首页 > 最新文献

World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering最新文献

英文 中文
Passive Solar Techniques to Improve Thermal Comfort and Reduce Energy Consumption of Domestic Use 被动式太阳能技术改善热舒适和减少能源消耗的家庭使用
Naci Kalkan, I. Dagtekin
Passive design responds to improve indoor thermal comfort and minimize the energy consumption. The present research analyzed the how efficiently passive solar technologies generate heating and cooling and provide the system integration for domestic applications. In addition to this, the aim of this study is to increase the efficiency of solar systems system with integration some innovation and optimization. As a result, outputs of the project might start a new sector to provide environmentally friendly and cheap cooling for domestic use.
被动式设计提高了室内热舒适性,最大限度地减少了能耗。本研究分析了被动式太阳能技术如何高效地产生供暖和制冷,并为国内应用提供了系统集成。除此之外,本研究的目的是通过对太阳能系统集成的一些创新和优化来提高系统的效率。因此,该项目的产出可能会开创一个新的部门,为家庭使用提供无害环境和廉价的冷却。
{"title":"Passive Solar Techniques to Improve Thermal Comfort and Reduce Energy Consumption of Domestic Use","authors":"Naci Kalkan, I. Dagtekin","doi":"10.5281/ZENODO.1123672","DOIUrl":"https://doi.org/10.5281/ZENODO.1123672","url":null,"abstract":"Passive design responds to improve indoor thermal comfort and minimize the energy consumption. The present research analyzed the how efficiently passive solar technologies generate heating and cooling and provide the system integration for domestic applications. In addition to this, the aim of this study is to increase the efficiency of solar systems system with integration some innovation and optimization. As a result, outputs of the project might start a new sector to provide environmentally friendly and cheap cooling for domestic use.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87686554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Certificateless Broadcast Proxy Re-encryption With Group-Oriented Model 面向组模型的无证书广播代理重加密
Chih-Hung Wang, Pei-Jyun Lu
The major concept of certificateless cryptosystem is to remove the certificate in public-key cryptosystem and solve the key escrow drawback in the ID-based scheme. For the privacy protection in the public cloud environment, the proxy re-encryption scheme was developed to allow a semi-trusted proxy to transform a ciphertext under one person’s public key into other ciphertext under another person’s public key without decryption. Nowadays, many related applications of certificateless proxy re-encryption scheme have been proposed. However, most of certificateless proxy re-encryption schemes allow only a single receiver, which means for more receivers, re-transforming the ciphertext multiple times is needed. This paper introduces a novel notion of proxy re-encryption in which the sender can broadcast the re-encrypted ciphertext to a group of receivers through the proxy’s assistance based on certificateless public key cryptography. The proposed scheme has the property of constant-size re-encryption key and ciphertext, and is particularly suitable for the application executing in the enormous cloud networking.
无证书密码体制的主要思想是消除公钥密码体制中的证书,解决基于身份的密码体制中的密钥托管缺陷。针对公共云环境下的隐私保护问题,提出了代理重加密方案,允许半信任代理在不解密的情况下,将一个人公钥下的密文转换为另一个人公钥下的密文。目前,已经提出了许多无证书代理重加密方案的相关应用。然而,大多数无证书代理重新加密方案只允许一个接收者,这意味着对于更多的接收者,需要多次重新转换密文。提出了一种基于无证书公钥加密的代理再加密的新概念,发送方可以通过代理的辅助将重新加密的密文广播给一组接收方。该方案具有密钥和密文大小不变的特性,特别适合在庞大的云网络中执行的应用。
{"title":"Certificateless Broadcast Proxy Re-encryption With Group-Oriented Model","authors":"Chih-Hung Wang, Pei-Jyun Lu","doi":"10.17706/IJCCE.2016.5.5.358-366","DOIUrl":"https://doi.org/10.17706/IJCCE.2016.5.5.358-366","url":null,"abstract":"The major concept of certificateless cryptosystem is to remove the certificate in public-key cryptosystem and solve the key escrow drawback in the ID-based scheme. For the privacy protection in the public cloud environment, the proxy re-encryption scheme was developed to allow a semi-trusted proxy to transform a ciphertext under one person’s public key into other ciphertext under another person’s public key without decryption. Nowadays, many related applications of certificateless proxy re-encryption scheme have been proposed. However, most of certificateless proxy re-encryption schemes allow only a single receiver, which means for more receivers, re-transforming the ciphertext multiple times is needed. This paper introduces a novel notion of proxy re-encryption in which the sender can broadcast the re-encrypted ciphertext to a group of receivers through the proxy’s assistance based on certificateless public key cryptography. The proposed scheme has the property of constant-size re-encryption key and ciphertext, and is particularly suitable for the application executing in the enormous cloud networking.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76162596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Recommendation Accuracy for Cold Start Users in Trust-Based Recommender Systems 在基于信任的推荐系统中提高冷启动用户的推荐准确性
A. Bellaachia, Deema Alathel, Dc Washington, America
