首页 > 最新文献

2015 7th International Conference on New Technologies, Mobility and Security (NTMS)最新文献

英文 中文
Towards software defined cognitive networking 走向软件定义的认知网络
Ijaz Ahmad, Suneth Namal, M. Ylianttila, A. Gurtov
Cognitive networking has the potential to enable autonomic network management by empowering the network components to automatically adjust to the changing network environment. However, strict isolation between the layers of the currently used communication model and static nature of networking equipment have delimited the deployment of cognitive networks. Software Defined Networking (SDN) separates the network architecture from its infrastructure to enable programmatic control of networking equipment from logically centralized servers. By adopting the principles of SDN, we propose software defined cognitive networking (SDCoN) to integrate the dynamism of cognitive networking and programmatic control of SDN. In this paper, we present the SDCoN framework and initial results from the SDCoN testbed that reveal the success of the proposed SDN-based cognitive networking architecture.
认知网络通过授权网络组件自动调整以适应不断变化的网络环境,具有实现自主网络管理的潜力。然而,当前使用的通信模型层之间的严格隔离以及网络设备的静态特性限制了认知网络的部署。软件定义网络(SDN)将网络架构与其基础设施分离开来,从而能够从逻辑上集中的服务器对网络设备进行编程控制。通过采用SDN的原理,我们提出了软件定义的认知网络(SDCoN),以整合认知网络的动态性和SDN的可编程控制。在本文中,我们提出了SDCoN框架和SDCoN测试平台的初步结果,揭示了所提出的基于sdn的认知网络架构的成功。
{"title":"Towards software defined cognitive networking","authors":"Ijaz Ahmad, Suneth Namal, M. Ylianttila, A. Gurtov","doi":"10.1109/NTMS.2015.7266528","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266528","url":null,"abstract":"Cognitive networking has the potential to enable autonomic network management by empowering the network components to automatically adjust to the changing network environment. However, strict isolation between the layers of the currently used communication model and static nature of networking equipment have delimited the deployment of cognitive networks. Software Defined Networking (SDN) separates the network architecture from its infrastructure to enable programmatic control of networking equipment from logically centralized servers. By adopting the principles of SDN, we propose software defined cognitive networking (SDCoN) to integrate the dynamism of cognitive networking and programmatic control of SDN. In this paper, we present the SDCoN framework and initial results from the SDCoN testbed that reveal the success of the proposed SDN-based cognitive networking architecture.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116163233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Enhancing immediacy of identification with multi-stage application identification 多阶段应用识别提高识别的即时性
Yuichi Kumano, S. Ata, N. Nakamura, Y. Nakahira, I. Oka
The identification of network application is important for network management such as traffic controls and anomaly traffic detection. To apply application-based traffic control promptly, the technique to progressive application identification is important. We previously proposed a method of timeliness identification of application, which can achieve to use first several packets of flow to identify applications with high accuracy whatever the traffic is encrypted or unencrypted. However, our previous method still has a challenge in terms of timeliness because it uses a single classifier with same traffic features to identify all applications, though some traffic features can be used earlier. In this paper, we propose a method of multistage application identification, which classifies progressively applications into groups with different granularity of groups. We first demonstrate that the accuracy of existing application identification is getting worse significantly, by increasing the number of application to identify. Second, propose a method of multistage identification method, and then explain group classification algorithm to classify applications into groups. Our experiment shows that our proposed method can identify applications earlier than a method of identification using a single classifier.
