首页 > 最新文献

2016 2nd IEEE International Conference on Computer and Communications (ICCC)最新文献

英文 中文
Design and production of super low frequency magnetic receiving antenna 超低频磁接收天线的设计与制作
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924992
Wang Yongbin, L. Lihua, Zhang Hao, L. Tong
At present, the submarines employ towed antennas to receive super low frequency(SLF) signal, which not only limits the mobility and safety of submarine, but also exists receiving blind zone. On account of the advantages of magnetic antenna, such as small size, high sensitivity and strong anti-jam capacity, it is proposed to receive SLF signals. In accordance with the structure and working principle of the magnetic antenna, simplified equivalent circuit model is established. By means of analyzing parameters of the core and coils, magnetic antenna which works between 30Hz and 200Hz is designed. In order to reduce distributed capacitance, winding method is analyzed and optimized and group winding solution is proposed subsequently. By measuring the sensitivity in the circumstance of uniform magnetic field, the measurement value shows that the method has effectiveness on reducing distributed capacitance and raising resonant frequency.
目前潜艇采用拖曳式天线接收超低频信号,不仅限制了潜艇的机动性和安全性,而且存在接收盲区。考虑到磁天线体积小、灵敏度高、抗干扰能力强等优点,提出采用磁天线接收SLF信号。根据磁天线的结构和工作原理,建立了简化的等效电路模型。通过对磁芯和线圈参数的分析,设计了工作频率在30Hz ~ 200Hz之间的磁天线。为了减小分布电容,对绕组方法进行了分析和优化,提出了分组绕组方案。通过测量均匀磁场环境下的灵敏度,测量值表明该方法具有减小分布电容、提高谐振频率的效果。
{"title":"Design and production of super low frequency magnetic receiving antenna","authors":"Wang Yongbin, L. Lihua, Zhang Hao, L. Tong","doi":"10.1109/COMPCOMM.2016.7924992","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924992","url":null,"abstract":"At present, the submarines employ towed antennas to receive super low frequency(SLF) signal, which not only limits the mobility and safety of submarine, but also exists receiving blind zone. On account of the advantages of magnetic antenna, such as small size, high sensitivity and strong anti-jam capacity, it is proposed to receive SLF signals. In accordance with the structure and working principle of the magnetic antenna, simplified equivalent circuit model is established. By means of analyzing parameters of the core and coils, magnetic antenna which works between 30Hz and 200Hz is designed. In order to reduce distributed capacitance, winding method is analyzed and optimized and group winding solution is proposed subsequently. By measuring the sensitivity in the circumstance of uniform magnetic field, the measurement value shows that the method has effectiveness on reducing distributed capacitance and raising resonant frequency.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126252363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The optimized attribute attack graph based on APT attack stage model 基于APT攻击阶段模型的优化属性攻击图
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925204
Meicong Li, Wei Huang, Yongbin Wang, Wenqing Fan
Recent years people have witnessed a surge of interest in APT attack, due to its complexity and persistent attack characteristics. In this paper, we give an overview of APT attack and attack graph and also use attack graph to assist in predicting the APT attacks and identifying the most vulnerable resources. In order to prevent APT attacks, this article improves the attribute attack graph by depending on the APT attack stage model and puts forward the stage attribute attack graph. Experimental results showed that the stage attribute attack graph can accurately reflect the lifecycle of attacks, meanwhile identify the most vulnerable resources and predict the APT attacks to defend APT attacks on each APT attack stage in time.