Recommender systems have become extremely popular in recent years due to their ability to predict a user’s preference or rating of a certain item by analyzing similar users in the network. Trust-based recommender systems generate these predictions by using an explicitly issued trust between the users. In this paper we propose a recommendation algorithm called Averaged Localized Trust-Based Ant Recommender (ALT-BAR) that follows the methodology applied by Ant Colony Optimization algorithms to increase the accuracy of predictions in recommender systems, especially for cold start users. Cold start users are considered challenging to deal with in any recommender system because of the few ratings they have in their profiles. ALT-BAR reinforces the significance of trust between users, to overcome the lack of ratings, by modifying the way the initial pheromone levels of edges are calculated to reflect each edge’s associated trust level. An appropriate initialization of pheromone in ant algorithms in general can guarantee a proper convergence of the system to the optimal solution. ALT-BAR’s approach allows the ants to expand their search scope in the solution space to find ratings for cold start users while exploiting discovered good solutions for the sake of heavy raters. When compared to other algorithms in the literature, ALT-BAR proved to be extremely successful in enhancing the prediction accuracy and coverage for cold start users while still maintaining fairly good results for heavy raters.
推荐系统近年来变得非常流行,因为它们能够通过分析网络中相似的用户来预测用户的偏好或对特定物品的评级。基于信任的推荐系统通过使用用户之间明确发布的信任来生成这些预测。在本文中,我们提出了一种基于平均局部信任的蚂蚁推荐算法(ALT-BAR),该算法遵循蚁群优化算法用于提高推荐系统预测准确性的方法,特别是对于冷启动用户。冷启动用户被认为在任何推荐系统中都很难处理,因为他们的个人资料中很少有评级。ALT-BAR强化了用户之间信任的重要性,克服了评级的缺乏,通过修改计算边缘的初始信息素水平的方式来反映每个边缘的相关信任水平。蚁群算法中适当的初始化信息素可以保证系统收敛到最优解。ALT-BAR的方法允许蚂蚁扩展其在解决方案空间中的搜索范围,以查找冷启动用户的评分,同时利用已发现的好的解决方案来为高评分者提供评分。与文献中的其他算法相比,ALT-BAR被证明在提高冷启动用户的预测精度和覆盖率方面非常成功,同时对于重评分者仍然保持相当好的结果。
{"title":"Improving the Recommendation Accuracy for Cold Start Users in Trust-Based Recommender Systems","authors":"A. Bellaachia, Deema Alathel, Dc Washington, America","doi":"10.17706/ijcce.2016.5.3.206-214","DOIUrl":"https://doi.org/10.17706/ijcce.2016.5.3.206-214","url":null,"abstract":"Recommender systems have become extremely popular in recent years due to their ability to predict a user’s preference or rating of a certain item by analyzing similar users in the network. Trust-based recommender systems generate these predictions by using an explicitly issued trust between the users. In this paper we propose a recommendation algorithm called Averaged Localized Trust-Based Ant Recommender (ALT-BAR) that follows the methodology applied by Ant Colony Optimization algorithms to increase the accuracy of predictions in recommender systems, especially for cold start users. Cold start users are considered challenging to deal with in any recommender system because of the few ratings they have in their profiles. ALT-BAR reinforces the significance of trust between users, to overcome the lack of ratings, by modifying the way the initial pheromone levels of edges are calculated to reflect each edge’s associated trust level. An appropriate initialization of pheromone in ant algorithms in general can guarantee a proper convergence of the system to the optimal solution. ALT-BAR’s approach allows the ants to expand their search scope in the solution space to find ratings for cold start users while exploiting discovered good solutions for the sake of heavy raters. When compared to other algorithms in the literature, ALT-BAR proved to be extremely successful in enhancing the prediction accuracy and coverage for cold start users while still maintaining fairly good results for heavy raters.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77780944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN SDN可行路径反向转发过滤源欺骗IP流量
Kevin Benton, L. Camp, T. Kelley, M. Swany
Source IP address spoofing is still a significant problem on today’s Internet. Recent DDoS attacks, which combined source IP spoofing and amplifying UDP services, have resulted in attack traffic volumes exceeding hundreds of gigabits per second. In this work we argue that the ingress packet filtering solutions proposed in BCP 38 more than 13 years ago have failed to solve the issue due to fundamental incentive misalignment. We present an SDN implementation of feasible path reverse path forwarding which tier 2 ISPs could implement using OpenFlow switches at peering points with no impact to the performance of their routers. We show how an SDN solution can handle error cases more gracefully than current reverse path forwarding implementations. We illustrate that this proposal is well-aligned with the economic incentives of the adopting parties and furthermore does not require ubiquitous adoption to create network-wide immunity. We describe our open code implementation on OpenFlow. Finally, we discuss the limitations of this filtering approach.
