首页 > 最新文献

2010 Second International Conference on Communication Software and Networks最新文献

英文 中文
Implementation of Embedded Mobile Database Based on Mobile Agent 基于移动代理的嵌入式移动数据库的实现
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.80
Yan Yu, Jian-Hua Wang
Theorists agree that embedded mobile database are an interesting new topic in the field of theory, and leading analysts concur. In our research, we confirm the implementation of embedded mobile database based on mobile agent, which embodies the confusing principles of mobile database. In order to achieve this aim, we use virtual modalities (HURLER) to validate that the acclaimed concurrent algorithm for the embedded mobile database based on mobile agent.
理论家们一致认为嵌入式移动数据库是理论领域的一个有趣的新课题,领先的分析人士也同意这一观点。在我们的研究中,我们确定了基于移动代理的嵌入式移动数据库的实现,它体现了移动数据库的混淆原理。为了实现这一目标,我们使用虚拟模态(HURLER)来验证基于移动代理的嵌入式移动数据库并发算法的有效性。
{"title":"Implementation of Embedded Mobile Database Based on Mobile Agent","authors":"Yan Yu, Jian-Hua Wang","doi":"10.1109/ICCSN.2010.80","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.80","url":null,"abstract":"Theorists agree that embedded mobile database are an interesting new topic in the field of theory, and leading analysts concur. In our research, we confirm the implementation of embedded mobile database based on mobile agent, which embodies the confusing principles of mobile database. In order to achieve this aim, we use virtual modalities (HURLER) to validate that the acclaimed concurrent algorithm for the embedded mobile database based on mobile agent.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"72 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116657871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Low-Complexity Channel Estimation Method for IEEE802.11a and HIPERLAN/2 WLANs IEEE802.11a和HIPERLAN/2无线局域网的低复杂度信道估计方法
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.101
Feng Shi, Dengpeng Hu, E. Zhang
In this paper, we propose a new channel estimation method for IEEE802.11a and HIPERLAN/2 wireless LANs. Based on the frequency coherence of the channel for wireless LANs, the absent frequency channel responds at virtual subcarriers and DC subcarrier are reconstructed by linear interpolation firstly, then channel estimation with time domain truncation is fulfilled. Simulation results show that the proposed method achieves a slightly better performance than the conventional iterative method and LS method while keeping less complexity.
本文针对IEEE802.11a和HIPERLAN/2无线局域网提出了一种新的信道估计方法。基于无线局域网信道的频率相干性,首先通过线性插值重构虚子载波和直流子载波下的无频信道响应,然后进行时域截断信道估计。仿真结果表明,该方法在保持较低复杂度的同时,取得了比传统迭代法和LS法稍好的性能。
{"title":"A Low-Complexity Channel Estimation Method for IEEE802.11a and HIPERLAN/2 WLANs","authors":"Feng Shi, Dengpeng Hu, E. Zhang","doi":"10.1109/ICCSN.2010.101","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.101","url":null,"abstract":"In this paper, we propose a new channel estimation method for IEEE802.11a and HIPERLAN/2 wireless LANs. Based on the frequency coherence of the channel for wireless LANs, the absent frequency channel responds at virtual subcarriers and DC subcarrier are reconstructed by linear interpolation firstly, then channel estimation with time domain truncation is fulfilled. Simulation results show that the proposed method achieves a slightly better performance than the conventional iterative method and LS method while keeping less complexity.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125108108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Dynamic Multi-radio Multi-channel MAC Protocol for Wireless Sensor Networks 用于无线传感器网络的动态多无线电多通道MAC协议
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.19
Zhiwu Liu, Wei Wu
For improving throughput and energy efficiency in wireless sensor networks, multi-channel media access control has been proposed. Existing multi-channel MAC protocols are mainly focus on channel assignment and media access, it means that a senor node is bound with one channel, which makes the whole network inflexible and cannot be adapted to the variations of environment. In this paper, we proposed a Dynamic Multi-radio Multi-channel media Access control (DMMA) for wireless sensor networks, it can chose the channel dynamically according to the changing of spectrum environment, and make the network more robust to the interferences from external surroundings, meanwhile, take into account the energy efficiency, DMMA use a sleeping-based mechanism to reduce energy consumption. We also invent an ARM9 based four radios wireless sensor node to evaluate our solution on a real sensor network. Through our experiments, DMMA can avoid the impact of interference effectively, and also it achieves good fairness for multiple channel access.
