首页 > 最新文献

2015 Long Island Systems, Applications and Technology最新文献

英文 中文
Enhancing performance of Hadoop and MapReduce for scientific data using NoSQL database 利用NoSQL数据库增强Hadoop和MapReduce对科学数据的性能
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160180
Hamoud H. Alshammari, H. Bajwa, JeongKyu Lee
Scientific data sets usually have similar jobs that are frequently applied to them by different users. In addition, many of these data sets are unstructured and complex, and required fast and simple processing. In order to increase the performance of the existing Hadoop and MapReduce algorithm, it is necessary to develop an algorithm based on the type of data sets and requirements of the jobs. Genomic and biological data is an example of unstructured data because it only has a huge sequence of unreadable and non-relational letters. In this paper, we present an overview of a developed MapReduce algorithm and its simulation using HBase as a NoSQL database.
科学数据集通常具有相似的工作,这些工作经常由不同的用户应用于它们。此外,许多这些数据集是非结构化和复杂的,需要快速和简单的处理。为了提高现有Hadoop和MapReduce算法的性能,有必要根据数据集的类型和作业的要求开发一种算法。基因组和生物学数据是非结构化数据的一个例子,因为它只有一个巨大的不可读和非关系字母序列。在本文中,我们概述了一种开发的MapReduce算法及其使用HBase作为NoSQL数据库的仿真。
{"title":"Enhancing performance of Hadoop and MapReduce for scientific data using NoSQL database","authors":"Hamoud H. Alshammari, H. Bajwa, JeongKyu Lee","doi":"10.1109/LISAT.2015.7160180","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160180","url":null,"abstract":"Scientific data sets usually have similar jobs that are frequently applied to them by different users. In addition, many of these data sets are unstructured and complex, and required fast and simple processing. In order to increase the performance of the existing Hadoop and MapReduce algorithm, it is necessary to develop an algorithm based on the type of data sets and requirements of the jobs. Genomic and biological data is an example of unstructured data because it only has a huge sequence of unreadable and non-relational letters. In this paper, we present an overview of a developed MapReduce algorithm and its simulation using HBase as a NoSQL database.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134383708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detection of Trojan Horses by the analysis of system behavior and data packets 通过分析系统行为和数据包来检测特洛伊木马
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160176
Vamshi Krishna Gudipati, Aayush Vetwal, Varun Kumar, Anjorin Adeniyi, Abdel-shakour Abuzneid
Trojan Horse is said to be one of the most serious threats to computer security. A Trojan Horse is an executable file in the Windows operating system. This executable file will have certain static and runtime characteristics. Multiple system processes in the Windows OS will be called whenever a Trojan Horse tries to execute any operation on the system. In this paper, a new Trojan Horse detection method by using Windows Dynamic Link Libraries to identify system calls from a Trojan Horses is explicated. Process explorer is used to identify the malicious executables and to determine whether they are Trojans or not. Further, an attempt made to study the network behavior after a Trojan Horse is executed using Wireshark.
