首页 > 最新文献

2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing最新文献

英文 中文
A Study on Improving the Abnormal Signal Detection Ability of Digital Storage Oscilloscope 提高数字存储示波器异常信号检测能力的研究
Jiang Jun, Ye Peng
Abnormal signal detection is a hot research in electronic test field. The digital storage oscilloscope detects abnormal signals by signal acquisition, abnormal signal identification, storage and display. Though the existing oscilloscope signal acquisition ability is technically improved by increasing the sampling rate, the waveform capture rate and other indicators, the identification, storage and display of abnormal signal show some deficiencies, which results in low abnormal signal detection efficiency and less application of detection function. The purpose of this paper is to improve the digital storage oscilloscope abnormal signal detection ability totally, design the abnormal signal detection system based on FPGA, study the method to improve the abnormal signal identification, storage and display, realize real-time, accurate identification and storage of abnormal signal in long period of time without manual monitoring, realize accurate offline positioning for abnormal signal in multiple display modes, and greatly improve the abnormal signal detection efficiency and practicability of the oscilloscope.
异常信号检测是电子测试领域的一个研究热点。数字存储示波器通过信号采集、异常信号识别、存储和显示等步骤对异常信号进行检测。虽然现有示波器通过提高采样率、波形捕获率等指标从技术上提高了信号采集能力,但在异常信号的识别、存储和显示方面存在一定的不足,导致异常信号检测效率低,检测功能应用较少。为了全面提高数字存储示波器的异常信号检测能力,设计了基于FPGA的异常信号检测系统,研究了提高异常信号识别、存储和显示的方法,实现了长时间不需要人工监控的异常信号的实时、准确识别和存储,实现了多种显示方式下异常信号的准确离线定位。并大大提高了示波器异常信号检测效率和实用性。
{"title":"A Study on Improving the Abnormal Signal Detection Ability of Digital Storage Oscilloscope","authors":"Jiang Jun, Ye Peng","doi":"10.1109/DASC.2013.70","DOIUrl":"https://doi.org/10.1109/DASC.2013.70","url":null,"abstract":"Abnormal signal detection is a hot research in electronic test field. The digital storage oscilloscope detects abnormal signals by signal acquisition, abnormal signal identification, storage and display. Though the existing oscilloscope signal acquisition ability is technically improved by increasing the sampling rate, the waveform capture rate and other indicators, the identification, storage and display of abnormal signal show some deficiencies, which results in low abnormal signal detection efficiency and less application of detection function. The purpose of this paper is to improve the digital storage oscilloscope abnormal signal detection ability totally, design the abnormal signal detection system based on FPGA, study the method to improve the abnormal signal identification, storage and display, realize real-time, accurate identification and storage of abnormal signal in long period of time without manual monitoring, realize accurate offline positioning for abnormal signal in multiple display modes, and greatly improve the abnormal signal detection efficiency and practicability of the oscilloscope.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127125750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Adaptive Airport Taxi Dispatch Algorithm Based on PCA-WNN 基于PCA-WNN的机场出租车自适应调度算法
Ke Zhang, Ke Zhang, S. Leng, Shuo Xu
As a part of public transportation, taxi plays a very important role of passengers' travel from the airport to downtown. In order to exploring an efficient taxi dispatch mechanism and saving passenger waiting times, we develop an adaptive airport taxi dispatch system based on principal components analysis wavelet neural network (PCA-WNN). A series of new online short term time forecasting techniques are used to capture the relationship between taxi supply and demand. Then we proposed an adaptive feedback-based taxi dispatch algorithm for the effective response to the non-stationarity of taxi service under a changing environment. By using the real data of Beijing Capital International Airport within twenty weeks, our experiment demonstrated that this algorithm can predict accurately of the taxi service data and greatly improve the efficiency of taxi management.