源IP地址欺骗仍然是当今互联网上的一个重要问题。最近的DDoS攻击,结合源IP欺骗和UDP放大服务,导致攻击流量超过每秒数百千兆比特。在这项工作中,我们认为13年前在BCP 38中提出的入口包过滤解决方案由于根本的激励错位而未能解决问题。我们提出了一种可行路径反向路径转发的SDN实现,二层isp可以在对等点使用OpenFlow交换机实现,而不会影响其路由器的性能。我们展示了SDN解决方案如何比当前的反向路径转发实现更优雅地处理错误情况。我们指出,这一提议与采纳方的经济激励非常一致,而且不需要普遍采用以产生全网络豁免。我们在OpenFlow上描述我们的开放代码实现。最后,我们讨论了这种滤波方法的局限性。
{"title":"Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN","authors":"Kevin Benton, L. Camp, T. Kelley, M. Swany","doi":"10.17706/IJCCE.2016.5.6.441-454","DOIUrl":"https://doi.org/10.17706/IJCCE.2016.5.6.441-454","url":null,"abstract":"Source IP address spoofing is still a significant problem on today’s Internet. Recent DDoS attacks, which combined source IP spoofing and amplifying UDP services, have resulted in attack traffic volumes exceeding hundreds of gigabits per second. In this work we argue that the ingress packet filtering solutions proposed in BCP 38 more than 13 years ago have failed to solve the issue due to fundamental incentive misalignment. We present an SDN implementation of feasible path reverse path forwarding which tier 2 ISPs could implement using OpenFlow switches at peering points with no impact to the performance of their routers. We show how an SDN solution can handle error cases more gracefully than current reverse path forwarding implementations. We illustrate that this proposal is well-aligned with the economic incentives of the adopting parties and furthermore does not require ubiquitous adoption to create network-wide immunity. We describe our open code implementation on OpenFlow. Finally, we discuss the limitations of this filtering approach.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89946868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model of Cascading Failures for Communication Networks 通信网络级联故障模型
Lei Zhu, Xiaochen Liu, Lu Yu, Xinrong Wu
Communication networks play such a critical role in modern society that any failures in these networks are intolerable. In this study, we focus on the influence of network congestion and build a model to study the dynamics of cascading failures in communication networks. Investigation of the relationship between the initial allocation of efficiency among edges and the damage caused by cascading failures shows that a higher initial efficiency may lead to more severe consequence in case of cascading failures. We also investigate the influence of the size of the router’s buffer. Because the correct buffer size can alleviate network congestion to some extent, it is able to enhance the robustness of the network against cascading failures.