近年来,由于APT攻击的复杂性和持续攻击的特点,引起了人们的极大兴趣。本文概述了APT攻击和攻击图,并利用攻击图来帮助预测APT攻击和识别最易受攻击的资源。为了防止APT攻击,本文根据APT攻击阶段模型对属性攻击图进行改进,提出了阶段属性攻击图。实验结果表明,阶段属性攻击图能够准确反映攻击的生命周期,同时识别出最脆弱的资源,预测APT攻击,及时防范各个APT攻击阶段的APT攻击。
{"title":"The optimized attribute attack graph based on APT attack stage model","authors":"Meicong Li, Wei Huang, Yongbin Wang, Wenqing Fan","doi":"10.1109/COMPCOMM.2016.7925204","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925204","url":null,"abstract":"Recent years people have witnessed a surge of interest in APT attack, due to its complexity and persistent attack characteristics. In this paper, we give an overview of APT attack and attack graph and also use attack graph to assist in predicting the APT attacks and identifying the most vulnerable resources. In order to prevent APT attacks, this article improves the attribute attack graph by depending on the APT attack stage model and puts forward the stage attribute attack graph. Experimental results showed that the stage attribute attack graph can accurately reflect the lifecycle of attacks, meanwhile identify the most vulnerable resources and predict the APT attacks to defend APT attacks on each APT attack stage in time.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126274050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Attack tree analysis of Man in the Cloud attacks on client device synchronization in cloud computing 云计算中Man in the Cloud攻击客户端设备同步的攻击树分析
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925189
Aaron Zimba, Chen Hongsong, Wang Zhao-shun
Cloud computing has many irrefutable advantages and one of the most attractive benefits thereof that is seeing users migrate to the cloud is the ability to synchronize each of their devices with the cloud. A user can be in a different locality with a different device altogether but with the advent of cloud synchronization, he is able to access and replicate data changes to all of his synchronized devices. However, this convenience comes at a cost. The framework that is implemented to actualize this adorable functionality leaves much to be desired in that authorization to synchronize with the cloud only requires a synchronization token offered to the user upon his one-time authentication. This entails that whoever presents this synchronization token is able to synchronize with the user's data both locally and on the cloud without the need to provide any login credentials. The task of the attacker therefore is to acquire this synchronization token which is always stored locally on the cloud user's device and this task is actualized via a Man in the Cloud (MITC) attack. This paper employs attack trees to analyze the constituents of a MITC attack process in the synchronization of client devices in cloud computing. We further propose from the analysis, areas of concentration when deploying preventative measures.
云计算有许多无可辩驳的优点,其中最吸引人的优点之一就是看到用户迁移到云,能够将他们的每个设备与云同步。用户可以在不同的位置使用不同的设备,但是随着云同步的出现,他可以访问数据更改并将其复制到所有同步设备中。然而,这种便利是有代价的。为实现这个可爱的功能而实现的框架还有很多需要改进的地方,因为与云同步的授权只需要在用户进行一次性身份验证时提供一个同步令牌。这就要求提供此同步令牌的人能够在本地和云上同步用户的数据,而无需提供任何登录凭据。因此,攻击者的任务是获取此同步令牌,该令牌始终存储在本地云用户的设备上,并且该任务通过云中的人(MITC)攻击实现。本文采用攻击树分析了云计算客户端设备同步过程中MITC攻击过程的组成。我们进一步从分析中提出了部署预防措施时的重点领域。
{"title":"Attack tree analysis of Man in the Cloud attacks on client device synchronization in cloud computing","authors":"Aaron Zimba, Chen Hongsong, Wang Zhao-shun","doi":"10.1109/COMPCOMM.2016.7925189","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925189","url":null,"abstract":"Cloud computing has many irrefutable advantages and one of the most attractive benefits thereof that is seeing users migrate to the cloud is the ability to synchronize each of their devices with the cloud. A user can be in a different locality with a different device altogether but with the advent of cloud synchronization, he is able to access and replicate data changes to all of his synchronized devices. However, this convenience comes at a cost. The framework that is implemented to actualize this adorable functionality leaves much to be desired in that authorization to synchronize with the cloud only requires a synchronization token offered to the user upon his one-time authentication. This entails that whoever presents this synchronization token is able to synchronize with the user's data both locally and on the cloud without the need to provide any login credentials. The task of the attacker therefore is to acquire this synchronization token which is always stored locally on the cloud user's device and this task is actualized via a Man in the Cloud (MITC) attack. This paper employs attack trees to analyze the constituents of a MITC attack process in the synchronization of client devices in cloud computing. We further propose from the analysis, areas of concentration when deploying preventative measures.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126304293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimizing the effects of load-shedding through micro-load management in generation constrained power system 发电受限电力系统微负荷管理优化减载效果
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925235
J. Azasoo, K. Boateng
The continuous increase in electricity demand all over the world is putting huge burden on electricity utility providers to effect various types of load shedding in order to avoid total blackout. Load shedding is implemented mostly by turning off affected communities or areas from the main grid thereby depriving them from electricity supply. This paper attempts to propose a solution to this problem by granularly optimizing load levels of each metering units by turning off specific loads from household or and industrial demands in order to reduce the total effective load on the smart meters thereby reducing the overall effect on the generation as well as the distribution systems. The Design Science Methodology was used in the research. The preliminary results from the study shows that implementing this approach to load shedding will drastically reduce the overall effects of this intervention by utilities on their subscribers.