为了提高无线传感器网络的吞吐量和能源效率,提出了多通道媒体访问控制。现有的多通道MAC协议主要集中在信道分配和媒体访问上,这意味着一个传感器节点被绑定到一个信道上,使得整个网络不灵活,不能适应环境的变化。本文提出了一种用于无线传感器网络的动态多无线电多通道媒体访问控制(DMMA),它可以根据频谱环境的变化动态地选择信道,使网络对外界环境的干扰具有更强的鲁棒性,同时考虑到能源效率,DMMA采用基于睡眠的机制来降低能耗。我们还发明了一个基于ARM9的四无线电无线传感器节点,以在真实的传感器网络上评估我们的解决方案。通过我们的实验,DMMA可以有效地避免干扰的影响,并且对多通道接入具有良好的公平性。
{"title":"A Dynamic Multi-radio Multi-channel MAC Protocol for Wireless Sensor Networks","authors":"Zhiwu Liu, Wei Wu","doi":"10.1109/ICCSN.2010.19","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.19","url":null,"abstract":"For improving throughput and energy efficiency in wireless sensor networks, multi-channel media access control has been proposed. Existing multi-channel MAC protocols are mainly focus on channel assignment and media access, it means that a senor node is bound with one channel, which makes the whole network inflexible and cannot be adapted to the variations of environment. In this paper, we proposed a Dynamic Multi-radio Multi-channel media Access control (DMMA) for wireless sensor networks, it can chose the channel dynamically according to the changing of spectrum environment, and make the network more robust to the interferences from external surroundings, meanwhile, take into account the energy efficiency, DMMA use a sleeping-based mechanism to reduce energy consumption. We also invent an ARM9 based four radios wireless sensor node to evaluate our solution on a real sensor network. Through our experiments, DMMA can avoid the impact of interference effectively, and also it achieves good fairness for multiple channel access.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125231266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Face Recognition-Based Convergence Communicator with Internet Telephony 基于人脸识别的网络电话融合通信器
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.119
Jungyu Lee, Jiho Kim, Sukhwan Song, Kyung-tae Kim, Ohyoung Song
Nowadays convergence of digital appliances meet both economic and practical demands of users. And current UI of the appliances not only provides interesting to users but also enhances convenience and accessibility. In this paper, we propose FRETEL (Face Recognition-Based Convergence Communicator with Internet Telephony) that is a new digital home appliance that satisfies these requirements properly. Therefore, we have designed simple and interesting UI using touch screen and face recognition. And convergence with Internet telephone that is spread rapidly today improves usefulness.
如今,数字家电的融合满足了用户的经济和实用需求。当前设备的UI不仅为用户提供了趣味性,还增强了便利性和可访问性。本文提出的基于人脸识别的网络电话融合通信器FRETEL (Face Recognition-Based Convergence Communicator with Internet Telephony)是一种很好地满足这些要求的新型数字家电。因此,我们利用触摸屏和人脸识别设计了简单有趣的UI。并且与今天迅速普及的互联网电话的融合提高了实用性。
{"title":"Face Recognition-Based Convergence Communicator with Internet Telephony","authors":"Jungyu Lee, Jiho Kim, Sukhwan Song, Kyung-tae Kim, Ohyoung Song","doi":"10.1109/ICCSN.2010.119","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.119","url":null,"abstract":"Nowadays convergence of digital appliances meet both economic and practical demands of users. And current UI of the appliances not only provides interesting to users but also enhances convenience and accessibility. In this paper, we propose FRETEL (Face Recognition-Based Convergence Communicator with Internet Telephony) that is a new digital home appliance that satisfies these requirements properly. Therefore, we have designed simple and interesting UI using touch screen and face recognition. And convergence with Internet telephone that is spread rapidly today improves usefulness.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122853969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Implementation of Brain Tumor Detection Using Soft Computing 基于软计算的脑肿瘤检测的改进实现
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.10
T. Logeswari, M. Karnan
Ant Colony Optimization (ACO) metaheuristic is a recent population-based approach inspired by the observation of real ants colony and based upon their collective foraging behavior. In ACO, solutions of the problem are constructed within a stochastic iterative process, by adding solution components to partial solutions. Each individual ant constructs a part of the solution using an artificial pheromone, which reflects its experience accumulated while solving the problem, and heuristic information dependent on the problem. In this paper, the proposed technique ACO hybrid with Fuzzy and Hybrid Self Organizing Hybrid with Fuzzy describe segmentation consists of two steps. In the first step, the MRI brain image is Segmented using HSOM Hybrid with Fuzzy and the second step ACO Hybrid with Fuzzy method to extract the suspicious region Both techniques are compared and performance evaluation is evaluated.