通信网络在现代社会中起着至关重要的作用,任何网络故障都是不可容忍的。在本研究中,我们关注网络拥塞的影响,并建立了一个模型来研究通信网络中级联故障的动力学。研究了初始效率在边缘间的分配与级联破坏的关系,发现初始效率越高,发生级联破坏时后果越严重。我们还研究了路由器缓冲区大小的影响。由于正确的缓冲区大小可以在一定程度上缓解网络拥塞,因此可以增强网络对级联故障的鲁棒性。
{"title":"Model of Cascading Failures for Communication Networks","authors":"Lei Zhu, Xiaochen Liu, Lu Yu, Xinrong Wu","doi":"10.17706/IJCCE.2016.5.5.302-310","DOIUrl":"https://doi.org/10.17706/IJCCE.2016.5.5.302-310","url":null,"abstract":"Communication networks play such a critical role in modern society that any failures in these networks are intolerable. In this study, we focus on the influence of network congestion and build a model to study the dynamics of cascading failures in communication networks. Investigation of the relationship between the initial allocation of efficiency among edges and the damage caused by cascading failures shows that a higher initial efficiency may lead to more severe consequence in case of cascading failures. We also investigate the influence of the size of the router’s buffer. Because the correct buffer size can alleviate network congestion to some extent, it is able to enhance the robustness of the network against cascading failures.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75461965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Threshold Selection for Sequential Learning in Radial Basis Function Networks 径向基函数网络中顺序学习的动态阈值选择
W. Lim, W. Yeoh
For sequential learning in Radial Basis Function (RBF) Networks, there is a requirement for dynamic selection of threshold because a constant threshold is inadequate to accommodate functions of varying amplitudes. In this paper, a new criterion is defined for the dynamic selection of the Euclidean output deviation threshold. Its effect on the learning process experienced by RBF networks with regard to functions of variable amplitude is shown. This improved network can automatically select a suitable threshold for its own supervised learning depending on the objective parameters set to achieve certain accuracy level of the desired output. This paper also proposes further automation to neuron growing and pruning within Radial Basis Function (RBF) neural networks. The proposed dynamic threshold selection technique has shown significant improvement in achieving stable neuron growth rate in dealing with signal amplitude variation.
对于径向基函数(RBF)网络中的顺序学习,由于固定的阈值不足以适应变化幅度的函数,因此需要动态选择阈值。本文定义了一种新的欧氏输出偏差阈值动态选择准则。给出了其对变幅函数的RBF网络学习过程的影响。这种改进的网络可以根据所设置的客观参数自动为自己的监督学习选择合适的阈值,以达到期望输出的一定精度水平。本文还提出了径向基函数(RBF)神经网络中神经元生长和修剪的进一步自动化。所提出的动态阈值选择技术在处理信号振幅变化时,在获得稳定的神经元生长速率方面有显著的改进。
{"title":"Dynamic Threshold Selection for Sequential Learning in Radial Basis Function Networks","authors":"W. Lim, W. Yeoh","doi":"10.17706/IJCCE.2016.5.5.311-320","DOIUrl":"https://doi.org/10.17706/IJCCE.2016.5.5.311-320","url":null,"abstract":"For sequential learning in Radial Basis Function (RBF) Networks, there is a requirement for dynamic selection of threshold because a constant threshold is inadequate to accommodate functions of varying amplitudes. In this paper, a new criterion is defined for the dynamic selection of the Euclidean output deviation threshold. Its effect on the learning process experienced by RBF networks with regard to functions of variable amplitude is shown. This improved network can automatically select a suitable threshold for its own supervised learning depending on the objective parameters set to achieve certain accuracy level of the desired output. This paper also proposes further automation to neuron growing and pruning within Radial Basis Function (RBF) neural networks. The proposed dynamic threshold selection technique has shown significant improvement in achieving stable neuron growth rate in dealing with signal amplitude variation.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79036419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WSNs and on-Board Visual Fuzzy Servoing on Blimp Robot for Tracking Purposes 用于跟踪目的的飞艇机器人的无线传感器网络和机载视觉模糊伺服
R. Al-Jarrah, M. Al-Jarrah, H. Roth
The aerial robots represent an interested and rich area of research because they are very useful to perform complex tasks such as localization and tracking targets. To develop blimp system that is appropriate in diversity scenarios, an intelligent control with high autonomy degree is required. Therefore, we design blimp robot based on embedded system; then, we present several fuzzy sets models that should deal with autonomous, navigation and visual tracking problems. These models are empirically designed by combining the possibilities distributions theory with fuzzy logic. Thus, this paper addresses the problem of tracking robots in parallel with achieving the cooperative behavior based on computer vision system and artificial intelligent control to improve the efficiency of such system. In addition, considering use of wireless sensor networks for estimation multi-targets locations and the distances between them is presented.