出租车作为公共交通的一部分,在乘客从机场到市中心的出行中起着非常重要的作用。为了探索一种高效的出租车调度机制,节省乘客等待时间,我们开发了一种基于主成分分析小波神经网络(PCA-WNN)的机场出租车自适应调度系统。本文采用了一系列新的在线短期预测技术来捕捉出租车供需关系。在此基础上,提出了一种基于自适应反馈的出租车调度算法,以有效应对变化环境下出租车服务的非平稳性。通过使用北京首都国际机场20周内的真实数据,实验表明该算法能够准确预测出租车服务数据,大大提高出租车管理效率。
{"title":"Adaptive Airport Taxi Dispatch Algorithm Based on PCA-WNN","authors":"Ke Zhang, Ke Zhang, S. Leng, Shuo Xu","doi":"10.1109/DASC.2013.86","DOIUrl":"https://doi.org/10.1109/DASC.2013.86","url":null,"abstract":"As a part of public transportation, taxi plays a very important role of passengers' travel from the airport to downtown. In order to exploring an efficient taxi dispatch mechanism and saving passenger waiting times, we develop an adaptive airport taxi dispatch system based on principal components analysis wavelet neural network (PCA-WNN). A series of new online short term time forecasting techniques are used to capture the relationship between taxi supply and demand. Then we proposed an adaptive feedback-based taxi dispatch algorithm for the effective response to the non-stationarity of taxi service under a changing environment. By using the real data of Beijing Capital International Airport within twenty weeks, our experiment demonstrated that this algorithm can predict accurately of the taxi service data and greatly improve the efficiency of taxi management.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129698877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance of LTE-A Uplink with Joint Reception and Inter-cell Interference Coordination 联合接收和小区间干扰协调下LTE-A上行链路性能研究
Yong Li, Zhangqin Huang
In LTE/LTE-A system, low frequency reuse factor is used to improve the spectral efficiency. In order to mitigate the inter-cell interference (ICI), inter-cell interference coordination (ICIC) is introduced which divides the bandwidth into a 1-reuse sub-bands for cell center users and -reuse sub-bands for cell edge users. ICIC technique has been considered as a promising technology for alleviating the degradation caused by ICI and improving throughput of cell edge users. Coordinated multipoint transmission/reception (CoMP) technique has been proposed in 3GPP release 11 to avoid ICI and enhance both system average and cell edge throughput. In this paper, we combine the ICIC with joint reception receiver together in uplink CoMP system to futher remove the multiuser and inter-cell interference. According to the requirement for exchanging received signals' information among cooperation base stations (BSs), two detection methods are proposed for uplink CoMP system. Simulation results illustate the performance of the proposed methods compared to that obained through ICIC and CoMP techniques.
在LTE/LTE- a系统中,利用低频复用因子来提高频谱效率。为了缓解小区间干扰,引入小区间干扰协调(ICIC),将带宽划分为小区中心用户的1重用子带和小区边缘用户的1重用子带。ICIC技术被认为是一种很有前途的技术,可以缓解ICI引起的退化,提高小区边缘用户的吞吐量。在3GPP第11版中提出了协调多点传输/接收(CoMP)技术,以避免ICI并提高系统平均和小区边缘吞吐量。本文将ICIC与联合接收接收机结合在上行CoMP系统中,进一步消除了多用户和小区间干扰。根据合作基站之间交换接收信号信息的要求,提出了上行CoMP系统的两种检测方法。仿真结果表明了该方法与ICIC和CoMP方法的性能比较。
{"title":"Performance of LTE-A Uplink with Joint Reception and Inter-cell Interference Coordination","authors":"Yong Li, Zhangqin Huang","doi":"10.1109/DASC.2013.113","DOIUrl":"https://doi.org/10.1109/DASC.2013.113","url":null,"abstract":"In LTE/LTE-A system, low frequency reuse factor is used to improve the spectral efficiency. In order to mitigate the inter-cell interference (ICI), inter-cell interference coordination (ICIC) is introduced which divides the bandwidth into a 1-reuse sub-bands for cell center users and -reuse sub-bands for cell edge users. ICIC technique has been considered as a promising technology for alleviating the degradation caused by ICI and improving throughput of cell edge users. Coordinated multipoint transmission/reception (CoMP) technique has been proposed in 3GPP release 11 to avoid ICI and enhance both system average and cell edge throughput. In this paper, we combine the ICIC with joint reception receiver together in uplink CoMP system to futher remove the multiuser and inter-cell interference. According to the requirement for exchanging received signals' information among cooperation base stations (BSs), two detection methods are proposed for uplink CoMP system. Simulation results illustate the performance of the proposed methods compared to that obained through ICIC and CoMP techniques.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130555617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Improved Algorithm for Dynamic Cognitive Extraction Based on Fuzzy Rough Set 一种基于模糊粗糙集的动态认知抽取改进算法
Haitao Jia, Mei Xie, Qian Tang, Wei Zhang
