首页 > 最新文献

2010 Second International Conference on Communication Software and Networks最新文献

英文 中文
A Weighted Raw Reputation Generating Approach Based on Similarity 基于相似度的加权原始信誉生成方法
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.25
Jianzhong Zhang, Xiaoming Zhang, Jianbin Zhu, Jingdong Xu
In the anti-spam field, raw reputation is the current mailing behavior of one email server. Meanwhile, it is the foundation of the distributed spam processing technology based on reputation mechanism. In this paper, the advantages and disadvantages of the existing several raw reputation generating approaches are analyzed, and a new method: MSGuard is proposed. MSGuard is a weighted raw reputation generating approach based on similarity. Simulation results demonstrate that: in the scenario which the malicious nodes provide inauthentic evaluations, the average differences between the expectations and the raw reputations calculated by TrustGuard and MSRep are 0.4 and 0.5 respectively. And the difference of either EigenTrust or MSGuard is only approximate 0.05. In the scenario which the collusive and disguised malicious nodes exist, the difference between the expectation and the raw reputation calculated by EigenTrust is 0.25, and it is less than 0.1 by MSGuard. MSGuard can reflect nodes’ actual mailing situations more accurately.
在反垃圾邮件领域,原始信誉是指一个电子邮件服务器当前的邮件行为。同时,它也是基于信誉机制的分布式垃圾邮件处理技术的基础。本文分析了现有几种原始信誉生成方法的优缺点,提出了一种新的方法:MSGuard。MSGuard是一种基于相似度的加权原始声誉生成方法。仿真结果表明:在恶意节点提供不真实评估的情况下,TrustGuard和MSRep计算的期望与原始信誉的平均差值分别为0.4和0.5。而EigenTrust和MSGuard的差异仅为0.05左右。在存在合谋和伪装恶意节点的情况下,EigenTrust计算的期望与原始信誉之间的差值为0.25,MSGuard计算的差值小于0.1。MSGuard可以更准确地反映节点的实际邮寄情况。
{"title":"A Weighted Raw Reputation Generating Approach Based on Similarity","authors":"Jianzhong Zhang, Xiaoming Zhang, Jianbin Zhu, Jingdong Xu","doi":"10.1109/ICCSN.2010.25","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.25","url":null,"abstract":"In the anti-spam field, raw reputation is the current mailing behavior of one email server. Meanwhile, it is the foundation of the distributed spam processing technology based on reputation mechanism. In this paper, the advantages and disadvantages of the existing several raw reputation generating approaches are analyzed, and a new method: MSGuard is proposed. MSGuard is a weighted raw reputation generating approach based on similarity. Simulation results demonstrate that: in the scenario which the malicious nodes provide inauthentic evaluations, the average differences between the expectations and the raw reputations calculated by TrustGuard and MSRep are 0.4 and 0.5 respectively. And the difference of either EigenTrust or MSGuard is only approximate 0.05. In the scenario which the collusive and disguised malicious nodes exist, the difference between the expectation and the raw reputation calculated by EigenTrust is 0.25, and it is less than 0.1 by MSGuard. MSGuard can reflect nodes’ actual mailing situations more accurately.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127869905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalability of Routing in MANET MANET中路由的可扩展性
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.54
Prashant Singh, D. K. Lobiyal
Scalability of ad hoc network has been one of the important areas of research in the field. Most of the research works in ad hoc network focus on routing and medium access protocols and produce simulation results for a network size of 50 to 100 nodes. Because of multi-hop nature of ad hoc network, scalability is directly related to routing protocols. In this paper, we have conducted simulations to investigate scalability of DSR, AODV, and LAR routing protocols using prediction based link availability model. This also proves that whether link prediction model also adds up to the scalability of routing protocol. From simulation results, it is clear that performance of routing is improved due to link prediction model and the protocols are scalable with the model. We have tested them for 100 to 1000 nodes.
