首页 > 最新文献

Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)最新文献

英文 中文
Mining classification rules from fuzzy min-max neural network 基于模糊最小-最大神经网络的分类规则挖掘
S. Shinde, U. Kulkarni
The basic fuzzy min-max neural network (FMMN) is capable to perform the supervised classification of data. As like other artificial neural networks, FMMN is also like a black box and expressed in terms of min-max values and associated class label. So the justification of classification results given by FMMN is required to be obtained to make it more adaptive to the real world applications. This paper proposes the model to extract classification rules from trained FMMN. These rules justify the classification decision given by FMMN. For this FMMN is trained for the input data and resulting min-max values in the quantized form and class labels of created hyperboxes are passed as a input to the partial rule extraction (PART) algorithm of Waikato Environment for Knowledge Analysis (WEKA). As a result, more comprehensible rules expressed in terms human readable linguistic terms are extracted. The proposed model is applied to iris and wine dataset taken from the UCI machine learning repository. Thus the extracted rules represent the trained FMMN in the more understandable form and can easily be applied to real world applications.
基本模糊最小-最大神经网络(FMMN)能够对数据进行监督分类。与其他人工神经网络一样,FMMN也像一个黑盒子,用最小最大值和相关的类标签来表示。因此,需要对FMMN给出的分类结果进行论证,使其更能适应实际应用。本文提出了从训练好的FMMN中提取分类规则的模型。这些规则证明了FMMN给出的分类决策是正确的。为此,对FMMN进行输入数据的训练,得到量化形式的最小最大值,创建的超框的类标签作为输入传递给怀卡托知识分析环境(WEKA)的部分规则提取(PART)算法。因此,以人类可读的语言术语表达的更容易理解的规则被提取出来。将该模型应用于UCI机器学习存储库中的虹膜和葡萄酒数据集。因此,提取的规则以更易于理解的形式表示训练好的FMMN,并且可以很容易地应用于现实世界的应用。
{"title":"Mining classification rules from fuzzy min-max neural network","authors":"S. Shinde, U. Kulkarni","doi":"10.1109/ICCCNT.2014.6963079","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963079","url":null,"abstract":"The basic fuzzy min-max neural network (FMMN) is capable to perform the supervised classification of data. As like other artificial neural networks, FMMN is also like a black box and expressed in terms of min-max values and associated class label. So the justification of classification results given by FMMN is required to be obtained to make it more adaptive to the real world applications. This paper proposes the model to extract classification rules from trained FMMN. These rules justify the classification decision given by FMMN. For this FMMN is trained for the input data and resulting min-max values in the quantized form and class labels of created hyperboxes are passed as a input to the partial rule extraction (PART) algorithm of Waikato Environment for Knowledge Analysis (WEKA). As a result, more comprehensible rules expressed in terms human readable linguistic terms are extracted. The proposed model is applied to iris and wine dataset taken from the UCI machine learning repository. Thus the extracted rules represent the trained FMMN in the more understandable form and can easily be applied to real world applications.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124235071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Foot plant detection for motion capture data by curve saliency 基于曲线显著性的足部植物运动捕捉数据检测
Jingting Lu, Xiaoping Liu
Foot plant detection is a fundamental step of most motion editing researches. Due to the footskate of captured motions, it is difficult to precisely extract foot plants. In this paper, we present a general, efficient approach for foot plant detection. The key idea is determining the boundaries of foot plants by searching the most salient points around the boundaries. By this approach, foot plants can be precisely extracted from most of the flat terrain motions. The experimental results show the generality and robustness of our approach.