据说特洛伊木马是对计算机安全最严重的威胁之一。特洛伊木马是Windows操作系统中的可执行文件。这个可执行文件将具有某些静态和运行时特征。每当特洛伊木马试图在系统上执行任何操作时,Windows操作系统中的多个系统进程将被调用。本文阐述了一种利用Windows动态链接库识别木马系统调用的木马检测方法。进程资源管理器用于识别恶意可执行文件,并确定它们是否是木马程序。此外,尝试使用Wireshark研究特洛伊木马执行后的网络行为。
{"title":"Detection of Trojan Horses by the analysis of system behavior and data packets","authors":"Vamshi Krishna Gudipati, Aayush Vetwal, Varun Kumar, Anjorin Adeniyi, Abdel-shakour Abuzneid","doi":"10.1109/LISAT.2015.7160176","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160176","url":null,"abstract":"Trojan Horse is said to be one of the most serious threats to computer security. A Trojan Horse is an executable file in the Windows operating system. This executable file will have certain static and runtime characteristics. Multiple system processes in the Windows OS will be called whenever a Trojan Horse tries to execute any operation on the system. In this paper, a new Trojan Horse detection method by using Windows Dynamic Link Libraries to identify system calls from a Trojan Horses is explicated. Process explorer is used to identify the malicious executables and to determine whether they are Trojans or not. Further, an attempt made to study the network behavior after a Trojan Horse is executed using Wireshark.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127651405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Motion model binary switch for MonoSLAM MonoSLAM运动模型二进制开关
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160210
Akin Tatoglu, K. Pochiraju
Current Monocular Simultaneous Localization and Mapping (MonoSLAM) methodologies use constant velocity and smooth motion assumptions. If the motion consists of rapid accelerations, decelerations or stops, the position estimates become erroneous and unstable. Mobile robots require frequent stops due to mission dictated or safety reasons. With the objective of using MonoSLAM to localize a mobile robot, we determined the effectiveness of trajectory estimation for a typical robot moving with constant velocity and stopping to execute missions. Experiments were performed with a camera mounted on a 3-axis translational robot and several path profiles with brief stops were executed. The trajectory estimated with a MonoSLAM algorithm is compared with the known motion profile. As the stop causes significant error and drift in the position estimates, we modified the constant velocity motion model to incorporate a stop detection method. An optical flow based stop detection model was formulated and implemented in conjunction with MonoSLAM. Velocity update is modified when a stop or start is detected by optical flow. By adaptively switching between constant velocity and stop models, the trajectory estimate is seen to be more accurate and stable after an intermittent stop. Details of the adaptive switching method and the performance of the modified MonoSLAM are described in this paper.
当前的单目同步定位和映射(MonoSLAM)方法使用恒定速度和平滑运动假设。如果运动包含快速的加速、减速或停止,位置估计就会变得错误和不稳定。由于任务要求或安全原因,移动机器人需要经常停下来。以利用MonoSLAM对移动机器人进行定位为目标,确定了一个典型的机器人匀速运动并停止执行任务的轨迹估计的有效性。实验采用安装在三轴平移机器人上的摄像机进行,并进行了若干路径轮廓的短暂停留。将MonoSLAM算法估计的轨迹与已知的运动轮廓进行比较。由于停止会在位置估计中引起明显的误差和漂移,我们对等速运动模型进行了修改,加入了停止检测方法。提出了一种基于光流的光阑检测模型,并结合MonoSLAM实现了该模型。当光流检测到停止或开始时,速度更新被修改。通过在等速和停车模型之间的自适应切换,间歇停车后的轨迹估计更加准确和稳定。本文详细介绍了自适应切换方法和改进后的MonoSLAM的性能。
{"title":"Motion model binary switch for MonoSLAM","authors":"Akin Tatoglu, K. Pochiraju","doi":"10.1109/LISAT.2015.7160210","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160210","url":null,"abstract":"Current Monocular Simultaneous Localization and Mapping (MonoSLAM) methodologies use constant velocity and smooth motion assumptions. If the motion consists of rapid accelerations, decelerations or stops, the position estimates become erroneous and unstable. Mobile robots require frequent stops due to mission dictated or safety reasons. With the objective of using MonoSLAM to localize a mobile robot, we determined the effectiveness of trajectory estimation for a typical robot moving with constant velocity and stopping to execute missions. Experiments were performed with a camera mounted on a 3-axis translational robot and several path profiles with brief stops were executed. The trajectory estimated with a MonoSLAM algorithm is compared with the known motion profile. As the stop causes significant error and drift in the position estimates, we modified the constant velocity motion model to incorporate a stop detection method. An optical flow based stop detection model was formulated and implemented in conjunction with MonoSLAM. Velocity update is modified when a stop or start is detected by optical flow. By adaptively switching between constant velocity and stop models, the trajectory estimate is seen to be more accurate and stable after an intermittent stop. Details of the adaptive switching method and the performance of the modified MonoSLAM are described in this paper.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125755254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-sensor based collision avoidance algorithm for mobile robot 基于多传感器的移动机器人避碰算法
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160181
Abrar Alajlan, M. Almasri, K. Elleithy
Collision Avoidance (CA) systems have been used in wide range of different robotics areas and had extraordinary success in minimizing the risk of collisions. It is a critical requirement in building mobile robot systems where they all featured some kind of obstacle detection techniques in order to avoid two or more objects from colliding. The purpose of this paper is to present an algorithm for performing collision avoidance in mobile robot that is relying on the use of low-cost ultrasonic with infrared sensors, and involving some other modules, so that it can be easily used in real-time robotic applications. The proposed algorithm is implemented in multiple scenarios with several obstacles placed in different locations around the robot. Our experimental run shows that the robot has been successfully detecting obstacles and avoiding collisions along its path.