网络应用识别对于流量控制、异常流量检测等网络管理具有重要意义。为了快速实现基于应用的流量控制,渐进式应用识别技术至关重要。我们提出了一种应用程序的时效性识别方法,该方法可以实现无论流量是加密还是未加密,都可以使用流的前几个数据包来高精度地识别应用程序。然而,我们之前的方法在时效性方面仍然存在挑战,因为它使用具有相同流量特征的单个分类器来识别所有应用程序,尽管可以更早地使用一些流量特征。本文提出了一种多阶段应用识别方法,该方法将应用逐步划分为不同粒度的组。我们首先通过增加需要识别的应用程序的数量来证明现有应用程序识别的准确性正在明显变差。其次,提出了一种多阶段识别方法,并在此基础上阐述了分组分类算法,对应用进行分组。我们的实验表明,我们提出的方法可以比使用单个分类器的识别方法更早地识别应用程序。
{"title":"Enhancing immediacy of identification with multi-stage application identification","authors":"Yuichi Kumano, S. Ata, N. Nakamura, Y. Nakahira, I. Oka","doi":"10.1109/NTMS.2015.7266492","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266492","url":null,"abstract":"The identification of network application is important for network management such as traffic controls and anomaly traffic detection. To apply application-based traffic control promptly, the technique to progressive application identification is important. We previously proposed a method of timeliness identification of application, which can achieve to use first several packets of flow to identify applications with high accuracy whatever the traffic is encrypted or unencrypted. However, our previous method still has a challenge in terms of timeliness because it uses a single classifier with same traffic features to identify all applications, though some traffic features can be used earlier. In this paper, we propose a method of multistage application identification, which classifies progressively applications into groups with different granularity of groups. We first demonstrate that the accuracy of existing application identification is getting worse significantly, by increasing the number of application to identify. Second, propose a method of multistage identification method, and then explain group classification algorithm to classify applications into groups. Our experiment shows that our proposed method can identify applications earlier than a method of identification using a single classifier.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124104047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of lane keeping assist system for autonomous vehicles 自动驾驶汽车车道保持辅助系统设计
A. Mammeri, Guangqiang Lu, A. Boukerche
Lane detection and tracking and departure warning systems are important components of Intelligent Transportation Systems. They have particularly attracted great interest from industry and academia. Many architectures and commercial systems have been proposed in the literature. In this paper, we discuss the design of such systems regarding the following stages: pre-processing, detection, and tracking. For each stage, a short description of its working principle as well as their advantages and shortcomings are introduced. Our paper may possibly help in designing new systems that overcome and improve the shortcomings of current architectures.
车道检测跟踪和偏离预警系统是智能交通系统的重要组成部分。它们尤其引起了工业界和学术界的极大兴趣。文献中提出了许多架构和商业系统。在本文中,我们讨论了这类系统的设计,涉及以下几个阶段:预处理、检测和跟踪。对于每个阶段,简要介绍了其工作原理以及各自的优缺点。我们的论文可能有助于设计新的系统来克服和改进当前架构的缺点。
{"title":"Design of lane keeping assist system for autonomous vehicles","authors":"A. Mammeri, Guangqiang Lu, A. Boukerche","doi":"10.1109/NTMS.2015.7266483","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266483","url":null,"abstract":"Lane detection and tracking and departure warning systems are important components of Intelligent Transportation Systems. They have particularly attracted great interest from industry and academia. Many architectures and commercial systems have been proposed in the literature. In this paper, we discuss the design of such systems regarding the following stages: pre-processing, detection, and tracking. For each stage, a short description of its working principle as well as their advantages and shortcomings are introduced. Our paper may possibly help in designing new systems that overcome and improve the shortcomings of current architectures.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128766722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
NGNaaS: NGNs as cloud computing services NGNaaS: ngn作为云计算服务
F. Belqasmi, M. Barachi, J. A. Calero, M. Badra, O. Alfandi
Next Generation Networks are the future mobile telecommunication networks, capable of provisioning universal access to services (anytime, anywhere, using any device). Cloud computing is an emerging networking paradigm with several inherent advantages including easy introduction of new services, efficient resource use, scalability, and pay-per-use. Cloud computing is ubiquitous in the Internet domain, but its use in the telecommunications context is still in its infancy. Offering next generation networks as cloud computing services will facilitate their deployment and enable deployment and management cost sharing. We envision that many network operators and service providers will soon support this sharing idea, as demonstrated by a number of ongoing agreements and investigation initiatives (e.g. between Rogers and Videotron in Canada, and between Etisalat and DU in the UAE). However, many issues need to be solved before this vision becomes a reality. This position paper presents our vision for offering next generation networks as cloud services, sketches an early business model, identifies the research issues, and presents a roadmap.