足部植物检测是大多数运动编辑研究的基础步骤。由于被捕获的运动的脚板,精确提取足部植物是困难的。在本文中,我们提出了一种通用的、有效的脚植物检测方法。关键思想是通过搜索边界周围最显著的点来确定足部植物的边界。通过这种方法,可以精确地从大多数平坦地形运动中提取足部植物。实验结果表明了该方法的通用性和鲁棒性。
{"title":"Foot plant detection for motion capture data by curve saliency","authors":"Jingting Lu, Xiaoping Liu","doi":"10.1109/ICCCNT.2014.6963001","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963001","url":null,"abstract":"Foot plant detection is a fundamental step of most motion editing researches. Due to the footskate of captured motions, it is difficult to precisely extract foot plants. In this paper, we present a general, efficient approach for foot plant detection. The key idea is determining the boundaries of foot plants by searching the most salient points around the boundaries. By this approach, foot plants can be precisely extracted from most of the flat terrain motions. The experimental results show the generality and robustness of our approach.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128460638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Computational fluid dynamics-based system identification of marine vehicles 基于计算流体动力学的船舶系统辨识
M. Hosny, Mohammed Amr, Ibrahim A. Zedan, M. Abdelsalam, Muhammad Al-Sayd
In this paper, a new computational fluid dynamics-based system identification for marine vehicles (such as ships and underwater vehicles) is proposed. The procedure has the advantage of being quite intuitive due to its clear similarity with conventional practical system identification experiments. This helps the user to quickly setup reliable simulation experiments and eliminates lengthy abstraction/ modeling that is often needed to perform a practical experiment in simulation. The simulation times are quite reasonable and can be performed using opensource software, thus eliminating the high cost and “time-consuming”ness typically associated with conventional practical experiments-based system identification. Two case studies are used to demonstrate the procedure as well as a discussion of candidate applications where it may prove to be useful.
本文提出了一种新的基于计算流体动力学的船舶和水下航行器系统辨识方法。该方法与传统的实际系统辨识实验有明显的相似性,具有直观的优点。这有助于用户快速设置可靠的仿真实验,并消除了在仿真中执行实际实验通常需要的冗长的抽象/建模。仿真时间相当合理,并且可以使用开源软件进行,从而消除了传统的基于实际实验的系统识别通常相关的高成本和“耗时”。使用两个案例研究来演示该过程,并讨论可能证明有用的候选应用程序。
{"title":"Computational fluid dynamics-based system identification of marine vehicles","authors":"M. Hosny, Mohammed Amr, Ibrahim A. Zedan, M. Abdelsalam, Muhammad Al-Sayd","doi":"10.1109/ICCCNT.2014.6963066","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963066","url":null,"abstract":"In this paper, a new computational fluid dynamics-based system identification for marine vehicles (such as ships and underwater vehicles) is proposed. The procedure has the advantage of being quite intuitive due to its clear similarity with conventional practical system identification experiments. This helps the user to quickly setup reliable simulation experiments and eliminates lengthy abstraction/ modeling that is often needed to perform a practical experiment in simulation. The simulation times are quite reasonable and can be performed using opensource software, thus eliminating the high cost and “time-consuming”ness typically associated with conventional practical experiments-based system identification. Two case studies are used to demonstrate the procedure as well as a discussion of candidate applications where it may prove to be useful.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Curbing Distributed Denial of Service attack by traffic filtering in Wireless Sensor Network 无线传感器网络流量过滤抑制分布式拒绝服务攻击
S. Sahu, Pooja Priyadarshini, Saurabh Bilgaiyan
Wireless Sensor Networks (WSNs) are vastly used networks that have caught attention of numerous researchers because of their various applications. They are resource constrained networks where memory capacity, energy and consumption of memory are limited. Therefore they are susceptible to several security threats and attacks. One such attack is Distributed Denial of Service (DDoS). These attacks' objective is to overwhelm the target with ample packets so that its resources get drained and also thwart its ability to procure genuine packets so that the victim fails to give desired response. This leads to the congestion of the network and the victim becomes exhausted leading to denial of service. In this paper we propose a traffic filtration mechanism which deploys mitigation measures to restrain the attackers' attempt at deluging the wireless sensor network with the motive of causing denial of service with enormous packets within limited time.