自组织网络的可扩展性一直是该领域的重要研究领域之一。大多数自组织网络的研究工作都集中在路由和介质访问协议上,并产生了50到100个节点网络规模的仿真结果。由于自组织网络的多跳特性,可伸缩性与路由协议直接相关。在本文中,我们使用基于预测的链路可用性模型对DSR、AODV和LAR路由协议的可扩展性进行了仿真研究。这也证明了链路预测模型是否也增加了路由协议的可扩展性。仿真结果表明,链路预测模型提高了路由的性能,并且协议具有可扩展性。我们已经在100到1000个节点上测试了它们。
{"title":"Scalability of Routing in MANET","authors":"Prashant Singh, D. K. Lobiyal","doi":"10.1109/ICCSN.2010.54","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.54","url":null,"abstract":"Scalability of ad hoc network has been one of the important areas of research in the field. Most of the research works in ad hoc network focus on routing and medium access protocols and produce simulation results for a network size of 50 to 100 nodes. Because of multi-hop nature of ad hoc network, scalability is directly related to routing protocols. In this paper, we have conducted simulations to investigate scalability of DSR, AODV, and LAR routing protocols using prediction based link availability model. This also proves that whether link prediction model also adds up to the scalability of routing protocol. From simulation results, it is clear that performance of routing is improved due to link prediction model and the protocols are scalable with the model. We have tested them for 100 to 1000 nodes.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129052294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Identifying Masses in Mammograms Using Template Matching 使用模板匹配识别乳房x光片中的肿块
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.95
K. P. Lochanambal, M. Karnan, R. Sivakumar
This paper introduces a novel segmentation scheme based on the template-matching method is used for identifying cancerous part in the mammogram image. These templates are defined according to the shape, and brightness of the masses or micro calcifications. Earlier to template matching, median filtering enhances the mammogram images, Edge detection operators such as Sobel, Prewitts, Laplacian and Laplacian of Guassian masks are enhances and detect the edges and then edge detection is used to detect the shape of the cancerous part. In the template matching, the threshold is set for the calculated values of the crosscorrelation. Then the percentile method is used to set an overall threshold for each mammogram image. The segmentation accuracy is increased as the proposed scheme is more robust to noise and hence, it prevents over segmentation in final segmented images. It is exposed that, this method of template matching for identifying early stage cancerous parts gives considerably better detection results
本文提出了一种新的基于模板匹配的分割方案,用于乳房x线图像中癌变部位的识别。这些模板是根据肿块或微钙化的形状和亮度来定义的。在模板匹配之前,先对乳房x线图像进行中值滤波增强,然后利用高斯掩模中的Sobel、Prewitts、Laplacian、Laplacian等边缘检测算子增强并检测出边缘,然后利用边缘检测检测出癌变部位的形状。在模板匹配中,对计算出的相互关系值设置阈值。然后使用百分位数法为每个乳房x光片图像设置一个总体阈值。该方法对噪声具有较强的鲁棒性,提高了分割精度,避免了最终分割图像的过度分割。结果表明,这种模板匹配方法对早期癌变部位的识别具有较好的检测效果
{"title":"Identifying Masses in Mammograms Using Template Matching","authors":"K. P. Lochanambal, M. Karnan, R. Sivakumar","doi":"10.1109/ICCSN.2010.95","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.95","url":null,"abstract":"This paper introduces a novel segmentation scheme based on the template-matching method is used for identifying cancerous part in the mammogram image. These templates are defined according to the shape, and brightness of the masses or micro calcifications. Earlier to template matching, median filtering enhances the mammogram images, Edge detection operators such as Sobel, Prewitts, Laplacian and Laplacian of Guassian masks are enhances and detect the edges and then edge detection is used to detect the shape of the cancerous part. In the template matching, the threshold is set for the calculated values of the crosscorrelation. Then the percentile method is used to set an overall threshold for each mammogram image. The segmentation accuracy is increased as the proposed scheme is more robust to noise and hence, it prevents over segmentation in final segmented images. It is exposed that, this method of template matching for identifying early stage cancerous parts gives considerably better detection results","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133060681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and Implementation of a Centralized Sensor Protocol for Information via Negotiation 信息协商集中式传感器协议的设计与实现
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.90
T. Pham, Xue Jun Li, P. Chong, Y. Leong
Recent advances in wireless communications and electronics have promoted the development of wireless sensor networks (WSN) for a wide variety of applications. The size and power constraints of sensor nodes are the main concerns in the design of robust and efficient routing protocols. Consequently, various approaches, such as data-centric approach, hierarchical approach and location-based approach, are available. Each may be designed for a particular application with specific requirements. In this paper, we design and implement a data-centric routing protocol for WSNs, namely Centralized Sensor Protocol for Information via Negotiation (CSPIN), which combines the advertise-request-transfer process and a routing distribution mechanism. Implementation of the protocol was completed with the Crossbow MicaZ hardware using nesC/TinyOS.