空中机器人代表了一个有趣而丰富的研究领域,因为它们在执行复杂任务(如定位和跟踪目标)方面非常有用。为了开发适用于多种场景的飞艇系统,需要具有高度自治程度的智能控制。因此,我们设计了基于嵌入式系统的飞艇机器人;然后,我们提出了几个模糊集模型,应该处理自主,导航和视觉跟踪问题。这些模型是将可能性分布理论与模糊逻辑相结合进行经验设计的。因此,本文解决了基于计算机视觉系统和人工智能控制的机器人跟踪与实现协同行为并行的问题,以提高系统的效率。此外,提出了利用无线传感器网络估计多目标位置和目标间距离的方法。
{"title":"WSNs and on-Board Visual Fuzzy Servoing on Blimp Robot for Tracking Purposes","authors":"R. Al-Jarrah, M. Al-Jarrah, H. Roth","doi":"10.17706/ijcce.2016.5.3.215-221","DOIUrl":"https://doi.org/10.17706/ijcce.2016.5.3.215-221","url":null,"abstract":"The aerial robots represent an interested and rich area of research because they are very useful to perform complex tasks such as localization and tracking targets. To develop blimp system that is appropriate in diversity scenarios, an intelligent control with high autonomy degree is required. Therefore, we design blimp robot based on embedded system; then, we present several fuzzy sets models that should deal with autonomous, navigation and visual tracking problems. These models are empirically designed by combining the possibilities distributions theory with fuzzy logic. Thus, this paper addresses the problem of tracking robots in parallel with achieving the cooperative behavior based on computer vision system and artificial intelligent control to improve the efficiency of such system. In addition, considering use of wireless sensor networks for estimation multi-targets locations and the distances between them is presented.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88998873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Technical requirements of the e-waybill service 电子运单服务的技术要求
S. Bakhtyar, J. Holmgren, J. Persson
An electronic waybill (e-Waybill) is a service whose purpose is to replace the paper waybill, which is a paper documents that traditionally follows a consignment during transport. An important purp ...
电子运单(e-Waybill)是一种服务,其目的是取代纸质运单,纸质运单是一种在运输过程中跟随货物的纸质文件。一个重要的目标……
{"title":"Technical requirements of the e-waybill service","authors":"S. Bakhtyar, J. Holmgren, J. Persson","doi":"10.17706/IJCCE.2016.5.2.130-140","DOIUrl":"https://doi.org/10.17706/IJCCE.2016.5.2.130-140","url":null,"abstract":"An electronic waybill (e-Waybill) is a service whose purpose is to replace the paper waybill, which is a paper documents that traditionally follows a consignment during transport. An important purp ...","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85316623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Capability-Based Hybrid CPU/GPU Pattern Matching Algorithm for Deep Packet Inspection 一种基于能力的CPU/GPU混合模式匹配算法用于深度包检测
Yi-Shan Lin, Chun-Liang Lee, Yaw-Chung Chen
Network applications have been developed quickly during recent years, and communications between these applications involve a large quantity of data transfer through high speed networks. Deep packet inspection (DPI) becomes indispensable to ensure network application-aware security. One of the DPI services is the signature-based network intrusion detection system (NIDS), in which the implementation on software platforms has become a trend due to the advantages of high programmability and low cost. Recently, the graphic processing units (GPU) is commonly used to accelerate the packet processing because of its superior parallel processing power. Since delivering all packets to GPU causes high data transfer latency and consequently restricts the overall performance, our previous study proposed a mechanism, HPMA, to reduce the effect of transfer bottleneck and achieve higher processing speed. In this paper, we introduce an enhancement of HPMA, a capability-based hybrid CPU/GPU pattern matching algorithm (CHPMA). A preliminary experiment shows that the CHPMA not only performs as efficient as the HPMA in most cases, but also obtains higher performance gain than the HPMA under unfavorable conditions.