全球电力需求的持续增长给电力公司带来了巨大的负担,为了避免全面停电,他们不得不采取各种形式的减载措施。减负荷主要是通过关闭受影响的社区或地区的主电网,从而使他们无法获得电力供应来实现的。本文试图通过关闭来自家庭或工业需求的特定负荷来细化优化每个计量单元的负荷水平,从而减少智能电表的总有效负荷,从而减少对发电和配电系统的总体影响,从而提出解决这一问题的方法。本研究采用了设计科学方法论。研究的初步结果表明,实施这种减载方法将大大减少公用事业公司对其用户进行干预的总体影响。
{"title":"Optimizing the effects of load-shedding through micro-load management in generation constrained power system","authors":"J. Azasoo, K. Boateng","doi":"10.1109/COMPCOMM.2016.7925235","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925235","url":null,"abstract":"The continuous increase in electricity demand all over the world is putting huge burden on electricity utility providers to effect various types of load shedding in order to avoid total blackout. Load shedding is implemented mostly by turning off affected communities or areas from the main grid thereby depriving them from electricity supply. This paper attempts to propose a solution to this problem by granularly optimizing load levels of each metering units by turning off specific loads from household or and industrial demands in order to reduce the total effective load on the smart meters thereby reducing the overall effect on the generation as well as the distribution systems. The Design Science Methodology was used in the research. The preliminary results from the study shows that implementing this approach to load shedding will drastically reduce the overall effects of this intervention by utilities on their subscribers.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126458778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of SDN-base QoS traffic control method for Electric power data center network 基于sdn的电力数据中心网络QoS流量控制方法的设计与实现
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925182
Jian Di, Q. Ma
With great of development Electric power data center network, cause to the rapidly increase a amount of data, the rise of a variety of business and a variety of rapid increase of data exchange. Most existing QoS traffic techniques exist many of problems such as Low network resource utilization, bad reliability, poor extensibility and it is difficult to achieve. For the electric power enterprise data center to realize stable and efficient running a challenge, How to make use of the limited network resource effective control network, to ensure that the business service quality of service (QoS) become a pressing problem. This paper proposed an Openlow based QoS traffic method and QoS-ensure method referring to the new idea of separating controlling layer and data layer provided by SDN, which improved flexibility and reliability for QoS control to achieve effective usage of network resources and fine-grained of flow control. The experimental results validated its effectiveness. Through the deployment in Mininet network simulation platform and simulation implementation. The experimental results validated its effectiveness.
随着电力数据中心网络的大力发展,导致数据量的迅速增加,各种业务的兴起和各种数据交换的迅速增加。现有的QoS流量技术大多存在网络资源利用率低、可靠性差、可扩展性差、难以实现等问题。对于电力企业数据中心实现稳定高效运行提出了挑战,如何利用有限的网络资源有效控制网络,保证业务服务质量(QoS)成为一个迫切需要解决的问题。本文借鉴SDN提供的控制层和数据层分离的新思路,提出了基于Openlow的QoS流量方法和QoS保证方法,提高了QoS控制的灵活性和可靠性,实现了网络资源的有效利用和流量控制的细粒度化。实验结果验证了该方法的有效性。通过在Mininet网络仿真平台的部署和仿真实现。实验结果验证了该方法的有效性。
{"title":"Design and implementation of SDN-base QoS traffic control method for Electric power data center network","authors":"Jian Di, Q. Ma","doi":"10.1109/COMPCOMM.2016.7925182","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925182","url":null,"abstract":"With great of development Electric power data center network, cause to the rapidly increase a amount of data, the rise of a variety of business and a variety of rapid increase of data exchange. Most existing QoS traffic techniques exist many of problems such as Low network resource utilization, bad reliability, poor extensibility and it is difficult to achieve. For the electric power enterprise data center to realize stable and efficient running a challenge, How to make use of the limited network resource effective control network, to ensure that the business service quality of service (QoS) become a pressing problem. This paper proposed an Openlow based QoS traffic method and QoS-ensure method referring to the new idea of separating controlling layer and data layer provided by SDN, which improved flexibility and reliability for QoS control to achieve effective usage of network resources and fine-grained of flow control. The experimental results validated its effectiveness. Through the deployment in Mininet network simulation platform and simulation implementation. The experimental results validated its effectiveness.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126556879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An adaptive scheme of Systematic Random Network Coding on interfered satellite link 干扰卫星链路的系统随机网络编码自适应方案