无线通信和电子学的最新进展促进了无线传感器网络(WSN)的发展,用于各种应用。传感器节点的大小和功率限制是设计鲁棒和高效路由协议的主要问题。因此,可以使用各种方法,例如以数据为中心的方法、分层方法和基于位置的方法。每个都可以设计为具有特定要求的特定应用。本文设计并实现了一种以数据为中心的wsn路由协议,即CSPIN (Centralized Sensor protocol for Information via Negotiation),该协议结合了发布-请求-传输过程和路由分配机制。该协议的实现是在nesC/TinyOS的Crossbow MicaZ硬件上完成的。
{"title":"Design and Implementation of a Centralized Sensor Protocol for Information via Negotiation","authors":"T. Pham, Xue Jun Li, P. Chong, Y. Leong","doi":"10.1109/ICCSN.2010.90","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.90","url":null,"abstract":"Recent advances in wireless communications and electronics have promoted the development of wireless sensor networks (WSN) for a wide variety of applications. The size and power constraints of sensor nodes are the main concerns in the design of robust and efficient routing protocols. Consequently, various approaches, such as data-centric approach, hierarchical approach and location-based approach, are available. Each may be designed for a particular application with specific requirements. In this paper, we design and implement a data-centric routing protocol for WSNs, namely Centralized Sensor Protocol for Information via Negotiation (CSPIN), which combines the advertise-request-transfer process and a routing distribution mechanism. Implementation of the protocol was completed with the Crossbow MicaZ hardware using nesC/TinyOS.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132071990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Method to Automatically Generate Codec Based TTCN-3 to Software Testing 一种基于TTCN-3自动生成编解码器的软件测试方法
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.22
Meng Sun, Fengyi Zou, Jun Ma, Huiling Shi
When doing test activities using TTCN-3, achieving Codec needs testers to write a lot of codes. In order to reduce testing cost, this paper proposes a method to automatically generate Codec. The method firstly defines an abstract model for TTCN-3 test suites, TTCN-3 type tree, and then, we issue the method contains three algorithms, including the algorithm of establishing TTCN-3 type tree according to the TTCN-3 Test Suites, the algorithm of encoding each node according to the preorder traversal sequence, the algorithm of decoding each node according to the postorder traversal sequence. The method is applicable to all TTCN-3 test suites and greatly improves test efficiency. At last, an example, an information manage system developed by .net, demonstrates that the method is usable and high efficient.