蚁群优化(Ant Colony Optimization, ACO)是一种基于群体的研究方法,它的灵感来自于对真实蚁群的观察,并基于蚁群的集体觅食行为。在蚁群算法中,通过在部分解中加入解分量,在随机迭代过程中构造问题的解。每只蚂蚁使用人工信息素构建解决方案的一部分,这反映了它在解决问题时积累的经验,以及依赖于问题的启发式信息。本文提出的混合模糊自组织和混合模糊描述分割的蚁群算法分为两个步骤。首先,采用HSOM混合模糊分割法和ACO混合模糊分割法对MRI脑图像进行分割,提取可疑区域,并对两种方法进行比较和性能评价。
{"title":"An Improved Implementation of Brain Tumor Detection Using Soft Computing","authors":"T. Logeswari, M. Karnan","doi":"10.1109/ICCSN.2010.10","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.10","url":null,"abstract":"Ant Colony Optimization (ACO) metaheuristic is a recent population-based approach inspired by the observation of real ants colony and based upon their collective foraging behavior. In ACO, solutions of the problem are constructed within a stochastic iterative process, by adding solution components to partial solutions. Each individual ant constructs a part of the solution using an artificial pheromone, which reflects its experience accumulated while solving the problem, and heuristic information dependent on the problem. In this paper, the proposed technique ACO hybrid with Fuzzy and Hybrid Self Organizing Hybrid with Fuzzy describe segmentation consists of two steps. In the first step, the MRI brain image is Segmented using HSOM Hybrid with Fuzzy and the second step ACO Hybrid with Fuzzy method to extract the suspicious region Both techniques are compared and performance evaluation is evaluated.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132734070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Framework for Alternate Execution of Workflows Under Threat 威胁下工作流的替代执行框架
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.79
S. Safdar, M. Hassan, M. Qureshi, R. Akbar
The main objective of the research is to propose an execution framework for workflow systems under threat. When the threat (intrusion) is detected, the workflow system needs to be stopped immediately to avoid any possible loss of enterprise data. The system becomes active again, once it is completely recovered from the threat. This proposed framework overcomes the problem of discontinuity of services as a result of threat detection by enabling the execution of the workflow on an alternate path, keeping the security and integrity of the asset information intact. Hence the system remains available all the time in a secured fashion making it possible for the end user to access the services and data even in the vulnerable state. To achieve the specified goals, the special authentication mechanism has been adopted to authorize the users after threat is detected. Then the data is hibernated that is transferred to the designed dimensions and the connectivity and access to the hibernated data is provided by the chameleon agent. These three core components enable the workflow to execute in a secured and robust manner during system’s unsafe state.
本研究的主要目的是提出一个工作流系统在威胁下的执行框架。当检测到威胁(入侵)时,需要立即停止工作流系统,以避免任何可能的企业数据丢失。一旦系统从威胁中完全恢复,它就会再次活跃起来。该框架通过启用在备用路径上执行工作流,从而保持资产信息的安全性和完整性,克服了由于威胁检测而导致的服务不连续的问题。因此,系统始终以安全的方式保持可用,使最终用户即使在易受攻击的状态下也可以访问服务和数据。为了达到指定的目的,在检测到威胁后,采用特殊的认证机制对用户进行授权。然后将数据休眠,并将其传输到设计的维度,并由变色龙代理提供对休眠数据的连接和访问。这三个核心组件使工作流能够在系统不安全状态下以安全和健壮的方式执行。
{"title":"Framework for Alternate Execution of Workflows Under Threat","authors":"S. Safdar, M. Hassan, M. Qureshi, R. Akbar","doi":"10.1109/ICCSN.2010.79","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.79","url":null,"abstract":"The main objective of the research is to propose an execution framework for workflow systems under threat. When the threat (intrusion) is detected, the workflow system needs to be stopped immediately to avoid any possible loss of enterprise data. The system becomes active again, once it is completely recovered from the threat. This proposed framework overcomes the problem of discontinuity of services as a result of threat detection by enabling the execution of the workflow on an alternate path, keeping the security and integrity of the asset information intact. Hence the system remains available all the time in a secured fashion making it possible for the end user to access the services and data even in the vulnerable state. To achieve the specified goals, the special authentication mechanism has been adopted to authorize the users after threat is detected. Then the data is hibernated that is transferred to the designed dimensions and the connectivity and access to the hibernated data is provided by the chameleon agent. These three core components enable the workflow to execute in a secured and robust manner during system’s unsafe state.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"522 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133698929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Web Cache Consistency Maintenance Through Agents 通过代理维护Web缓存一致性
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.84
A. Kannammal, Rema Padmanabhan, N. Iyengar
This paper proposes the utilization of mobile agents to increase the performance in maintaining the consistency of web caches. Most popular browsers like Internet Explorer and Netscape are providing options to cache the frequently used web pages in the client sites itself in order to provide faster access to the clients and to reduce the network overhead due to the reduction in number of messages transferred. In this environment, the difficulty is in maintaining the web caches in a consistent state by updating the web pages that are cached. This paper addresses this issue by exploiting the potential benefits of agent technology over this domain and analyzes its usage in increasing the performance. The performance is optimized in terms of reduction in the network load and reduction in the response time to the clients.