避碰(CA)系统已广泛应用于不同的机器人领域,并在最小化碰撞风险方面取得了非凡的成功。为了避免两个或多个物体的碰撞,在构建移动机器人系统中,障碍物检测技术是一个至关重要的要求。本文的目的是提出一种基于低成本超声波和红外传感器的移动机器人避碰算法,并涉及一些其他模块,使其易于在机器人实时应用中使用。该算法在机器人周围不同位置放置障碍物的多个场景中实现。我们的实验运行表明,机器人已经成功地探测到障碍物并避免了沿途的碰撞。
{"title":"Multi-sensor based collision avoidance algorithm for mobile robot","authors":"Abrar Alajlan, M. Almasri, K. Elleithy","doi":"10.1109/LISAT.2015.7160181","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160181","url":null,"abstract":"Collision Avoidance (CA) systems have been used in wide range of different robotics areas and had extraordinary success in minimizing the risk of collisions. It is a critical requirement in building mobile robot systems where they all featured some kind of obstacle detection techniques in order to avoid two or more objects from colliding. The purpose of this paper is to present an algorithm for performing collision avoidance in mobile robot that is relying on the use of low-cost ultrasonic with infrared sensors, and involving some other modules, so that it can be easily used in real-time robotic applications. The proposed algorithm is implemented in multiple scenarios with several obstacles placed in different locations around the robot. Our experimental run shows that the robot has been successfully detecting obstacles and avoiding collisions along its path.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129629165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Extending XACML to express and enforce laws and regulations privacy policies 扩展XACML以表达和执行法律法规隐私策略
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160190
Tariq Alshugran, J. Dichter, A. Rusu
Some software applications are developed to collect, store, and manage users' personal, medical, or financial information. In the United States, such applications are required to preserve users' privacy and to be compliant with the federal privacy laws and regulations. To formally guarantee compliance with federal regulations, it is necessary to express the privacy rules enforced by those regulations in a standard policy specification language. In this work we evaluate the eXtensible Access Control Model Language (XACML) as a formal specification language for privacy laws and regulations. Furthermore, we evaluate XACML features and attributes to extend it in order to enforce those privacy rules.
开发了一些软件应用程序来收集、存储和管理用户的个人、医疗或财务信息。在美国,此类应用程序需要保护用户的隐私,并遵守联邦隐私法律法规。为了正式保证遵守联邦法规,有必要用标准的策略规范语言表达由这些法规强制执行的隐私规则。在这项工作中,我们评估了可扩展访问控制模型语言(XACML)作为隐私法律和法规的正式规范语言。此外,我们还对XACML特性和属性进行了评估,以便对其进行扩展,以强制执行这些隐私规则。
{"title":"Extending XACML to express and enforce laws and regulations privacy policies","authors":"Tariq Alshugran, J. Dichter, A. Rusu","doi":"10.1109/LISAT.2015.7160190","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160190","url":null,"abstract":"Some software applications are developed to collect, store, and manage users' personal, medical, or financial information. In the United States, such applications are required to preserve users' privacy and to be compliant with the federal privacy laws and regulations. To formally guarantee compliance with federal regulations, it is necessary to express the privacy rules enforced by those regulations in a standard policy specification language. In this work we evaluate the eXtensible Access Control Model Language (XACML) as a formal specification language for privacy laws and regulations. Furthermore, we evaluate XACML features and attributes to extend it in order to enforce those privacy rules.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122746594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hadoop eco system for big data security and privacy Hadoop生态系统的大数据安全和隐私
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160211
Pradeep Adluru, Srikari Sindhoori Datla, Xiaowen Zhang
Privacy and Security of Big Data is gaining high importance since recently all the technologies started to depend on Big Data. In this paper, we are going to discuss particularly Hadoop and difficulty in maintaining the privacy and security of Big Data. The main goal is to propose a Hadoop system that maintains the privacy and security of the information stored on the cloud.
