercially adopted and used but research is in progress to explore it. IMS is an IP based overlay next generation network architecture. It inherent number of security threats of session initiation protocol (SIP), TCP, UDP etc as it uses SIP and IP protocols. Some of them can degrade the performance of IMS seriously and may cause DoS or DDoS attacks. The paper presents a new approach keeping a vision of secure IMS based on intrusion detection system (IDS) using k-nearest neighbor (KNN) as classifier. The KNN classifier can effectively detect intrusive attacks and achieve a low false positive rate. It can distinguish between the normal behavior of the system or abnormal. In this paper, we have focused on the key element of IMS core known as proxy call session control function (PCSCF). Network based anomaly detection mechanism is proposed using KNN as anomaly detector. Experiments are performed on OpenIMS core and the result shows that IMS is vulnerable to different types of attacks such as UDP flooding, IP spoofing that can cause DoS. KNN classifier effectively distinguishes the behavior of the system as normal or intrusive and achieve low false positive rate.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130442329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A high_performance steganographic method using JPEG and PSO algorithm 一种基于JPEG和粒子群算法的高性能隐写方法
Pub Date : 2008-12-01 DOI: 10.1109/INMIC.2008.4777716
S. Fazli, M. Kiamini
In this paper, we present a novel method to embed secret message in the cover-image so that the interceptors will not notice about the existence of the hidden data. The basic concept of the proposed method is by simple Least Significant Bit (LSB) substitution. In order to improve the quality of stego-image and to increase the secret message capacity and security level, we inspire by the work of Li and Wang which splits the cover-image into n blocks of 8 times 8 pixels and the secret message into n partitions. Then we apply Particle Swarm Optimization (PSO) algorithm to search approximate optimal solutions and to find an optimal substitution matrix for transforming the secret message in each block, instead of finding only one optimal substitution matrix for the whole cover-image as in. The quality of the resulting stegoimage, the secret message capacity and the security level of the proposed method are calculated and compared to other methods. Experimental results show that the proposed method outperforms the JPEG and Quantization Table Modification (JQTM) method and the Li and Wang's work in image quality, embedding capacity and security level.
在本文中,我们提出了一种将秘密信息嵌入封面图像的新方法,使拦截器不会注意到隐藏数据的存在。该方法的基本概念是通过简单的最低有效位(LSB)替换。为了提高隐写图像的质量,增加密文容量和安全级别,我们借鉴Li和Wang的工作,将封面图像分成8 × 8像素的n个块,将密文分成n个分区。然后应用粒子群优化算法(PSO)搜索近似最优解,并找到一个最优替换矩阵来转换每个块中的秘密消息,而不是像在整个覆盖图像中只找到一个最优替换矩阵。计算了所提方法的隐写图像质量、秘密信息容量和安全级别,并与其他方法进行了比较。实验结果表明,该方法在图像质量、嵌入容量和安全级别上都优于JPEG和量化表修改(JQTM)方法以及Li和Wang的工作。
{"title":"A high_performance steganographic method using JPEG and PSO algorithm","authors":"S. Fazli, M. Kiamini","doi":"10.1109/INMIC.2008.4777716","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777716","url":null,"abstract":"In this paper, we present a novel method to embed secret message in the cover-image so that the interceptors will not notice about the existence of the hidden data. The basic concept of the proposed method is by simple Least Significant Bit (LSB) substitution. In order to improve the quality of stego-image and to increase the secret message capacity and security level, we inspire by the work of Li and Wang which splits the cover-image into n blocks of 8 times 8 pixels and the secret message into n partitions. Then we apply Particle Swarm Optimization (PSO) algorithm to search approximate optimal solutions and to find an optimal substitution matrix for transforming the secret message in each block, instead of finding only one optimal substitution matrix for the whole cover-image as in. The quality of the resulting stegoimage, the secret message capacity and the security level of the proposed method are calculated and compared to other methods. Experimental results show that the proposed method outperforms the JPEG and Quantization Table Modification (JQTM) method and the Li and Wang's work in image quality, embedding capacity and security level.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131089254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
2008 IEEE International Multitopic Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1