无线传感器网络(WSNs)是一种广泛使用的网络,由于其广泛的应用而引起了众多研究人员的关注。它们是资源受限的网络,其中内存容量、能量和内存消耗是有限的。因此,它们容易受到几种安全威胁和攻击。其中一种攻击是分布式拒绝服务(DDoS)。这些攻击的目的是用大量的数据包压倒目标,使其资源枯竭,并挫败其获取真正数据包的能力,使受害者无法给出期望的响应。这将导致网络拥塞,受害者变得疲惫不堪,从而导致拒绝服务。在本文中,我们提出了一种流量过滤机制,该机制部署了缓解措施,以抑制攻击者试图在有限的时间内用大量数据包造成拒绝服务的动机来淹没无线传感器网络。
{"title":"Curbing Distributed Denial of Service attack by traffic filtering in Wireless Sensor Network","authors":"S. Sahu, Pooja Priyadarshini, Saurabh Bilgaiyan","doi":"10.1109/ICCCNT.2014.6963043","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963043","url":null,"abstract":"Wireless Sensor Networks (WSNs) are vastly used networks that have caught attention of numerous researchers because of their various applications. They are resource constrained networks where memory capacity, energy and consumption of memory are limited. Therefore they are susceptible to several security threats and attacks. One such attack is Distributed Denial of Service (DDoS). These attacks' objective is to overwhelm the target with ample packets so that its resources get drained and also thwart its ability to procure genuine packets so that the victim fails to give desired response. This leads to the congestion of the network and the victim becomes exhausted leading to denial of service. In this paper we propose a traffic filtration mechanism which deploys mitigation measures to restrain the attackers' attempt at deluging the wireless sensor network with the motive of causing denial of service with enormous packets within limited time.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"334 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129470012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Robust speaker verification using GFCC and joint factor analysis 基于GFCC和联合因子分析的稳健说话人验证
P. Das, U. Bhattacharjee
In real world situation performance of speaker verification system drops significantly because of mismatched training and test conditions. In this paper we have analyzed three factors namely noise, channel variability and session variability, that are responsible for poor performance of a speaker verification system. The first step towards noise robustness GFCC features were used as recent research has shown better noise robustness of gammatone frequency cepstral coefficients over mel-frequency cepstral coefficients. In the second step robustness towards session and channel variability is achieved by shifting from the classical way of modeling a speaker to a rather new approach of joint factor analysis. Experimental results over different acoustic environment and over different SNR have shown significant improvement in the performance of the system.
在实际情况下,由于训练条件和测试条件不匹配,说话人验证系统的性能显著下降。本文分析了噪声、信道可变性和会话可变性这三个影响说话人验证系统性能的因素。由于最近的研究表明伽玛酮频率倒谱系数比梅尔频率倒谱系数具有更好的噪声鲁棒性,因此采用了GFCC特征向噪声鲁棒性迈出了第一步。第二步,对会话和信道可变性的鲁棒性是通过从经典的说话人建模方式转向联合因素分析的新方法来实现的。在不同声环境和不同信噪比下的实验结果表明,该系统的性能得到了显著改善。
{"title":"Robust speaker verification using GFCC and joint factor analysis","authors":"P. Das, U. Bhattacharjee","doi":"10.1109/ICCCNT.2014.6963092","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963092","url":null,"abstract":"In real world situation performance of speaker verification system drops significantly because of mismatched training and test conditions. In this paper we have analyzed three factors namely noise, channel variability and session variability, that are responsible for poor performance of a speaker verification system. The first step towards noise robustness GFCC features were used as recent research has shown better noise robustness of gammatone frequency cepstral coefficients over mel-frequency cepstral coefficients. In the second step robustness towards session and channel variability is achieved by shifting from the classical way of modeling a speaker to a rather new approach of joint factor analysis. Experimental results over different acoustic environment and over different SNR have shown significant improvement in the performance of the system.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129693640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Measuring the QoS of Personal Cloud Storage 测量个人云存储服务质量
Pengyan Shen, Kai Guo, Mingzhong Xiao
Nowadays, the Personal Cloud Storage (PCS) service has been widely utilized by millions of users, not only because of its reliable ubiquitous storage but also numbers of exciting third-part applications that work as overlay networks based on user's data. However, we usually know few information about the PCS's performance which is quite important for both normal users and programmers. In this paper, we present a measurement study of four popular PCS services: Baidu, Kingsoft, Box and DropBox. By using the REST APIs offered by the storage providers, we collected the information from more than 41,000 storage operations with transferring over 200GB files, characterized the file transfer speed distributions, and analyzed important aspects that impact the file transfer speed. Indeed, we found some important characteristics in China that are different from the situations in the USA and Europe, which is significant. We believe our work can contribute to helping the researchers and developers to understand the behavior of these popular storage services.