自从最近所有的技术都开始依赖于大数据以来,大数据的隐私和安全变得越来越重要。在本文中,我们将特别讨论Hadoop以及维护大数据隐私和安全的困难。主要目标是提出一个维护存储在云上的信息的隐私和安全的Hadoop系统。
{"title":"Hadoop eco system for big data security and privacy","authors":"Pradeep Adluru, Srikari Sindhoori Datla, Xiaowen Zhang","doi":"10.1109/LISAT.2015.7160211","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160211","url":null,"abstract":"Privacy and Security of Big Data is gaining high importance since recently all the technologies started to depend on Big Data. In this paper, we are going to discuss particularly Hadoop and difficulty in maintaining the privacy and security of Big Data. The main goal is to propose a Hadoop system that maintains the privacy and security of the information stored on the cloud.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134335626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Model of indoor signal propagation using log-normal shadowing 使用对数正态阴影的室内信号传播模型
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160217
R. Desimone, Betsy Mendieta Brito, J. Baston
Indoor signal propagation characteristics can be difficult to predict accurately. Factors such as building layout and building materials can have a major effect on signal propagation. In this paper we will model indoor signal propagation using lognormal shadowing characteristics. The benefit of this model over others is its simplicity. The accuracy of this model at predicting the relationship between received signal strength (RSS) and the distance from transmitter to receiver will be determined. The link that was tested and modeled uses the IEEE 802.11n standard. Both 2.4 GHz and 5 GHz Industrial Scientific and Medical (ISM) bands were tested and modeled.
室内信号的传播特性很难准确预测。建筑布局和建筑材料等因素对信号传播有重要影响。在本文中,我们将使用对数正态阴影特性来模拟室内信号传播。这个模型相对于其他模型的好处是简单。该模型在预测接收信号强度(RSS)与发射机到接收机的距离之间的关系方面的准确性将被确定。测试和建模的链路使用IEEE 802.11n标准。对2.4 GHz和5 GHz工业科学和医疗(ISM)频段进行了测试和建模。
{"title":"Model of indoor signal propagation using log-normal shadowing","authors":"R. Desimone, Betsy Mendieta Brito, J. Baston","doi":"10.1109/LISAT.2015.7160217","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160217","url":null,"abstract":"Indoor signal propagation characteristics can be difficult to predict accurately. Factors such as building layout and building materials can have a major effect on signal propagation. In this paper we will model indoor signal propagation using lognormal shadowing characteristics. The benefit of this model over others is its simplicity. The accuracy of this model at predicting the relationship between received signal strength (RSS) and the distance from transmitter to receiver will be determined. The link that was tested and modeled uses the IEEE 802.11n standard. Both 2.4 GHz and 5 GHz Industrial Scientific and Medical (ISM) bands were tested and modeled.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134217111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A modified region growing based algorithm to vessel segmentation in magnetic resonance angiography 一种改进的基于区域增长的磁共振血管造影血管分割算法
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160191
M. Almi'ani, B. Barkana
The progress of medical imaging instrumentation has stirred the development of new computer-aided methods of image processing and analysis for better understanding and interpretation of medical images for differential diagnosis, intervention, and treatment monitoring. Image processing and analysis methods have been used to help physicians to make important medical decisions through physician-computer interaction. A modified region growing algorithm is proposed to extract cerebral vessels using a magnetic resonance angiography (MRA) database. To improve the performance of the image segmentation method, as a pre-processing step, image enhancement methods are applied by the gamma correction technique and spatial operations. This step improves the detection of gray-level discontinuities in MRA images. The traditional region growing method is modified by extending the neighborhood as 24 pixels and by defining a filling protocol to label vascular structure. The performance of the proposed algorithm is compared with that of the traditional region growing method and four other segmentation methods. Our proposed method outperformed the other methods. The minimum and maximum errors of the modified region growing method is calculated as zero and 0.82, respectively while the traditional region growing method has 1.85 and 21.91.