当使用TTCN-3进行测试活动时,实现编解码器需要测试人员编写大量代码。为了降低测试成本,本文提出了一种自动生成编解码器的方法。该方法首先定义了TTCN-3测试套件、TTCN-3类型树的抽象模型,然后给出了该方法包含三种算法,分别是根据TTCN-3测试套件建立TTCN-3类型树的算法、根据预序遍历序列对每个节点进行编码的算法、根据后序遍历序列对每个节点进行解码的算法。该方法适用于所有TTCN-3测试套件,大大提高了测试效率。最后,以。net开发的信息管理系统为例,验证了该方法的实用性和高效性。
{"title":"A Method to Automatically Generate Codec Based TTCN-3 to Software Testing","authors":"Meng Sun, Fengyi Zou, Jun Ma, Huiling Shi","doi":"10.1109/ICCSN.2010.22","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.22","url":null,"abstract":"When doing test activities using TTCN-3, achieving Codec needs testers to write a lot of codes. In order to reduce testing cost, this paper proposes a method to automatically generate Codec. The method firstly defines an abstract model for TTCN-3 test suites, TTCN-3 type tree, and then, we issue the method contains three algorithms, including the algorithm of establishing TTCN-3 type tree according to the TTCN-3 Test Suites, the algorithm of encoding each node according to the preorder traversal sequence, the algorithm of decoding each node according to the postorder traversal sequence. The method is applicable to all TTCN-3 test suites and greatly improves test efficiency. At last, an example, an information manage system developed by .net, demonstrates that the method is usable and high efficient.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122913841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On New Opportunities of Saving Human Lives Using Mobile Phones 关于使用手机拯救人类生命的新机遇
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.71
Ondrej Matustik, Pavel Pesout
Current technologies are helpful in many areas of human live. Focus of this article is on combination of technology and statistics with the aim of building mobile emergency system. Such system is based on evaluation of input signals to the mobile phone from its sensors, like VGA camera or microphone, and further processing with help of advanced statistical methods both in mobile phone and in the central processing machine. The purpose of this idea is to enable the mobile phone automatically alarm correct emergency process and help the person in emergency situation. The results can help thousands of people every day, when they are in crisis situation and unable to call for help.
当前的技术在人类生活的许多领域都很有帮助。本文的重点是将技术与统计相结合,以建立移动应急系统。该系统的基础是对手机传感器(如VGA摄像头或麦克风)输入的信号进行评估,并借助手机和中央处理器中先进的统计方法进行进一步处理。这个想法的目的是使手机自动报警,正确的应急过程,帮助人在紧急情况下。结果可以帮助成千上万的人每天,当他们在危机的情况下,无法寻求帮助。
{"title":"On New Opportunities of Saving Human Lives Using Mobile Phones","authors":"Ondrej Matustik, Pavel Pesout","doi":"10.1109/ICCSN.2010.71","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.71","url":null,"abstract":"Current technologies are helpful in many areas of human live. Focus of this article is on combination of technology and statistics with the aim of building mobile emergency system. Such system is based on evaluation of input signals to the mobile phone from its sensors, like VGA camera or microphone, and further processing with help of advanced statistical methods both in mobile phone and in the central processing machine. The purpose of this idea is to enable the mobile phone automatically alarm correct emergency process and help the person in emergency situation. The results can help thousands of people every day, when they are in crisis situation and unable to call for help.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127875102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of SCTP Multistream Function Applied to Parallel Downloading SCTP多流功能在并行下载中的应用效果
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.86
J. Funasaka, Toshio Niyagawa, K. Ishida
Parallel Downloading, which divides a file into many pieces and assigns each piece to one of the servers which store the file, has been proposed and reported to achieve high speed file retrieval from many servers in parallel. The conventional method which adopts TCP as a transport protocol has a problem that its performance deteriorates in the network where packet losses frequently occur at the data-link layer. To address this issue, we have researched a parallel downloading method which uses SCTP instead of TCP as a transport protocol and focuses on its multistream feature. It is believed that the multistream function is a promising technique to alleviate the effect of packet loss problems in ubiquitous networks including wireless networks. We discuss how to realize the effective parallel downloading method using SCTP multistream and evaluate it. Here, we use only one server to simplify the problem. In this paper, on the network with various condition described by delay and loss rate, we conducted simulation experiments using various combination of parameters such as the number of concurrent requests, that of streams, and the division number. As a result, characteristics on parallel downloads using SCTP multistream have been clarified.