下一代网络是未来的移动电信网络,能够提供对服务的普遍访问(任何时间、任何地点、使用任何设备)。云计算是一种新兴的网络范例,具有几个固有的优点,包括易于引入新服务、有效的资源使用、可伸缩性和按使用付费。云计算在互联网领域无处不在,但它在电信领域的应用仍处于起步阶段。将下一代网络作为云计算服务提供,将有助于其部署,并实现部署和管理成本的共享。我们预计,许多网络运营商和服务提供商将很快支持这一共享理念,正如许多正在进行的协议和调查计划所证明的那样(例如,加拿大的Rogers和Videotron之间,以及阿联酋的Etisalat和DU之间)。然而,在这一愿景成为现实之前,还有许多问题需要解决。这份立场文件展示了我们将下一代网络作为云服务提供的愿景,概述了早期商业模式,确定了研究问题,并提出了路线图。
{"title":"NGNaaS: NGNs as cloud computing services","authors":"F. Belqasmi, M. Barachi, J. A. Calero, M. Badra, O. Alfandi","doi":"10.1109/NTMS.2015.7266508","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266508","url":null,"abstract":"Next Generation Networks are the future mobile telecommunication networks, capable of provisioning universal access to services (anytime, anywhere, using any device). Cloud computing is an emerging networking paradigm with several inherent advantages including easy introduction of new services, efficient resource use, scalability, and pay-per-use. Cloud computing is ubiquitous in the Internet domain, but its use in the telecommunications context is still in its infancy. Offering next generation networks as cloud computing services will facilitate their deployment and enable deployment and management cost sharing. We envision that many network operators and service providers will soon support this sharing idea, as demonstrated by a number of ongoing agreements and investigation initiatives (e.g. between Rogers and Videotron in Canada, and between Etisalat and DU in the UAE). However, many issues need to be solved before this vision becomes a reality. This position paper presents our vision for offering next generation networks as cloud services, sketches an early business model, identifies the research issues, and presents a roadmap.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125627118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concept for a security investigation framework 安全调查框架的概念
M. Ussath, Feng Cheng, C. Meinel
The number of detected and analyzed Advanced Persistent Threat (APT) campaigns increased over the last years. Two of the main objectives of such campaigns are to maintain long-term access to the environment of the target and to stay undetected. To achieve these goals the attackers use sophisticated and customized techniques for the lateral movement, to ensure that these activities are not detected by existing security systems. During an investigation of an APT campaign all stages of it are relevant to clarify important details like the initial infection vector or the compromised systems and credentials. Most of the currently used approaches, which are utilized within security systems, are not able to detect the different stages of a complex attack and therefore a comprehensive security investigation is needed. In this paper we describe a concept for a Security Investigation Framework (SIF) that supports the analysis and the tracing of multi-stage APTs. The concept includes different automatic and semi-automatic approaches that support the investigation of such attacks. Furthermore, the framework leverages different information sources, like log files and details from forensic investigations and malware analyses, to give a comprehensive overview of the different stages of an attack. The overall objective of the SIF is to improve the efficiency of investigations and reveal undetected details of an attack.