近年来,网络应用发展迅速,应用之间的通信需要通过高速网络进行大量的数据传输。深度包检测(Deep packet detection, DPI)成为保障网络应用感知安全不可或缺的手段。DPI服务之一是基于签名的网络入侵检测系统(NIDS),由于其高可编程性和低成本的优势,在软件平台上实现已成为一种趋势。近年来,图形处理单元(GPU)由于其优越的并行处理能力而被广泛用于加速数据包的处理。由于将所有数据包都送到GPU会导致数据传输延迟高,从而限制了整体性能,我们在之前的研究中提出了一种机制HPMA,以减少传输瓶颈的影响,实现更高的处理速度。本文介绍了一种基于性能的CPU/GPU混合模式匹配算法(CHPMA)。初步实验表明,CHPMA不仅在大多数情况下与HPMA一样高效,而且在不利条件下比HPMA获得更高的性能增益。
{"title":"A Capability-Based Hybrid CPU/GPU Pattern Matching Algorithm for Deep Packet Inspection","authors":"Yi-Shan Lin, Chun-Liang Lee, Yaw-Chung Chen","doi":"10.17706/IJCCE.2016.5.5.321-330","DOIUrl":"https://doi.org/10.17706/IJCCE.2016.5.5.321-330","url":null,"abstract":"Network applications have been developed quickly during recent years, and communications between these applications involve a large quantity of data transfer through high speed networks. Deep packet inspection (DPI) becomes indispensable to ensure network application-aware security. One of the DPI services is the signature-based network intrusion detection system (NIDS), in which the implementation on software platforms has become a trend due to the advantages of high programmability and low cost. Recently, the graphic processing units (GPU) is commonly used to accelerate the packet processing because of its superior parallel processing power. Since delivering all packets to GPU causes high data transfer latency and consequently restricts the overall performance, our previous study proposed a mechanism, HPMA, to reduce the effect of transfer bottleneck and achieve higher processing speed. In this paper, we introduce an enhancement of HPMA, a capability-based hybrid CPU/GPU pattern matching algorithm (CHPMA). A preliminary experiment shows that the CHPMA not only performs as efficient as the HPMA in most cases, but also obtains higher performance gain than the HPMA under unfavorable conditions.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91511072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Matching Pursuit for Sparse Signal Reconstruction Based on Dual Thresholds 基于对偶阈值的稀疏信号重构匹配追踪
Zheng-Guang Xie, Hong-wei Huang, Xu Cai
Anumberofsparserecoveryapproacheshaveappearedintheliterature based on Orthogonal Matching Pursuit (OMP) algorithms because of its low computationalComplexity. Thismanuscriptintroducesanoveladaptive forward-back greedy approach, called Dual Threshold Matching Pursuit (DTMP), which select atoms based on two appropriate thresholds. During forward atom increasing process, DTMP picks out new candidate atoms based on the forward threshold under Restricted Isometry Constant (RIC) condition. In backward atom decreasing process, DTMP deletes wrong atoms based on the backward threshold according tothe principal of energy concentration. Like forward-backward pursuit (FBP), DTMP does not need the sparsity level in contrast to the Subspace Pursuit (SP) or Compressive Sampling Matching pursuit (CoSa MP) algorithms. Experimental results show that the reconstruction accuracy of DTMP surpasses SP, FBP and other greedy algorithms obviously and its complexity is comparable with those of OMP and SP.
基于正交匹配追踪(OMP)算法的稀疏恢复方法由于其较低的计算复杂度,已经在文献中出现了许多。本文介绍了一种新的自适应前向后贪婪方法,称为双阈值匹配追踪(DTMP),它根据两个适当的阈值选择原子。在正向原子增加过程中,DTMP在受限等距常数(RIC)条件下,根据正向阈值选择新的候选原子。在原子逆向递减过程中,DTMP根据能量集中原理,根据逆向阈值删除错误原子。与前向后跟踪(FBP)一样,DTMP不需要与子空间跟踪(SP)或压缩采样匹配跟踪(CoSa MP)算法相比的稀疏度级别。实验结果表明,DTMP的重构精度明显优于SP、FBP等贪婪算法,其复杂度与OMP、SP算法相当。
{"title":"Matching Pursuit for Sparse Signal Reconstruction Based on Dual Thresholds","authors":"Zheng-Guang Xie, Hong-wei Huang, Xu Cai","doi":"10.17706/IJCCE.2016.5.5.341-349","DOIUrl":"https://doi.org/10.17706/IJCCE.2016.5.5.341-349","url":null,"abstract":"Anumberofsparserecoveryapproacheshaveappearedintheliterature based on Orthogonal Matching Pursuit (OMP) algorithms because of its low computationalComplexity. Thismanuscriptintroducesanoveladaptive forward-back greedy approach, called Dual Threshold Matching Pursuit (DTMP), which select atoms based on two appropriate thresholds. During forward atom increasing process, DTMP picks out new candidate atoms based on the forward threshold under Restricted Isometry Constant (RIC) condition. In backward atom decreasing process, DTMP deletes wrong atoms based on the backward threshold according tothe principal of energy concentration. Like forward-backward pursuit (FBP), DTMP does not need the sparsity level in contrast to the Subspace Pursuit (SP) or Compressive Sampling Matching pursuit (CoSa MP) algorithms. Experimental results show that the reconstruction accuracy of DTMP surpasses SP, FBP and other greedy algorithms obviously and its complexity is comparable with those of OMP and SP.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88209546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1