如今,个人云存储(PCS)服务已经被数以百万计的用户广泛使用,这不仅是因为其可靠的无处不在的存储,还因为许多令人兴奋的第三方应用程序基于用户的数据作为覆盖网络工作。然而,我们通常对pc的性能知之甚少,而这对于普通用户和程序员来说都是非常重要的。本文对b百度、金山软件、Box和DropBox这四种流行的pc服务进行了测量研究。通过使用存储提供商提供的REST api,我们收集了超过41,000个传输超过200GB文件的存储操作的信息,描述了文件传输速度分布,并分析了影响文件传输速度的重要方面。事实上,我们发现中国的一些重要特征不同于美国和欧洲的情况,这是很重要的。我们相信我们的工作可以帮助研究人员和开发人员理解这些流行存储服务的行为。
{"title":"Measuring the QoS of Personal Cloud Storage","authors":"Pengyan Shen, Kai Guo, Mingzhong Xiao","doi":"10.1109/ICCCNT.2014.6963099","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963099","url":null,"abstract":"Nowadays, the Personal Cloud Storage (PCS) service has been widely utilized by millions of users, not only because of its reliable ubiquitous storage but also numbers of exciting third-part applications that work as overlay networks based on user's data. However, we usually know few information about the PCS's performance which is quite important for both normal users and programmers. In this paper, we present a measurement study of four popular PCS services: Baidu, Kingsoft, Box and DropBox. By using the REST APIs offered by the storage providers, we collected the information from more than 41,000 storage operations with transferring over 200GB files, characterized the file transfer speed distributions, and analyzed important aspects that impact the file transfer speed. Indeed, we found some important characteristics in China that are different from the situations in the USA and Europe, which is significant. We believe our work can contribute to helping the researchers and developers to understand the behavior of these popular storage services.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126938373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An agent-based searchable encryption scheme in mobile computing environment 移动计算环境下基于代理的可搜索加密方案
Yang Jian, Yang Dengqi
The cryptographic operations in existing searchable encryption protocols will consume a lot of energy of terminals if they are used in mobile computing environment. To address this issue, novel schemes of searchable encryption are required. In this paper, for reducing user's computational burden generated by the expensive cryptographic operations, an agent-based searchable encryption (ABSE) scheme with its security model is proposed in order that the searchable encryption can be used in mobile computing environment. A concrete implement of ABSE with its security proof is presented to help user search the related data with some keywords trapdoors in either cases that the agent is online or offline. Performance analysis is also provided to show this scheme is suitable to be used in mobile environments.