Modern science is increasingly data-driven and collaborative in nature. Comparing to ordinary data processing, big data processing that is mixed with great missing date must be processed rapidly. The Rough Set was generated to deal with the large data.In this paper, we proposed animproved algorithm for dynamic Cognitive extractionwhich deals with adaptive fuzzy attribute values and the fuzzy attribute reduction aiming at uncertainty datasuch asdata with diversity or missing character faced by the big data with using Fuzzy Rough Set Theory.At the aspect of information decision, according to the Real-time input information, it deep analyzes the dynamic information entropy of the data itself and chooses the biggest prediction information entropy direction for the cognitive rules to achieve rapid recognitive of data, complete information of quick decision.Because the algorithm is adopted to predict the best direction of information entropy, so the recognitive effect is also improved. At the end of the paper, we have analyzed superiority of the dynamic cognitive algorithm by using breast cancer data as the foundation.
现代科学在本质上越来越多地是数据驱动和协作的。与普通的数据处理相比,大数据处理中混杂着大量的缺失数据,需要快速处理。粗糙集的产生是为了处理大数据。本文提出了一种改进的动态认知提取算法,针对大数据面临的具有多样性或缺失特征的数据等不确定性数据,利用模糊粗糙集理论处理自适应模糊属性值和模糊属性约简。在信息决策方面,根据实时输入的信息,深入分析数据本身的动态信息熵,为认知规则选择最大的预测信息熵方向,实现对数据的快速识别,信息的完整,快速决策。由于采用了预测信息熵最佳方向的算法,因此也提高了识别效果。最后,以乳腺癌数据为基础,分析了动态认知算法的优越性。
{"title":"An Improved Algorithm for Dynamic Cognitive Extraction Based on Fuzzy Rough Set","authors":"Haitao Jia, Mei Xie, Qian Tang, Wei Zhang","doi":"10.1109/DASC.2013.106","DOIUrl":"https://doi.org/10.1109/DASC.2013.106","url":null,"abstract":"Modern science is increasingly data-driven and collaborative in nature. Comparing to ordinary data processing, big data processing that is mixed with great missing date must be processed rapidly. The Rough Set was generated to deal with the large data.In this paper, we proposed animproved algorithm for dynamic Cognitive extractionwhich deals with adaptive fuzzy attribute values and the fuzzy attribute reduction aiming at uncertainty datasuch asdata with diversity or missing character faced by the big data with using Fuzzy Rough Set Theory.At the aspect of information decision, according to the Real-time input information, it deep analyzes the dynamic information entropy of the data itself and chooses the biggest prediction information entropy direction for the cognitive rules to achieve rapid recognitive of data, complete information of quick decision.Because the algorithm is adopted to predict the best direction of information entropy, so the recognitive effect is also improved. At the end of the paper, we have analyzed superiority of the dynamic cognitive algorithm by using breast cancer data as the foundation.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"24 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113955466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-core Supported High Performance Security Analytics 多核支持的高性能安全分析
Feng Cheng, Amir Azodi, David Jaeger, C. Meinel
Such information as system and application logs as well as the output from the deployed security measures, e.g., IDS alerts, firewall logs, scanning reports, etc., is important for the administrators or security operators to be aware at first time of the running state of the system and take efforts if necessary. In this context, high performance security analytics is proposed to address the challenges to rapidly gather, manage, process, and analyze the large amount of real-time information generated from the large scale of enterprise IT-Infrastructure while it is being operated. As an example of next generation Security Information and Event Management (SIEM) platform, Security Analytics Lab (SAL) has been designed and implemented based on the newly emerged In-Memory data management technique, which makes it possible to efficiently organize and access different types of event information through a consistent central storage and interface. To correlate the information from different sources and identify the meaningful information is another challenging task, which makes great sense for quickly judging the current situation and making the decision. In this paper, the multi-core processing technique is introduced in the SAL platform. Various correlation algorithms, e.g., k-means based algorithms, ROCK and QROCK clustering algorithms, have been implemented and integrated in the multi-core supported SAL architecture. Practical experiments are conducted and analyzed to proof that the performance of analytics can be significantly improved by applying multi-core processing technique in SAL.