在过去几年中,检测和分析的高级持续性威胁(APT)活动的数量有所增加。这种运动的两个主要目标是保持长期进入目标环境和不被发现。为了实现这些目标,攻击者使用复杂的定制技术进行横向移动,以确保这些活动不会被现有的安全系统检测到。在对APT活动进行调查期间,所有阶段都与澄清重要细节相关,例如初始感染媒介或受损系统和凭证。目前使用的大多数方法都是在安全系统中使用的,无法检测复杂攻击的不同阶段,因此需要进行全面的安全调查。在本文中,我们描述了一个支持多阶段apt分析和跟踪的安全调查框架(SIF)的概念。该概念包括支持调查此类攻击的不同自动和半自动方法。此外,该框架利用不同的信息源,如日志文件和来自法医调查和恶意软件分析的详细信息,对攻击的不同阶段进行全面概述。SIF的总体目标是提高调查效率,揭示未被发现的攻击细节。
{"title":"Concept for a security investigation framework","authors":"M. Ussath, Feng Cheng, C. Meinel","doi":"10.1109/NTMS.2015.7266478","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266478","url":null,"abstract":"The number of detected and analyzed Advanced Persistent Threat (APT) campaigns increased over the last years. Two of the main objectives of such campaigns are to maintain long-term access to the environment of the target and to stay undetected. To achieve these goals the attackers use sophisticated and customized techniques for the lateral movement, to ensure that these activities are not detected by existing security systems. During an investigation of an APT campaign all stages of it are relevant to clarify important details like the initial infection vector or the compromised systems and credentials. Most of the currently used approaches, which are utilized within security systems, are not able to detect the different stages of a complex attack and therefore a comprehensive security investigation is needed. In this paper we describe a concept for a Security Investigation Framework (SIF) that supports the analysis and the tracing of multi-stage APTs. The concept includes different automatic and semi-automatic approaches that support the investigation of such attacks. Furthermore, the framework leverages different information sources, like log files and details from forensic investigations and malware analyses, to give a comprehensive overview of the different stages of an attack. The overall objective of the SIF is to improve the efficiency of investigations and reveal undetected details of an attack.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127683274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Combining cell phones and WSNs for preventing accidents in smart-homes with disabled people 将手机和无线传感器网络结合起来,防止残疾人智能家中发生事故
Diulie J. Freitas, Tiago B. Marcondes, L. H. Nakamura, J. Ueyama, P. Gomes, R. Meneguette
Smart homes provide automatic services through a combination of wireless sensor networks (WSNs) and wireless devices that allow monitoring operations in the home. These smart homes have been increasingly studied not only by the academic community but also by industry on account of the great potential they have, especially in applications that can help people with some type of physical disability such as visual or hearing impairment. This kind of application can give them independence and make their lives safer and more comfortable. Thus, in this paper we propose a Health Smart Home system for disabled people that can warn them about possible accidents that can occur in a particular location of their house. In other words, the system anticipates possible accidents that may occur somewhere in the house. We implemented a preliminary prototype that monitors rooms and issues a warning whenever it detects a potential hazard. Our proposal relies on low-cost cutting-edge technology and includes the following: Raspberry Pi boards, motion sensors, cameras and a central server. The server will handle the data that has been captured by sensors and send warnings through smartphones to people with physical impairments.
智能家居通过无线传感器网络(wsn)和无线设备的组合提供自动服务,从而可以监控家中的操作。这些智能家居不仅受到学术界的越来越多的研究,而且受到工业界的越来越多的研究,因为它们具有巨大的潜力,特别是在可以帮助患有某种身体残疾(如视力或听力障碍)的人的应用中。这种应用程序可以给他们独立性,使他们的生活更安全,更舒适。因此,在本文中,我们为残疾人提出了一个健康智能家居系统,可以警告他们在他们房子的特定位置可能发生的事故。换句话说,该系统可以预测房屋中某个地方可能发生的事故。我们实现了一个初步的原型,它可以监控房间,并在检测到潜在危险时发出警告。我们的建议依赖于低成本的尖端技术,包括:树莓派板,运动传感器,摄像头和中央服务器。服务器将处理传感器捕获的数据,并通过智能手机向身体有缺陷的人发送警告。
{"title":"Combining cell phones and WSNs for preventing accidents in smart-homes with disabled people","authors":"Diulie J. Freitas, Tiago B. Marcondes, L. H. Nakamura, J. Ueyama, P. Gomes, R. Meneguette","doi":"10.1109/NTMS.2015.7266477","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266477","url":null,"abstract":"Smart homes provide automatic services through a combination of wireless sensor networks (WSNs) and wireless devices that allow monitoring operations in the home. These smart homes have been increasingly studied not only by the academic community but also by industry on account of the great potential they have, especially in applications that can help people with some type of physical disability such as visual or hearing impairment. This kind of application can give them independence and make their lives safer and more comfortable. Thus, in this paper we propose a Health Smart Home system for disabled people that can warn them about possible accidents that can occur in a particular location of their house. In other words, the system anticipates possible accidents that may occur somewhere in the house. We implemented a preliminary prototype that monitors rooms and issues a warning whenever it detects a potential hazard. Our proposal relies on low-cost cutting-edge technology and includes the following: Raspberry Pi boards, motion sensors, cameras and a central server. The server will handle the data that has been captured by sensors and send warnings through smartphones to people with physical impairments.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133082110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Analysis of XACML policies with ASP 基于ASP的XACML策略分析
D. Ayed, Marie-Noëlle Lepareux, Cyrille Martins
Security policy administrators face difficulties to ensure that the policies they specify in XACML correspond to what they intend to formulate and to understand their overall effect. This paper proposes a logic-based XACML3.0 analysis solution using Answer Set Programming (ASP) where Ansprolog is used to model the XACML decision process and an ASP solver is employed in an innovative way to perform logical reasoning on access control policies such as detecting conflicts in a multi-organizational context.