并行下载将一个文件分成许多块,并将每个块分配给存储文件的一个服务器,已经提出并报道了并行下载,以实现从多个服务器并行地高速检索文件。采用TCP作为传输协议的传统方法在数据链路层丢包频繁的网络中存在性能下降的问题。为了解决这个问题,我们研究了一种使用SCTP代替TCP作为传输协议的并行下载方法,并着重研究了SCTP的多流特性。在包括无线网络在内的泛在网络中,多流功能是一种很有前途的缓解丢包问题的技术。讨论了如何利用SCTP多流实现有效的并行下载方法,并对其进行了评价。这里,我们只使用一个服务器来简化问题。本文在以时延和丢包率为描述条件的网络上,采用并发请求数、流数、除法数等参数的不同组合进行了仿真实验。因此,使用SCTP多流进行并行下载的特性得到了澄清。
{"title":"Effect of SCTP Multistream Function Applied to Parallel Downloading","authors":"J. Funasaka, Toshio Niyagawa, K. Ishida","doi":"10.1109/ICCSN.2010.86","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.86","url":null,"abstract":"Parallel Downloading, which divides a file into many pieces and assigns each piece to one of the servers which store the file, has been proposed and reported to achieve high speed file retrieval from many servers in parallel. The conventional method which adopts TCP as a transport protocol has a problem that its performance deteriorates in the network where packet losses frequently occur at the data-link layer. To address this issue, we have researched a parallel downloading method which uses SCTP instead of TCP as a transport protocol and focuses on its multistream feature. It is believed that the multistream function is a promising technique to alleviate the effect of packet loss problems in ubiquitous networks including wireless networks. We discuss how to realize the effective parallel downloading method using SCTP multistream and evaluate it. Here, we use only one server to simplify the problem. In this paper, on the network with various condition described by delay and loss rate, we conducted simulation experiments using various combination of parameters such as the number of concurrent requests, that of streams, and the division number. As a result, characteristics on parallel downloads using SCTP multistream have been clarified.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"305 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121266391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Intelligent Location Management Using Soft Computing Technique 基于软计算技术的智能位置管理
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.60
J. Singh, M. Karnan
Due to the growing number of mobile users, global connectivity, and the small size of cells, one of the most critical issues regarding these networks is location management. The challenging task in a cellular system is to track the location of the mobile users effectively so that the connection establishment cost and delay is low. In recent years, several strategies have been proposed to improve the performance of the location management procedure in cellular networks. In this paper, we propose intelligent approach by taking the User Profile History (UPH); to reduce the location update cost. The synergistic integration of different soft computing tools is best demonstrated in this paper for location and mobility management in cellular networks. The results obtained confirm the efficiency of UPH in significantly reducing the costs of both location updates and call delivery procedures when compared to the various other strategies well-known in the literature.
由于移动用户数量、全球连接性和小区规模的不断增长,与这些网络有关的最关键问题之一是位置管理。在蜂窝系统中,如何有效地跟踪移动用户的位置,以降低连接建立成本和延迟是一个具有挑战性的任务。近年来,人们提出了几种策略来提高蜂窝网络中位置管理过程的性能。在本文中,我们提出了一种智能方法,采用用户档案历史(UPH);降低位置更新成本。不同软计算工具的协同集成在蜂窝网络的位置和移动管理中得到了最好的展示。所获得的结果证实,与文献中已知的各种其他策略相比,UPH在显著降低位置更新和呼叫传递程序成本方面的效率。
{"title":"Intelligent Location Management Using Soft Computing Technique","authors":"J. Singh, M. Karnan","doi":"10.1109/ICCSN.2010.60","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.60","url":null,"abstract":"Due to the growing number of mobile users, global connectivity, and the small size of cells, one of the most critical issues regarding these networks is location management. The challenging task in a cellular system is to track the location of the mobile users effectively so that the connection establishment cost and delay is low. In recent years, several strategies have been proposed to improve the performance of the location management procedure in cellular networks. In this paper, we propose intelligent approach by taking the User Profile History (UPH); to reduce the location update cost. The synergistic integration of different soft computing tools is best demonstrated in this paper for location and mobility management in cellular networks. The results obtained confirm the efficiency of UPH in significantly reducing the costs of both location updates and call delivery procedures when compared to the various other strategies well-known in the literature.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116842681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A New Procedure to Help System/Network Administrators Identify Multiple Rootkit Infections 帮助系统/网络管理员识别多个Rootkit感染的新程序
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.14
Desmond Lobo, P. Watters, Xin-Wen Wu
Rootkits refer to software that is used to hide the presence of malware from system/network administrators and permit an attacker to take control of a computer. In our previous work, we designed a system that would categorize rootkits based on the hooks that had been created. Focusing on rootkits that use inline function hooking techniques, we showed that our system could successfully categorize a sample of rootkits using unsupervised EM clustering. In this paper, we extend our previous work by outlining a new procedure to help system/network administrators identify the rootkits that have infected their machines. Using a logistic regression model for profiling families of rootkits, we were able to identify at least one of the rootkits that had infected each of the systems that we tested.