系统和应用程序日志以及部署的安全措施的输出(如IDS警报、防火墙日志、扫描报告等)等信息对于管理员或安全操作员在第一时间了解系统的运行状态并在必要时采取措施非常重要。在此背景下,高性能安全分析应运而生,以解决企业大规模it基础设施在运行过程中产生的大量实时信息的快速收集、管理、处理和分析的挑战。作为下一代安全信息和事件管理(SIEM)平台的一个例子,安全分析实验室(SAL)是基于新出现的内存数据管理技术设计和实现的,该技术使得通过一致的中央存储和接口有效地组织和访问不同类型的事件信息成为可能。将来自不同来源的信息关联起来并识别出有意义的信息是另一项具有挑战性的任务,这对于快速判断当前情况并做出决策非常有意义。本文在SAL平台中引入了多核处理技术。各种相关算法,如基于k-means的算法,ROCK和QROCK聚类算法,已经实现并集成在多核支持的SAL架构中。通过实际的实验和分析,证明了应用多核处理技术可以显著提高分析性能。
{"title":"Multi-core Supported High Performance Security Analytics","authors":"Feng Cheng, Amir Azodi, David Jaeger, C. Meinel","doi":"10.1109/DASC.2013.136","DOIUrl":"https://doi.org/10.1109/DASC.2013.136","url":null,"abstract":"Such information as system and application logs as well as the output from the deployed security measures, e.g., IDS alerts, firewall logs, scanning reports, etc., is important for the administrators or security operators to be aware at first time of the running state of the system and take efforts if necessary. In this context, high performance security analytics is proposed to address the challenges to rapidly gather, manage, process, and analyze the large amount of real-time information generated from the large scale of enterprise IT-Infrastructure while it is being operated. As an example of next generation Security Information and Event Management (SIEM) platform, Security Analytics Lab (SAL) has been designed and implemented based on the newly emerged In-Memory data management technique, which makes it possible to efficiently organize and access different types of event information through a consistent central storage and interface. To correlate the information from different sources and identify the meaningful information is another challenging task, which makes great sense for quickly judging the current situation and making the decision. In this paper, the multi-core processing technique is introduced in the SAL platform. Various correlation algorithms, e.g., k-means based algorithms, ROCK and QROCK clustering algorithms, have been implemented and integrated in the multi-core supported SAL architecture. Practical experiments are conducted and analyzed to proof that the performance of analytics can be significantly improved by applying multi-core processing technique in SAL.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132983880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analyzing Packet-Level Routing in Data Centers 数据中心报文级路由分析
Ruoyan Liu, Huaxi Gu, Yawen Chen, Haibo Zhang
Data centers host diverse applications with stringent QoS requirements. The key issue is to eliminate network congestions which severely degrade application performance. One effective solution is to balance the traffic load in the datacenter regular topologies. Many previous strategies focused on optimized flow routing, and these solutions can hardly achieve ideal load balance while guaranteeing QoS of different traffic flows due to the limitations in practical. In this paper, we discuss packet-level routing and analyze its merit for fine-grained load balance in data centers. Though packet-level routing interacts poorly with TCP in traditional network settings, we prove that it can be adapted to datacenter environment. Motived by the work done by Dixit [4] [5], we assert that packet-level routing is the right choice for data centers. Our simulation results demonstrate that packet-level routing better fulfills datacenter requirements.