本文提出利用移动代理来提高web缓存一致性维护的性能。大多数流行的浏览器,如Internet Explorer和Netscape,都提供了在客户端站点本身中缓存常用网页的选项,以提供对客户端的更快访问,并减少由于传输的消息数量减少而造成的网络开销。在这种环境中,困难在于通过更新被缓存的网页来保持web缓存的一致状态。本文通过利用代理技术在该领域的潜在优势来解决这个问题,并分析其在提高性能方面的使用情况。性能在减少网络负载和减少对客户机的响应时间方面得到了优化。
{"title":"Web Cache Consistency Maintenance Through Agents","authors":"A. Kannammal, Rema Padmanabhan, N. Iyengar","doi":"10.1109/ICCSN.2010.84","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.84","url":null,"abstract":"This paper proposes the utilization of mobile agents to increase the performance in maintaining the consistency of web caches. Most popular browsers like Internet Explorer and Netscape are providing options to cache the frequently used web pages in the client sites itself in order to provide faster access to the clients and to reduce the network overhead due to the reduction in number of messages transferred. In this environment, the difficulty is in maintaining the web caches in a consistent state by updating the web pages that are cached. This paper addresses this issue by exploiting the potential benefits of agent technology over this domain and analyzes its usage in increasing the performance. The performance is optimized in terms of reduction in the network load and reduction in the response time to the clients.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133896737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On Super-Psudorandomness of MISTY-Type Tweakable Blockciphers 论mist型可调分组密码的超伪随机性
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.49
Fengtong Wen
An open problem about tweakable blockcipher proposed by Liskov et al. is how to construct tweakable blockciphers without using pre-existing blockcipher. In this paper, on the basis of MISTY-Type transformation, we perform a systematic study of the open problem. We analyze the approach of including a tweak by XORing the tweak value into one place in the dataflow of the MISTY-Type structure. We mainly discuss the super-pseudo randomness of the structure. We conclude that the 5 round MISTY-Type tweakable blockciphers are not CCA-secure and there exists CCA-secure 6 round MISTY-Type tweakable blockciphers. Finally, we give the concrete cryptanalysis for the CCA-secure 6 round MISTY-Type tweakable blockciphers.