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924878
Yao Xu, B. Tang
Systematic Network Coding (SNC) has been studied recent years and it got perfect effect on stable satellite link. However, its performance on interfered satellite link is unsatisfactory according to our research. This paper firstly proposes a novel architecture solution named K-SNC on Link Layer (LL) to improve the goodput of the communication on interfered link. In K-SNC, a Variant of Kalman Filter (VKF) is designed to estimate Packet Erase Rate (PER) in real time and a method is introduced to adjust Encoding Window (ECW) adaptively. A mathematical model is developed as the foundation of VKF about PER changing trend with time lapsing. The relationship is analyzed between the appropriate size of ECW in SNC and the PER on satellite link. Simulation works are implemented with NS-2. In comparison with SNC, K-SNC gets impressive improvement on stable satellite link and provides up to more than 30% higher goodput on the satellite link suffering unpredictable interference.
系统网络编码(SNC)近年来得到了广泛的研究,在稳定卫星链路方面取得了很好的效果。然而,根据我们的研究,它在受干扰的卫星链路上的性能并不理想。本文首先提出了一种新的链路层(Link Layer, LL)结构方案K-SNC,以提高受干扰链路上的通信性能。在K-SNC中,设计了一种卡尔曼滤波(VKF)的变体来实时估计包擦除率(PER),并引入了一种自适应调整编码窗(ECW)的方法。建立了PER随时间变化趋势的数学模型,作为VKF的基础。分析了SNC中适当的ECW大小与卫星链路上的PER之间的关系。仿真工作是用NS-2实现的。与SNC相比,K-SNC在稳定的卫星链路上得到了显著的改善,在遭受不可预测干扰的卫星链路上提供了高达30%以上的高吞吐量。
{"title":"An adaptive scheme of Systematic Random Network Coding on interfered satellite link","authors":"Yao Xu, B. Tang","doi":"10.1109/COMPCOMM.2016.7924878","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924878","url":null,"abstract":"Systematic Network Coding (SNC) has been studied recent years and it got perfect effect on stable satellite link. However, its performance on interfered satellite link is unsatisfactory according to our research. This paper firstly proposes a novel architecture solution named K-SNC on Link Layer (LL) to improve the goodput of the communication on interfered link. In K-SNC, a Variant of Kalman Filter (VKF) is designed to estimate Packet Erase Rate (PER) in real time and a method is introduced to adjust Encoding Window (ECW) adaptively. A mathematical model is developed as the foundation of VKF about PER changing trend with time lapsing. The relationship is analyzed between the appropriate size of ECW in SNC and the PER on satellite link. Simulation works are implemented with NS-2. In comparison with SNC, K-SNC gets impressive improvement on stable satellite link and provides up to more than 30% higher goodput on the satellite link suffering unpredictable interference.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128039747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A multi-owner data sharing scheme efficiently supporting dynamic scenario on public clouds 多所有者数据共享方案,高效支持公共云动态场景
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924677
Wan Liu, Pengyan Shen, Kai Guo
A naive way for data privacy and security is encrypting data before outsourcing to the cloud. However, encryption triggers a new challenge in a fine-grained access control system, where there are many data owners and membership is dynamically changed. Existing schemes either solve security threats caused by dynamic membership with high cost, such as data re-encryption and/or key re-distribution, or only apply to single-owner scenarios in spite of eliminating the heavy burdens of data owner. This paper presents a multi-owner data sharing scheme with fine-grained access control, which achieves a high efficiency and supports the dynamic scenario. Benefiting from broadcast group key management and group signature techniques, the scheme allows any user to share data with others and it only takes constant time to deal with the change of membership, including user register, revocation and attributes change. Our scheme also achieves data owners' identity privacy preserving. Security analysis and extensive simulating experiments prove the high efficiency and security of proposed scheme.