数据中心承载着各种各样的应用,对服务质量有严格的要求。关键问题是消除严重降低应用程序性能的网络拥塞。一种有效的解决方案是在数据中心常规拓扑中平衡流量负载。以往的许多策略侧重于优化流路由,由于实际应用的限制,这些解决方案很难在保证不同流量QoS的同时实现理想的负载均衡。在本文中,我们讨论了包级路由,并分析了它在数据中心细粒度负载平衡中的优点。尽管在传统的网络环境中,包级路由与TCP的交互很差,但我们证明了它可以适应于数据中心环境。受Dixit[4][5]所做工作的启发,我们断言包级路由是数据中心的正确选择。仿真结果表明,包级路由能更好地满足数据中心的需求。
{"title":"Analyzing Packet-Level Routing in Data Centers","authors":"Ruoyan Liu, Huaxi Gu, Yawen Chen, Haibo Zhang","doi":"10.1109/DASC.2013.141","DOIUrl":"https://doi.org/10.1109/DASC.2013.141","url":null,"abstract":"Data centers host diverse applications with stringent QoS requirements. The key issue is to eliminate network congestions which severely degrade application performance. One effective solution is to balance the traffic load in the datacenter regular topologies. Many previous strategies focused on optimized flow routing, and these solutions can hardly achieve ideal load balance while guaranteeing QoS of different traffic flows due to the limitations in practical. In this paper, we discuss packet-level routing and analyze its merit for fine-grained load balance in data centers. Though packet-level routing interacts poorly with TCP in traditional network settings, we prove that it can be adapted to datacenter environment. Motived by the work done by Dixit [4] [5], we assert that packet-level routing is the right choice for data centers. Our simulation results demonstrate that packet-level routing better fulfills datacenter requirements.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133386018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach to Selecting Services with Dynamic Prices for Temporal-Aware Service Processes 面向时间感知服务过程的动态价格服务选择方法
Yanhua Du, Hong Li
In order to guarantee the successful execution of temporal-aware service processes in cloud computing, one important requirement is to effectively and efficiently select the appropriate services for service processes. The existing methods don't consider the dynamic prices of candidate services, or lack the efficient and practical selecting ability when encountering complex and large scale candidate services. In this paper, we propose a new approach to selecting services for temporal-aware service processes with dynamic prices. First of all, the initial execution paths of service processes are obtained by local optimization policy. Then, we judge whether temporal violations occur on these execution paths. If there are some temporal violations, the problem of violation correction is automatically transformed to nonlinear programming model which can be solved efficiently. Finally, the optimal execution paths for service processes are obtained. The advantages of our approach are validated by a practical example.