现有可搜索加密协议中的加密操作如果应用于移动计算环境,将会消耗大量的终端能耗。为了解决这个问题,需要新的可搜索加密方案。为了减少昂贵的加密操作给用户带来的计算负担,本文提出了一种基于代理的可搜索加密(ABSE)方案及其安全模型,使可搜索加密能够应用于移动计算环境。给出了ABSE的具体实现及其安全性证明,可以帮助用户在代理在线或离线的情况下使用关键字trapdoor搜索相关数据。性能分析表明,该方案适用于移动环境。
{"title":"An agent-based searchable encryption scheme in mobile computing environment","authors":"Yang Jian, Yang Dengqi","doi":"10.1109/ICCCNT.2014.6963112","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963112","url":null,"abstract":"The cryptographic operations in existing searchable encryption protocols will consume a lot of energy of terminals if they are used in mobile computing environment. To address this issue, novel schemes of searchable encryption are required. In this paper, for reducing user's computational burden generated by the expensive cryptographic operations, an agent-based searchable encryption (ABSE) scheme with its security model is proposed in order that the searchable encryption can be used in mobile computing environment. A concrete implement of ABSE with its security proof is presented to help user search the related data with some keywords trapdoors in either cases that the agent is online or offline. Performance analysis is also provided to show this scheme is suitable to be used in mobile environments.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114097179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Microscopic numerical simulation and experimental study of thermal deformation of mechanical parts 机械零件热变形的微观数值模拟与实验研究
Enming Miao, Zhishang Xu, Xiaoshuai Zhou, Derong Lei, Guannan Li
Thermal characteristic is one of the most important mechanical properties of materials. The paper studied the thermal deformation characteristics of mechanical parts by using the microscopic numerical simulation and macroscopic experiment. The paper took a set of 3D aluminum crystal models as the objects of study and got the thermal deformation data by the Molecular statics method. Meanwhile, we also carried out series of macroscopic thermal deformation experiments of aluminum sample. The consistency of microscopic simulation and macroscopic experiment results demonstrate that the thermal deformation of mechanical part is obviously affected by its shape and structure parameters, which should not be ignored in precision machinery engineering. The further study in this area will guide the optimization design of mechanical part parameters and improve the accuracy of precision machinery and instrument.
热特性是材料最重要的力学性能之一。本文采用微观数值模拟和宏观实验相结合的方法研究了机械零件的热变形特性。本文以一组三维铝晶体模型为研究对象,采用分子静力学方法获得了铝晶体的热变形数据。同时,对铝试样进行了一系列宏观热变形实验。微观模拟与宏观实验结果的一致性表明,机械零件的热变形受其形状和结构参数的影响明显,在精密机械工程中不可忽视。该领域的进一步研究将指导机械零件参数的优化设计,提高精密机械仪器的精度。
{"title":"Microscopic numerical simulation and experimental study of thermal deformation of mechanical parts","authors":"Enming Miao, Zhishang Xu, Xiaoshuai Zhou, Derong Lei, Guannan Li","doi":"10.1109/ICCCNT.2014.6963016","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963016","url":null,"abstract":"Thermal characteristic is one of the most important mechanical properties of materials. The paper studied the thermal deformation characteristics of mechanical parts by using the microscopic numerical simulation and macroscopic experiment. The paper took a set of 3D aluminum crystal models as the objects of study and got the thermal deformation data by the Molecular statics method. Meanwhile, we also carried out series of macroscopic thermal deformation experiments of aluminum sample. The consistency of microscopic simulation and macroscopic experiment results demonstrate that the thermal deformation of mechanical part is obviously affected by its shape and structure parameters, which should not be ignored in precision machinery engineering. The further study in this area will guide the optimization design of mechanical part parameters and improve the accuracy of precision machinery and instrument.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114347649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An interference mitigation scheme for IEEE 802.15.4 networks under IEEE 802.11b/g interference 针对IEEE 802.15.4网络在IEEE 802.11b/g干扰下的干扰缓解方案
K. Subbu, Suchith Soman
IEEE 802.11 and IEEE 802.15.4 are two of the main standards for wireless communications and networking in the unlicensed 2.4GHz band. Coexistence of devices functioning on these standards is imperative in scenarios such as smart homes, wireless body area networks etc. However, interference of one standard over the other has to be alleviated in order to coexist. In this paper, we propose a framework that serves a two-fold purpose. It provides an experimental methodology to infer WiFi interference through packet delivery ratio and RSSI measurements. Then it provides an algorithm for coexistence that run on Zigbee nodes to detect the presence of a WiFi interferer and accordingly switch to a non overlapping channel. Performance evaluation of the proposed coexistence mechanism across a pair of IEEE 802.15.14 receiver and sender yielded 73% reduction in the packet loss and 116% increase in packet delivery ratio when compared to no mechanism present.