保护数据隐私和安全的一种幼稚方法是在将数据外包给云之前对其进行加密。然而,在细粒度访问控制系统中,加密引发了一个新的挑战,其中有许多数据所有者和成员关系是动态变化的。现有方案要么解决了动态成员身份带来的高成本安全威胁,如数据重加密和/或密钥重分发,要么只适用于单一所有者场景,尽管消除了数据所有者的沉重负担。本文提出了一种具有细粒度访问控制的多所有者数据共享方案,该方案实现了高效率和支持动态场景。得益于广播组密钥管理和组签名技术,该方案允许任何用户与其他用户共享数据,并且只需要恒定的时间来处理成员变更,包括用户注册、撤销和属性更改。该方案还实现了数据所有者的身份隐私保护。安全性分析和大量的仿真实验证明了该方案的高效性和安全性。
{"title":"A multi-owner data sharing scheme efficiently supporting dynamic scenario on public clouds","authors":"Wan Liu, Pengyan Shen, Kai Guo","doi":"10.1109/COMPCOMM.2016.7924677","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924677","url":null,"abstract":"A naive way for data privacy and security is encrypting data before outsourcing to the cloud. However, encryption triggers a new challenge in a fine-grained access control system, where there are many data owners and membership is dynamically changed. Existing schemes either solve security threats caused by dynamic membership with high cost, such as data re-encryption and/or key re-distribution, or only apply to single-owner scenarios in spite of eliminating the heavy burdens of data owner. This paper presents a multi-owner data sharing scheme with fine-grained access control, which achieves a high efficiency and supports the dynamic scenario. Benefiting from broadcast group key management and group signature techniques, the scheme allows any user to share data with others and it only takes constant time to deal with the change of membership, including user register, revocation and attributes change. Our scheme also achieves data owners' identity privacy preserving. Security analysis and extensive simulating experiments prove the high efficiency and security of proposed scheme.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125666055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An modified PBIL for network coding resource minimization in dynamic network environment 一种用于动态网络环境下网络编码资源最小化的改进PBIL
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924881
Huanlai Xing, Fuhong Song, Zhaoyuan Wang, Tianrui Li, Yan Yang
In network coding, intermediate nodes are allowed to mathematically recombine packets received from different incoming links, which helps increase network throughput and accommodate more traffic flows with limited network resources. Coding operations (i.e. packet recombination), however, could cause significant computational cost and thus introduce heavy burden to the network if they are performed wherever possible. It is hence important to always keep the amount of coding operations minimized in a dynamic network environment. This paper proposes a modified population based incremental learning (PBIL) for solving the above problem, where an environmental adaptation scheme is devised to guide the search tracing the ever-changing optima within the fitness landscape in a dynamic network environment. Experimental results show that the proposed PBIL gains better performance than several state-of-the-art evolutionary algorithms regarding the solution quality.
在网络编码中,允许中间节点从数学上重新组合来自不同传入链路的数据包,这有助于提高网络吞吐量,并在有限的网络资源下容纳更多的流量。然而,编码操作(即数据包重组)可能会导致大量的计算成本,从而给网络带来沉重的负担。因此,在动态网络环境中始终保持编码操作的数量最小化是很重要的。本文提出了一种改进的基于种群的增量学习(PBIL)方法来解决上述问题,该方法设计了一种环境适应方案,指导搜索在动态网络环境中跟踪适应度景观中不断变化的最优解。实验结果表明,该算法在求解质量方面优于几种先进的进化算法。
{"title":"An modified PBIL for network coding resource minimization in dynamic network environment","authors":"Huanlai Xing, Fuhong Song, Zhaoyuan Wang, Tianrui Li, Yan Yang","doi":"10.1109/COMPCOMM.2016.7924881","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924881","url":null,"abstract":"In network coding, intermediate nodes are allowed to mathematically recombine packets received from different incoming links, which helps increase network throughput and accommodate more traffic flows with limited network resources. Coding operations (i.e. packet recombination), however, could cause significant computational cost and thus introduce heavy burden to the network if they are performed wherever possible. It is hence important to always keep the amount of coding operations minimized in a dynamic network environment. This paper proposes a modified population based incremental learning (PBIL) for solving the above problem, where an environmental adaptation scheme is devised to guide the search tracing the ever-changing optima within the fitness landscape in a dynamic network environment. Experimental results show that the proposed PBIL gains better performance than several state-of-the-art evolutionary algorithms regarding the solution quality.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130251899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multi-disciplinary Medical Treatment Decision Support System with intelligent treatment recommendation 基于智能治疗推荐的多学科医疗决策支持系统
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924820
Yan Zhang, Jian Cao, K. Shen, Xiao-song Chen, Siji Zhu
In order to decide a medical treatment plan for a patient, experts from different disciplines should come together to discuss. This process is often time-consuming and organized in an inefficient way. A multi-disciplinary medical treatment decision support system is proposed and developed in order to speed up this process. Specifically, this system can recommend treatment plan according to a patient's clinical information. It is based on k-NN algorithm to learn the appropriate treatment from a patient database. The system structure together with the recommendation approach is introduced. The experimental results are also presented, which show the availability and good performance of this recommendation approach.