为了保证云计算中时间感知服务流程的成功执行,一个重要的要求是有效和高效地为服务流程选择合适的服务。现有的方法没有考虑候选服务的动态价格,或者在面对复杂、大规模的候选服务时缺乏高效实用的选择能力。在本文中,我们提出了一种新的方法来选择具有动态价格的具有时间感知的服务过程。首先,通过局部优化策略获得业务流程的初始执行路径;然后,我们判断这些执行路径上是否发生时间冲突。当存在时间违例时,违例校正问题自动转化为非线性规划模型,可以有效地求解。最后,得到了服务进程的最优执行路径。通过实例验证了该方法的优越性。
{"title":"An Approach to Selecting Services with Dynamic Prices for Temporal-Aware Service Processes","authors":"Yanhua Du, Hong Li","doi":"10.1109/DASC.2013.47","DOIUrl":"https://doi.org/10.1109/DASC.2013.47","url":null,"abstract":"In order to guarantee the successful execution of temporal-aware service processes in cloud computing, one important requirement is to effectively and efficiently select the appropriate services for service processes. The existing methods don't consider the dynamic prices of candidate services, or lack the efficient and practical selecting ability when encountering complex and large scale candidate services. In this paper, we propose a new approach to selecting services for temporal-aware service processes with dynamic prices. First of all, the initial execution paths of service processes are obtained by local optimization policy. Then, we judge whether temporal violations occur on these execution paths. If there are some temporal violations, the problem of violation correction is automatically transformed to nonlinear programming model which can be solved efficiently. Finally, the optimal execution paths for service processes are obtained. The advantages of our approach are validated by a practical example.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115697356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Based on Improved ESPRIT Algorithm Radar Multi-target Recognition 基于改进ESPRIT算法的雷达多目标识别
Haitao Jia, Jian Li, Taoliu Yang, Wei Zhang
At present, application of dense targets is one of the important means of penetration. In many observation conditions, the echoes from the dense targets mixed with many aliasing signals, and conventional radar signal processing algorithms do not take the aliasing signals into account. Therefore it is difficult for conventional algorithms to recognize multi-targets. In this paper, an improved ESPRIT algorithm is proposed which can recognize the multi-targets from the aliasing echoes and greatly reduce the computational complexity without changing the algorithm accuracy, especially can obtain a better estimation in the case of low SNR environment. The proposed algorithm can firstly quickly realize the estimate of scattering center parameters of target echoes, and then based on the estimation, the aliasing targets can be recognized. The Simulation also verifies the improved ESPRIT algorithm has a better identification and recognition capability of aliasing targets in low SNR condition. Moreover because of reduction of the computational complexity, the performance of proposed algorithm is faster than conventional methods, especially in the case of multiple aliasing scattering centers.
目前,应用密集目标是重要的突防手段之一。在许多观测条件下,来自密集目标的回波中混合了许多混叠信号,而传统的雷达信号处理算法没有考虑混叠信号。因此,传统算法难以识别多目标。本文提出了一种改进的ESPRIT算法,可以在不改变算法精度的情况下从混叠回波中识别出多目标,大大降低了计算量,特别是在低信噪比环境下可以获得更好的估计。该算法首先可以快速实现对目标回波散射中心参数的估计,然后在此基础上对混叠目标进行识别。仿真还验证了改进的ESPRIT算法在低信噪比条件下对混叠目标具有更好的识别能力。此外,由于降低了计算复杂度,该算法的性能比传统方法更快,特别是在多个混叠散射中心的情况下。
{"title":"Based on Improved ESPRIT Algorithm Radar Multi-target Recognition","authors":"Haitao Jia, Jian Li, Taoliu Yang, Wei Zhang","doi":"10.1109/DASC.2013.99","DOIUrl":"https://doi.org/10.1109/DASC.2013.99","url":null,"abstract":"At present, application of dense targets is one of the important means of penetration. In many observation conditions, the echoes from the dense targets mixed with many aliasing signals, and conventional radar signal processing algorithms do not take the aliasing signals into account. Therefore it is difficult for conventional algorithms to recognize multi-targets. In this paper, an improved ESPRIT algorithm is proposed which can recognize the multi-targets from the aliasing echoes and greatly reduce the computational complexity without changing the algorithm accuracy, especially can obtain a better estimation in the case of low SNR environment. The proposed algorithm can firstly quickly realize the estimate of scattering center parameters of target echoes, and then based on the estimation, the aliasing targets can be recognized. The Simulation also verifies the improved ESPRIT algorithm has a better identification and recognition capability of aliasing targets in low SNR condition. Moreover because of reduction of the computational complexity, the performance of proposed algorithm is faster than conventional methods, especially in the case of multiple aliasing scattering centers.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116788571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cost Advantage of Network Coding in Space for Irregular (5 + 1) Model 不规则(5 + 1)模型下空间网络编码的成本优势
Ting Wen, Xiaoxi Zhang, Xin Huang, Jiaqing Huang
Network coding in space, a new direction also named space information flow, is verified to have potential advantages over routing in space if the geometric conditions are satisfied. Cost advantage is adopted to measure the performance for network coding in space. Present literatures proved that only in regular (5 + 1) model, network coding in space is strictly superior to routing in terms of single-source multicast, comparing with other regular (n + 1) models. Focusing on irregular (5 + 1) model, this paper uses geometry to quantitatively study the constructions of network coding and optimal routing when a sink node moves without limits in space. Furthermore, the upperbound of cost advantage is figured out as well as the region where network coding is strictly superior to routing. Some properties of network coding in space are also presented.