IEEE 802.11和IEEE 802.15.4是2.4GHz频段无线通信和网络的两个主要标准。在智能家居、无线体域网络等场景中,基于这些标准的设备共存是必不可少的。然而,一个标准对另一个标准的干扰必须减轻,以便共存。在本文中,我们提出了一个服务于双重目的的框架。它提供了一种通过分组传输比和RSSI测量来推断WiFi干扰的实验方法。然后,它提供了一种在Zigbee节点上运行的共存算法,以检测WiFi干扰的存在,并相应地切换到非重叠信道。对提议的共存机制在一对IEEE 802.15.14接收方和发送方之间的性能评估表明,与不存在机制相比,丢包率降低了73%,包投递率提高了116%。
{"title":"An interference mitigation scheme for IEEE 802.15.4 networks under IEEE 802.11b/g interference","authors":"K. Subbu, Suchith Soman","doi":"10.1109/ICCCNT.2014.6963057","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963057","url":null,"abstract":"IEEE 802.11 and IEEE 802.15.4 are two of the main standards for wireless communications and networking in the unlicensed 2.4GHz band. Coexistence of devices functioning on these standards is imperative in scenarios such as smart homes, wireless body area networks etc. However, interference of one standard over the other has to be alleviated in order to coexist. In this paper, we propose a framework that serves a two-fold purpose. It provides an experimental methodology to infer WiFi interference through packet delivery ratio and RSSI measurements. Then it provides an algorithm for coexistence that run on Zigbee nodes to detect the presence of a WiFi interferer and accordingly switch to a non overlapping channel. Performance evaluation of the proposed coexistence mechanism across a pair of IEEE 802.15.14 receiver and sender yielded 73% reduction in the packet loss and 116% increase in packet delivery ratio when compared to no mechanism present.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125833993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An enhanced data security and trust management enabled framework for cloud computing systems 支持云计算系统的增强数据安全和信任管理框架
J. Cindhamani, Naguboynia Punya, Rasha Ealaruvi, L. D. Dhinesh Babu
Cloud computing is an emerging and advanced technology in IT enterprise which provides services on demand. Cloud computing includes many advantages such as flexibility, improved performance and low cost. Besides its advantages, cloud has many security issues and challenges. In this paper, we propose an enhanced frame work for data security in cloud which follows the security polices such as integrity, confidentiality and availability. The data is stored in cloud by using 128 bit encryption and RSA algorithm, then we use the trust management i.e., Trusted Party Auditor (TPA) which audits the data instead of client. Thus, we show how efficiently the data can be secured related to performance analysis.
云计算是IT企业按需提供服务的一种新兴的先进技术。云计算包括许多优点,如灵活性、改进的性能和低成本。除了优势之外,云还存在许多安全问题和挑战。在本文中,我们提出了一个增强的云数据安全框架,该框架遵循完整性、保密性和可用性等安全策略。数据通过128位加密和RSA算法存储在云端,然后我们使用信任管理,即可信方审计员(TPA)代替客户端审计数据。因此,我们将展示如何有效地保护与性能分析相关的数据。
{"title":"An enhanced data security and trust management enabled framework for cloud computing systems","authors":"J. Cindhamani, Naguboynia Punya, Rasha Ealaruvi, L. D. Dhinesh Babu","doi":"10.1109/ICCCNT.2014.6963097","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963097","url":null,"abstract":"Cloud computing is an emerging and advanced technology in IT enterprise which provides services on demand. Cloud computing includes many advantages such as flexibility, improved performance and low cost. Besides its advantages, cloud has many security issues and challenges. In this paper, we propose an enhanced frame work for data security in cloud which follows the security polices such as integrity, confidentiality and availability. The data is stored in cloud by using 128 bit encryption and RSA algorithm, then we use the trust management i.e., Trusted Party Auditor (TPA) which audits the data instead of client. Thus, we show how efficiently the data can be secured related to performance analysis.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130155387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1