为了决定一个病人的医疗方案,来自不同学科的专家应该聚在一起讨论。这个过程通常很耗时,而且组织起来效率很低。为了加快这一过程,提出并开发了一个多学科的医疗决策支持系统。具体来说,该系统可以根据患者的临床信息推荐治疗方案。它基于k-NN算法从患者数据库中学习合适的治疗方法。介绍了系统的结构和推荐方法。实验结果表明了该推荐方法的有效性和良好的性能。
{"title":"A Multi-disciplinary Medical Treatment Decision Support System with intelligent treatment recommendation","authors":"Yan Zhang, Jian Cao, K. Shen, Xiao-song Chen, Siji Zhu","doi":"10.1109/COMPCOMM.2016.7924820","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924820","url":null,"abstract":"In order to decide a medical treatment plan for a patient, experts from different disciplines should come together to discuss. This process is often time-consuming and organized in an inefficient way. A multi-disciplinary medical treatment decision support system is proposed and developed in order to speed up this process. Specifically, this system can recommend treatment plan according to a patient's clinical information. It is based on k-NN algorithm to learn the appropriate treatment from a patient database. The system structure together with the recommendation approach is introduced. The experimental results are also presented, which show the availability and good performance of this recommendation approach.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134501666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The research progress about the intelligent recognition of lung sounds 肺音智能识别的研究进展
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924807
Dongfang Wang, Baoquan Fang, Shili Liang, Shuangwei Wang
This paper introduced the characteristics of the species, lung of the lung sounds signal, acquisition, processing and identification technology, based on the computer's lung sound signal processing and pattern recognition technology, and the research status at home and abroad and a variety of approaches to the study of the lung sound signals are summarized and reviewed in this paper, through a variety of cases of lung sound classification technology based on machine learning in recent years are summarized and the development situation of list; Finally, the study of lung sound classification technology and computer identification technology application development trend is prospected.
本文介绍了肺的种类、特点、肺音信号的采集、处理和识别技术,基于计算机的肺音信号处理和模式识别技术,并对国内外的研究现状和各种肺音信号的研究方法进行了总结和综述。通过各种案例对基于机器学习的肺音分类技术近年来的发展情况进行了总结和列举;最后,对肺音分类技术和计算机识别技术的研究应用发展趋势进行了展望。
{"title":"The research progress about the intelligent recognition of lung sounds","authors":"Dongfang Wang, Baoquan Fang, Shili Liang, Shuangwei Wang","doi":"10.1109/COMPCOMM.2016.7924807","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924807","url":null,"abstract":"This paper introduced the characteristics of the species, lung of the lung sounds signal, acquisition, processing and identification technology, based on the computer's lung sound signal processing and pattern recognition technology, and the research status at home and abroad and a variety of approaches to the study of the lung sound signals are summarized and reviewed in this paper, through a variety of cases of lung sound classification technology based on machine learning in recent years are summarized and the development situation of list; Finally, the study of lung sound classification technology and computer identification technology application development trend is prospected.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131590027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2016 2nd IEEE International Conference on Computer and Communications (ICCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1