医学成像仪器的进步促进了新的计算机辅助图像处理和分析方法的发展,以便更好地理解和解释用于鉴别诊断、干预和治疗监测的医学图像。图像处理和分析方法已被用于帮助医生通过医生-计算机交互做出重要的医疗决策。提出了一种改进的区域增长算法,利用磁共振血管成像(MRA)数据库提取脑血管。为了提高图像分割方法的性能,作为预处理步骤,采用了伽玛校正技术和空间运算的图像增强方法。这一步改进了MRA图像中灰度不连续性的检测。对传统的区域生长方法进行了改进,将邻域扩展为24像素,并定义了填充协议来标记维管结构。将该算法的性能与传统的区域增长方法和其他四种分割方法进行了比较。我们提出的方法优于其他方法。改进区域生长法的最小和最大误差分别为0和0.82,而传统区域生长法的最小和最大误差分别为1.85和21.91。
{"title":"A modified region growing based algorithm to vessel segmentation in magnetic resonance angiography","authors":"M. Almi'ani, B. Barkana","doi":"10.1109/LISAT.2015.7160191","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160191","url":null,"abstract":"The progress of medical imaging instrumentation has stirred the development of new computer-aided methods of image processing and analysis for better understanding and interpretation of medical images for differential diagnosis, intervention, and treatment monitoring. Image processing and analysis methods have been used to help physicians to make important medical decisions through physician-computer interaction. A modified region growing algorithm is proposed to extract cerebral vessels using a magnetic resonance angiography (MRA) database. To improve the performance of the image segmentation method, as a pre-processing step, image enhancement methods are applied by the gamma correction technique and spatial operations. This step improves the detection of gray-level discontinuities in MRA images. The traditional region growing method is modified by extending the neighborhood as 24 pixels and by defining a filling protocol to label vascular structure. The performance of the proposed algorithm is compared with that of the traditional region growing method and four other segmentation methods. Our proposed method outperformed the other methods. The minimum and maximum errors of the modified region growing method is calculated as zero and 0.82, respectively while the traditional region growing method has 1.85 and 21.91.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132474813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A new selected points to enhance radio wave propagation strength outside the coverage area of the mobile towers in the dead spots of cellular mobile WiFi downloads 在蜂窝移动wi - fi下载的死点移动塔覆盖区域外的新选点增强无线电波传播强度
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160194
Zyad Nossire, J. Dichter, Navarun Gupta, J. Fathi
Mobile phone base station (tower) provides coverage for one or more geographical areas, known as cells. A mobile phone network is made up of a base station operating in conjunction with adjacent base stations. Base stations must be carefully located in relation to each other, so each cell in the network functions efficiently to ensure minimum interference between cells and good signal quality. One of the major problems for cellular wireless devices is calls being dropped and failure in downloading data. Our research uses a new recommendation in determining tower positions. Thus, providing an easy interface to replace traditional control methods and maintain signal levels. The weak WiFi wave propagation outside tower's coverage areas is investigated at the University of Bridgeport (UB) campus. The campus serves as good experimental settings because it exemplifies typical signal dead spots, locations where little to no WiFi signal is available. In this paper, we investigate path loss propagation between the base stations and we identify and categorize these problems. We then apply our path loss propagation algorithmic models to show that signal strength is significantly improved when applying the proposed model. Finally, we show the efficiency of the proposed positions.