空间网络编码是一种新的方向,也被称为空间信息流,在满足几何条件的情况下,它比空间路由具有潜在的优势。采用成本优势来衡量网络空间编码的性能。现有文献证明,与其他规则(n + 1)模型相比,只有在规则(5 + 1)模型中,网络空间编码在单源组播方面严格优于路由。本文以不规则(5 + 1)模型为研究对象,利用几何方法定量研究了汇聚节点无空间限制移动时网络编码和最优路由的构造。在此基础上,确定了网络编码严格优于路由的区域以及网络编码的成本优势上限。给出了空间网络编码的一些性质。
{"title":"Cost Advantage of Network Coding in Space for Irregular (5 + 1) Model","authors":"Ting Wen, Xiaoxi Zhang, Xin Huang, Jiaqing Huang","doi":"10.1109/DASC.2013.140","DOIUrl":"https://doi.org/10.1109/DASC.2013.140","url":null,"abstract":"Network coding in space, a new direction also named space information flow, is verified to have potential advantages over routing in space if the geometric conditions are satisfied. Cost advantage is adopted to measure the performance for network coding in space. Present literatures proved that only in regular (5 + 1) model, network coding in space is strictly superior to routing in terms of single-source multicast, comparing with other regular (n + 1) models. Focusing on irregular (5 + 1) model, this paper uses geometry to quantitatively study the constructions of network coding and optimal routing when a sink node moves without limits in space. Furthermore, the upperbound of cost advantage is figured out as well as the region where network coding is strictly superior to routing. Some properties of network coding in space are also presented.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123557452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Big Data Architecture, Key Technologies and Its Measures 大数据架构、关键技术及措施研究
Xiaoquan Li, Fujiang Zhang, Yongliang Wang
Big data require exceptional technologies to efficiently process large quantities of data within tolerable elapsed times, such as capture, curation, storage, search, sharing, transfer, analysis and visualization. Concept, features, construction importance, architecture, run mode, and its key technologies of big data are analyzed in this paper. Information sharing and data security under big data constructin are studied, at last, four measures for building big data are putforward, which can provide good decision-making for big data construction.
大数据需要卓越的技术在可容忍的时间内有效地处理大量数据,如捕获、管理、存储、搜索、共享、传输、分析和可视化。分析了大数据的概念、特征、构建重要性、体系结构、运行模式及其关键技术。研究了大数据建设下的信息共享和数据安全问题,最后提出了建设大数据的四项措施,为大数据建设提供了良好的决策依据。
{"title":"Research on Big Data Architecture, Key Technologies and Its Measures","authors":"Xiaoquan Li, Fujiang Zhang, Yongliang Wang","doi":"10.1109/DASC.2013.28","DOIUrl":"https://doi.org/10.1109/DASC.2013.28","url":null,"abstract":"Big data require exceptional technologies to efficiently process large quantities of data within tolerable elapsed times, such as capture, curation, storage, search, sharing, transfer, analysis and visualization. Concept, features, construction importance, architecture, run mode, and its key technologies of big data are analyzed in this paper. Information sharing and data security under big data constructin are studied, at last, four measures for building big data are putforward, which can provide good decision-making for big data construction.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128250833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1