安全策略管理员在确保他们在XACML中指定的策略与他们打算制定的策略相对应以及理解策略的总体效果方面面临困难。本文提出了一种基于逻辑的XACML3.0分析解决方案,使用答案集编程(ASP),其中使用Ansprolog对XACML决策过程进行建模,并以一种创新的方式使用ASP求解器对访问控制策略(如在多组织环境中检测冲突)进行逻辑推理。
{"title":"Analysis of XACML policies with ASP","authors":"D. Ayed, Marie-Noëlle Lepareux, Cyrille Martins","doi":"10.1109/NTMS.2015.7266473","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266473","url":null,"abstract":"Security policy administrators face difficulties to ensure that the policies they specify in XACML correspond to what they intend to formulate and to understand their overall effect. This paper proposes a logic-based XACML3.0 analysis solution using Answer Set Programming (ASP) where Ansprolog is used to model the XACML decision process and an ASP solver is employed in an innovative way to perform logical reasoning on access control policies such as detecting conflicts in a multi-organizational context.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115911349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Kullback-Leibler divergence as an estimate of reproducibility of numerical results Kullback-Leibler散度对数值结果再现性的估计
F. Calvayrac
In large software projects using numerical solutions of equations, small changes in compiler options or parallelization methods can induce slight variations in the last digits of floating point numerical results, due for instance to the non-commutativity of operations. Unfortunate changes in the code (bugs) can induce even larger deviations in the results. We propose to use the Kullback-Leibler divergence estimated from the compression ratio of the results compared to reference results in order to automatically quantify those changes and automatize regression tests of numerical codes in software forges. We use the TDDFT PW-TELEMAN project as an example.
在使用方程数值解的大型软件项目中,编译器选项或并行化方法的微小变化可能导致浮点数值结果的最后一位数字发生微小变化,例如由于操作的非交换性。不幸的代码变更(bug)会导致结果出现更大的偏差。我们建议使用Kullback-Leibler散度来估计结果与参考结果的压缩比,以便自动量化这些变化并自动化软件伪造中的数字代码的回归测试。我们以TDDFT PW-TELEMAN项目为例。
{"title":"Kullback-Leibler divergence as an estimate of reproducibility of numerical results","authors":"F. Calvayrac","doi":"10.1109/NTMS.2015.7266501","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266501","url":null,"abstract":"In large software projects using numerical solutions of equations, small changes in compiler options or parallelization methods can induce slight variations in the last digits of floating point numerical results, due for instance to the non-commutativity of operations. Unfortunate changes in the code (bugs) can induce even larger deviations in the results. We propose to use the Kullback-Leibler divergence estimated from the compression ratio of the results compared to reference results in order to automatically quantify those changes and automatize regression tests of numerical codes in software forges. We use the TDDFT PW-TELEMAN project as an example.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121923756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Integrating OpenFlow to LTE: Some issues toward software-defined mobile networks 将OpenFlow集成到LTE:软件定义移动网络的一些问题
L. J. Chaves, Vitor Marge Eichemberger, Islene C. Garcia, E. Madeira
The world is witnessing a rapid growth in mobile communication, and operators have been forced to handle network traffic more resourcefully. Many works point to the use of Software-Defined Networking (SDN) as an enabling technology to overcome current limitations, making possible upcoming 5G networks. In this paper we discuss how the OpenFlow protocol can be integrated into existing Long-Term Evolution (LTE) networks, going through state-of-the-art solutions and highlighting open issues. We also introduce a novel OpenFlow module for ns-3 simulator, allowing reliable simulations of LTE-SDN integrated networks, as illustrate in a case study example.