Liskov等人提出了一个关于可调区块密码的开放问题,即如何在不使用已有区块密码的情况下构造可调区块密码。本文在misty型变换的基础上,对开放问题进行了系统的研究。我们分析了通过XORing将调整值放入mist - type结构的数据流中的一个位置来包含调整的方法。我们主要讨论了结构的超伪随机性。我们得出5个圆形mist型可调块密码不是cca安全的,并且存在cca安全的6个圆形mist型可调块密码。最后,给出了cca安全的6轮mist型可调分组密码的具体密码分析。
{"title":"On Super-Psudorandomness of MISTY-Type Tweakable Blockciphers","authors":"Fengtong Wen","doi":"10.1109/ICCSN.2010.49","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.49","url":null,"abstract":"An open problem about tweakable blockcipher proposed by Liskov et al. is how to construct tweakable blockciphers without using pre-existing blockcipher. In this paper, on the basis of MISTY-Type transformation, we perform a systematic study of the open problem. We analyze the approach of including a tweak by XORing the tweak value into one place in the dataflow of the MISTY-Type structure. We mainly discuss the super-pseudo randomness of the structure. We conclude that the 5 round MISTY-Type tweakable blockciphers are not CCA-secure and there exists CCA-secure 6 round MISTY-Type tweakable blockciphers. Finally, we give the concrete cryptanalysis for the CCA-secure 6 round MISTY-Type tweakable blockciphers.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134201697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Redundant Audio Watermarking Technique Using Discrete Wavelet Transformation 基于离散小波变换的冗余音频水印技术
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.57
K. Datta, I. Sengupta
A frame based audio watermarking scheme using Discrete Wavelet Transformation (DWT) is presented in this paper. The algorithm embeds the copyright information into the consecutive levels of approximate coefficients of the DWT transformed audio signal. To increase the robustness of the proposed scheme, the information bits are embedded multiple times at the different levels. Embedding of redundant bits results in degradation of SNR and PSNR values; however, experimental results show that the degradation are within acceptable range. Extraction of the watermarked audio signal is carried out by considering the majority of the watermark bits extracted from different levels. The proposed scheme demonstrates results which tend to resist infiltration against many signal processing manipulations, like MP3 compression, re-sampling, quantization and noise addition.
提出了一种基于帧的离散小波变换音频水印方案。该算法将版权信息嵌入到小波变换后音频信号的连续近似系数中。为了提高方案的鲁棒性,在不同的层次上多次嵌入信息位。冗余位的嵌入导致信噪比和PSNR值的降低;然而,实验结果表明,退化在可接受的范围内。通过考虑从不同级别提取的大部分水印位,对带水印的音频信号进行提取。该方案对MP3压缩、重采样、量化和噪声添加等多种信号处理操作具有抗渗透的能力。
{"title":"A Redundant Audio Watermarking Technique Using Discrete Wavelet Transformation","authors":"K. Datta, I. Sengupta","doi":"10.1109/ICCSN.2010.57","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.57","url":null,"abstract":"A frame based audio watermarking scheme using Discrete Wavelet Transformation (DWT) is presented in this paper. The algorithm embeds the copyright information into the consecutive levels of approximate coefficients of the DWT transformed audio signal. To increase the robustness of the proposed scheme, the information bits are embedded multiple times at the different levels. Embedding of redundant bits results in degradation of SNR and PSNR values; however, experimental results show that the degradation are within acceptable range. Extraction of the watermarked audio signal is carried out by considering the majority of the watermark bits extracted from different levels. The proposed scheme demonstrates results which tend to resist infiltration against many signal processing manipulations, like MP3 compression, re-sampling, quantization and noise addition.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123110500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Fast Virus Signature Matching Based on the High Performance Computing of GPU 基于GPU高性能计算的病毒特征码快速匹配
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.72
Yang Cheng
For the virus signature matching time of traditional the eigenvalue is too long, which can’t meet the need of the information security, a method of fast virus signature matching on the GPU is compelled. The system uses the GPU as a fast filter to quickly identify possible virus signatures for thousands of data objects in parallel. The performance of their library suggests that the GPU is now a viable platform for cost-effective, high-performance network security processing. And it shows that the computing speed of the eigenvalue based on GPU is obviously higher than the eigenvalue based on CPU by the experiment.
针对传统的特征值匹配时间过长,不能满足信息安全的需要,提出了一种基于GPU的快速病毒特征匹配方法。该系统利用GPU作为快速过滤器,对数千个数据对象并行快速识别可能的病毒特征。他们的库的性能表明,GPU现在是一个可行的平台,具有成本效益,高性能的网络安全处理。实验表明,基于GPU的特征值计算速度明显高于基于CPU的特征值计算速度。
{"title":"Fast Virus Signature Matching Based on the High Performance Computing of GPU","authors":"Yang Cheng","doi":"10.1109/ICCSN.2010.72","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.72","url":null,"abstract":"For the virus signature matching time of traditional the eigenvalue is too long, which can’t meet the need of the information security, a method of fast virus signature matching on the GPU is compelled. The system uses the GPU as a fast filter to quickly identify possible virus signatures for thousands of data objects in parallel. The performance of their library suggests that the GPU is now a viable platform for cost-effective, high-performance network security processing. And it shows that the computing speed of the eigenvalue based on GPU is obviously higher than the eigenvalue based on CPU by the experiment.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121174476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2010 Second International Conference on Communication Software and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1