移动电话基站(塔)提供覆盖一个或多个地理区域,称为小区。移动电话网络是由一个基站与相邻的基站一起操作组成的。基站之间必须仔细定位,这样网络中的每个小区才能有效地工作,以确保小区之间的干扰最小和良好的信号质量。蜂窝无线设备的主要问题之一是掉线和下载数据失败。我们的研究采用了一种新的建议来确定塔的位置。因此,提供了一个简单的接口,以取代传统的控制方法和维持信号电平。在布里奇波特大学(University of Bridgeport, UB)校园内,对塔架覆盖区域外的弱WiFi波传播进行了研究。校园是一个很好的实验场所,因为它是典型的信号盲区,在那里几乎没有WiFi信号可用。本文研究了基站间的路径损耗传播问题,并对这些问题进行了识别和分类。然后,我们应用我们的路径损耗传播算法模型来表明,当应用所提出的模型时,信号强度显着提高。最后,我们展示了所提出的位置的效率。
{"title":"A new selected points to enhance radio wave propagation strength outside the coverage area of the mobile towers in the dead spots of cellular mobile WiFi downloads","authors":"Zyad Nossire, J. Dichter, Navarun Gupta, J. Fathi","doi":"10.1109/LISAT.2015.7160194","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160194","url":null,"abstract":"Mobile phone base station (tower) provides coverage for one or more geographical areas, known as cells. A mobile phone network is made up of a base station operating in conjunction with adjacent base stations. Base stations must be carefully located in relation to each other, so each cell in the network functions efficiently to ensure minimum interference between cells and good signal quality. One of the major problems for cellular wireless devices is calls being dropped and failure in downloading data. Our research uses a new recommendation in determining tower positions. Thus, providing an easy interface to replace traditional control methods and maintain signal levels. The weak WiFi wave propagation outside tower's coverage areas is investigated at the University of Bridgeport (UB) campus. The campus serves as good experimental settings because it exemplifies typical signal dead spots, locations where little to no WiFi signal is available. In this paper, we investigate path loss propagation between the base stations and we identify and categorize these problems. We then apply our path loss propagation algorithmic models to show that signal strength is significantly improved when applying the proposed model. Finally, we show the efficiency of the proposed positions.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117214180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An empirical fingerprint framework to detect Rogue Access Points 一个经验指纹框架,以检测流氓接入点
Pub Date : 2015-05-01 DOI: 10.1109/LISAT.2015.7160206
Bandar Alotaibi, K. Elleithy
The aim of this paper is to detect Rogue Access Points (RAPs) that clone some of the characteristics of nearby legitimate Access Points (APs). A new passive approach that takes advantage of the first frame that the RAP sends (i.e, Beacon Frame (BF)) when it is planted in the Wireless Local Area Network (WLAN) is proposed. We apply the proposed fingerprint to detect RAPs to evaluate the fingerprint effectiveness. The proposed framework examines every beacon frame size, and compares it with a threshold value. The technique is implemented on a commercially available Wireless Network Interface Controller (WNIC) to evaluate its accuracy. The detection algorithm achieves 100 percent accuracy to determine the RAPs in a lightly loaded traffic environment. The detection time can be taken in approximately 100 ms and is scanned in real-time setting. The robustness and the efficiency of the detection algorithm are examined in two different locations.
本文的目的是检测复制附近合法接入点(ap)的某些特征的流氓接入点(rap)。提出了一种新的被动方法,利用RAP在无线局域网(WLAN)中植入时发送的第一帧(即信标帧(BF))。我们将提出的指纹用于检测RAPs,以评估指纹的有效性。提出的框架检查每个信标帧大小,并将其与阈值进行比较。该技术在市售无线网络接口控制器(WNIC)上实现,以评估其准确性。该检测算法在轻负荷的流量环境下,确定rap的准确率达到100%。检测时间约为100毫秒,并在实时设置中进行扫描。在两个不同的位置检验了检测算法的鲁棒性和效率。
{"title":"An empirical fingerprint framework to detect Rogue Access Points","authors":"Bandar Alotaibi, K. Elleithy","doi":"10.1109/LISAT.2015.7160206","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160206","url":null,"abstract":"The aim of this paper is to detect Rogue Access Points (RAPs) that clone some of the characteristics of nearby legitimate Access Points (APs). A new passive approach that takes advantage of the first frame that the RAP sends (i.e, Beacon Frame (BF)) when it is planted in the Wireless Local Area Network (WLAN) is proposed. We apply the proposed fingerprint to detect RAPs to evaluate the fingerprint effectiveness. The proposed framework examines every beacon frame size, and compares it with a threshold value. The technique is implemented on a commercially available Wireless Network Interface Controller (WNIC) to evaluate its accuracy. The detection algorithm achieves 100 percent accuracy to determine the RAPs in a lightly loaded traffic environment. The detection time can be taken in approximately 100 ms and is scanned in real-time setting. The robustness and the efficiency of the detection algorithm are examined in two different locations.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116304988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2015 Long Island Systems, Applications and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1