世界正在见证移动通信的快速增长,运营商被迫更灵活地处理网络流量。许多工作都指出,使用软件定义网络(SDN)作为克服当前限制的使能技术,使即将到来的5G网络成为可能。在本文中,我们讨论了如何将OpenFlow协议集成到现有的长期演进(LTE)网络中,通过最先进的解决方案并突出了开放问题。我们还为ns-3模拟器引入了一种新颖的OpenFlow模块,允许可靠地模拟LTE-SDN集成网络,如案例研究示例所示。
{"title":"Integrating OpenFlow to LTE: Some issues toward software-defined mobile networks","authors":"L. J. Chaves, Vitor Marge Eichemberger, Islene C. Garcia, E. Madeira","doi":"10.1109/NTMS.2015.7266498","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266498","url":null,"abstract":"The world is witnessing a rapid growth in mobile communication, and operators have been forced to handle network traffic more resourcefully. Many works point to the use of Software-Defined Networking (SDN) as an enabling technology to overcome current limitations, making possible upcoming 5G networks. In this paper we discuss how the OpenFlow protocol can be integrated into existing Long-Term Evolution (LTE) networks, going through state-of-the-art solutions and highlighting open issues. We also introduce a novel OpenFlow module for ns-3 simulator, allowing reliable simulations of LTE-SDN integrated networks, as illustrate in a case study example.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127108098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The design of a rateless channel coding scheme for deep-space communication 深空通信中无速率信道编码方案的设计
Shaolei Chen, Chuangmu Yao, Rui Dai
In this paper, a rateless channel coding scheme is proposed for deep-space communication. Unlike the traditional fixed-rate coding schemes, in our scheme the coding rate is not designed as a fixed value before transmission, but adaptive to the channel variations resulted from the dynamically varied transmission distance and complex atmospheric conditions. Specifically, a Raptor code which is provided by a cascade structure is adopted for the data transmission. The pre-code of Raptor code is encoded with a linear-time progressive edge-growth algorithm which avoids tedious calculations by matrix transformation. Moreover, based on a joint iterative decoding method, the output degree distribution of our Raptor code is optimized so as to obtain good decoding performances. Comparisons are provided with respect to the fixed-rate coding schemes by numerical simulation, which shows that our proposed rateless coding scheme has better performance and is adaptively capacity-approaching for the deep-space data transmission.
本文提出了一种用于深空通信的无速率信道编码方案。与传统的固定速率编码方案不同,本方案的编码速率不是在传输前设计为固定值,而是根据传输距离的动态变化和复杂大气条件引起的信道变化进行自适应。具体来说,采用级联结构提供的Raptor代码进行数据传输。Raptor码的预码采用线性时间渐进边缘增长算法进行编码,避免了繁琐的矩阵变换计算。此外,基于联合迭代解码方法,优化了Raptor码的输出度分布,获得了良好的解码性能。通过数值仿真与固定速率编码方案进行了比较,结果表明所提出的无速率编码方案具有更好的性能和自适应容量逼近能力,适合深空数据传输。
{"title":"The design of a rateless channel coding scheme for deep-space communication","authors":"Shaolei Chen, Chuangmu Yao, Rui Dai","doi":"10.1109/NTMS.2015.7266524","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266524","url":null,"abstract":"In this paper, a rateless channel coding scheme is proposed for deep-space communication. Unlike the traditional fixed-rate coding schemes, in our scheme the coding rate is not designed as a fixed value before transmission, but adaptive to the channel variations resulted from the dynamically varied transmission distance and complex atmospheric conditions. Specifically, a Raptor code which is provided by a cascade structure is adopted for the data transmission. The pre-code of Raptor code is encoded with a linear-time progressive edge-growth algorithm which avoids tedious calculations by matrix transformation. Moreover, based on a joint iterative decoding method, the output degree distribution of our Raptor code is optimized so as to obtain good decoding performances. Comparisons are provided with respect to the fixed-rate coding schemes by numerical simulation, which shows that our proposed rateless coding scheme has better performance and is adaptively capacity-approaching for the deep-space data transmission.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126597729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2015 7th International Conference on New Technologies, Mobility and Security (NTMS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1