Rootkits指的是用于向系统/网络管理员隐藏恶意软件并允许攻击者控制计算机的软件。在我们之前的工作中,我们设计了一个系统,可以根据已创建的钩子对rootkit进行分类。专注于使用内联函数挂钩技术的rootkit,我们展示了我们的系统可以使用无监督EM聚类成功地对rootkit样本进行分类。在本文中,我们通过概述一个新的过程来扩展我们之前的工作,以帮助系统/网络管理员识别感染其机器的rootkit。使用逻辑回归模型来分析rootkit家族,我们能够识别出至少一个感染了我们测试的每个系统的rootkit。
{"title":"A New Procedure to Help System/Network Administrators Identify Multiple Rootkit Infections","authors":"Desmond Lobo, P. Watters, Xin-Wen Wu","doi":"10.1109/ICCSN.2010.14","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.14","url":null,"abstract":"Rootkits refer to software that is used to hide the presence of malware from system/network administrators and permit an attacker to take control of a computer. In our previous work, we designed a system that would categorize rootkits based on the hooks that had been created. Focusing on rootkits that use inline function hooking techniques, we showed that our system could successfully categorize a sample of rootkits using unsupervised EM clustering. In this paper, we extend our previous work by outlining a new procedure to help system/network administrators identify the rootkits that have infected their machines. Using a logistic regression model for profiling families of rootkits, we were able to identify at least one of the rootkits that had infected each of the systems that we tested.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116785668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
AES Encryption Algorithm Based on the High Performance Computing of GPU 基于GPU高性能计算的AES加密算法
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.124
Fei Shao, ZiNan Chang, Yi Zhang
The encrypting time of traditional AES algorithm is too long to meet the need of fast encryption. For this point, the high-performance computing capability of Graphic Processing Unit has become the hot issue of research. This paper proposes that AES algorithm is improved by use of GPU’s high performance computing capability and compared with that using CPU. And AES encryption algorithm base on high performance computing of GPU is also completed. The experiment shows that the computing speed of AES encryption algorithm based on GPU is obviously higher than AES encryption algorithm based on CPU, thus the encryption efficiency is increased.
传统AES算法的加密时间过长,无法满足快速加密的需要。为此,图形处理单元的高性能计算能力成为研究的热点问题。本文提出利用GPU的高性能计算能力对AES算法进行改进,并与使用CPU进行比较。并完成了基于GPU高性能计算的AES加密算法。实验表明,基于GPU的AES加密算法的计算速度明显高于基于CPU的AES加密算法,从而提高了加密效率。
{"title":"AES Encryption Algorithm Based on the High Performance Computing of GPU","authors":"Fei Shao, ZiNan Chang, Yi Zhang","doi":"10.1109/ICCSN.2010.124","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.124","url":null,"abstract":"The encrypting time of traditional AES algorithm is too long to meet the need of fast encryption. For this point, the high-performance computing capability of Graphic Processing Unit has become the hot issue of research. This paper proposes that AES algorithm is improved by use of GPU’s high performance computing capability and compared with that using CPU. And AES encryption algorithm base on high performance computing of GPU is also completed. The experiment shows that the computing speed of AES encryption algorithm based on GPU is obviously higher than AES encryption algorithm based on CPU, thus the encryption efficiency is increased.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125925291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
期刊
2010 Second International Conference on Communication Software and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1