首页 > 最新文献

2011 International Conference on Computational Intelligence and Communication Networks最新文献

英文 中文
Gender Effects Suppression in Bangla ASR by Designing Multiple HMM-Based Classifiers 设计基于hmm的多分类器对孟加拉语ASR性别抑制的影响
Mohammed Rokibul Alam Kotwal, Foyzul Hassan, Md. Shafiul Alam, Shakib Ibn Daud, Faisal Ahmed, M. N. Huda
Speaker-specific characteristics play an important role on the performance of Bangla (widely used as Bengali) automatic speech recognition (ASR). It is difficult to recognize speech affected by gender factors, especially when an ASR system contains only a single acoustic model. If there exists any suppression process that represses the decrease of differences in acoustic-likelihood among categories resulted from gender factors, a robust ASR system can be realized. In this paper, we have proposed a technique of gender effects suppression that composed of two hidden Markov model (HMM)-based classifiers and that focused on a gender factor. In an experiment on Bangla speech database prepared by us, the proposed system has provided a significant improvement of word correct rate, word accuracy and sentence correct rate in comparison with the method that incorporates only a single HMM-based classifier for both male and female speakers.
说话人特征对孟加拉语自动语音识别(ASR)的性能起着重要的作用。识别受性别因素影响的语音是很困难的,特别是当ASR系统只包含单一的声学模型时。如果存在任何抑制过程,可以抑制因性别因素而导致的类别间声似然差异的减少,则可以实现鲁棒的ASR系统。在本文中,我们提出了一种性别效应抑制技术,该技术由两个基于隐马尔可夫模型(HMM)的分类器组成,并专注于性别因素。在我们准备的孟加拉语语音数据库上进行的实验中,所提出的系统在单词正确率、单词正确率和句子正确率上都比仅使用基于hmm的单个分类器的方法有了显著的提高。
{"title":"Gender Effects Suppression in Bangla ASR by Designing Multiple HMM-Based Classifiers","authors":"Mohammed Rokibul Alam Kotwal, Foyzul Hassan, Md. Shafiul Alam, Shakib Ibn Daud, Faisal Ahmed, M. N. Huda","doi":"10.1109/CICN.2011.82","DOIUrl":"https://doi.org/10.1109/CICN.2011.82","url":null,"abstract":"Speaker-specific characteristics play an important role on the performance of Bangla (widely used as Bengali) automatic speech recognition (ASR). It is difficult to recognize speech affected by gender factors, especially when an ASR system contains only a single acoustic model. If there exists any suppression process that represses the decrease of differences in acoustic-likelihood among categories resulted from gender factors, a robust ASR system can be realized. In this paper, we have proposed a technique of gender effects suppression that composed of two hidden Markov model (HMM)-based classifiers and that focused on a gender factor. In an experiment on Bangla speech database prepared by us, the proposed system has provided a significant improvement of word correct rate, word accuracy and sentence correct rate in comparison with the method that incorporates only a single HMM-based classifier for both male and female speakers.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129196003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Application Research Based on Fuzzy Logic to Predict Minimum Loss for Transformer Design Optimization 基于模糊逻辑的最小损耗预测在变压器设计优化中的应用研究
Malik Hasmat, Anil Kr, Amit Kr, Yadav, R. Jarial
This paper present the transformer design optimization problem. The objective of transformer design optimization problem requires to minimizing the total mass (or cost) of the core and wire material by satisfying constraints imposed by international standards and transformer user specification. The constraints include appropriate limits on efficiency, voltage regulation, temperature rise, no-load current and winding fill factor. The design optimizations seek a constrained minimum mass (or cost) solution by optimally setting the transformer geometry parameters and require magnetic properties. This paper shows the above design problems can be formulated in fuzzy logic (FL). The importance of the FL format stems for two main features. First it provides efficient and reliable solution for the design optimization problem with several variables. Second, it guaranteed that the obtained solution is global optimum. This paper includes a demonstration of the application of the FL technique for transformer design.
本文提出了变压器设计优化问题。变压器设计优化问题的目标是在满足国际标准和变压器用户规范的约束下,使铁芯和导线材料的总质量(或成本)最小。约束条件包括对效率、电压调节、温升、空载电流和绕组填充系数的适当限制。设计优化通过优化设置变压器几何参数和要求的磁性来寻求受约束的最小质量(或成本)解决方案。本文证明了上述设计问题可以用模糊逻辑(FL)来表述。FL格式的重要性源于两个主要特性。首先,它为多变量设计优化问题提供了高效可靠的解决方案。其次,保证了得到的解是全局最优的。本文介绍了FL技术在变压器设计中的应用。
{"title":"Application Research Based on Fuzzy Logic to Predict Minimum Loss for Transformer Design Optimization","authors":"Malik Hasmat, Anil Kr, Amit Kr, Yadav, R. Jarial","doi":"10.1109/CICN.2011.41","DOIUrl":"https://doi.org/10.1109/CICN.2011.41","url":null,"abstract":"This paper present the transformer design optimization problem. The objective of transformer design optimization problem requires to minimizing the total mass (or cost) of the core and wire material by satisfying constraints imposed by international standards and transformer user specification. The constraints include appropriate limits on efficiency, voltage regulation, temperature rise, no-load current and winding fill factor. The design optimizations seek a constrained minimum mass (or cost) solution by optimally setting the transformer geometry parameters and require magnetic properties. This paper shows the above design problems can be formulated in fuzzy logic (FL). The importance of the FL format stems for two main features. First it provides efficient and reliable solution for the design optimization problem with several variables. Second, it guaranteed that the obtained solution is global optimum. This paper includes a demonstration of the application of the FL technique for transformer design.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"688 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128825934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Media Independent Handover (IEEE 802.21): Framework for Next Generation Vertical Handover Protocols 媒体独立切换(IEEE 802.21):下一代垂直切换协议的框架
Vikas Sharma, Ankith Agarwal, M. Qadeer
Although various wireless access network technologies with different characteristics and performance level have been developed, no single network that can satisfy the anytime, anywhere, and any service wireless access needs of mobile users. A truly seamless mobile environment can only be realized by considering vertical and horizontal handoffs together. One of the major design issues in heterogeneous wireless networks is the support of vertical handoff. Vertical handoff occurs when a user with a multi-interface terminal changes association from one type of wireless access technology to another while maintaining an active session. It is believed that vertical handoff decision will be based on multiple criteria. In this paper review of Vertical Handoff Mechanisms (VHM), decision models and IEEE standard 802.21 (also called Media Independent Handover) have been discussed for seamless vertical handover.
虽然已经发展出各种不同特点和性能水平的无线接入网技术,但没有一种网络能够满足移动用户随时随地、任意业务的无线接入需求。真正无缝的移动环境只能通过同时考虑垂直和水平切换来实现。支持垂直切换是异构无线网络的主要设计问题之一。当具有多接口终端的用户在保持活动会话的同时将关联从一种类型的无线接入技术更改为另一种类型时,就会发生垂直切换。人们认为,垂直移交决策将基于多种标准。本文对垂直切换机制(VHM)、决策模型和IEEE标准802.21(也称为媒体独立切换)进行了综述。
{"title":"Media Independent Handover (IEEE 802.21): Framework for Next Generation Vertical Handover Protocols","authors":"Vikas Sharma, Ankith Agarwal, M. Qadeer","doi":"10.1109/CICN.2011.106","DOIUrl":"https://doi.org/10.1109/CICN.2011.106","url":null,"abstract":"Although various wireless access network technologies with different characteristics and performance level have been developed, no single network that can satisfy the anytime, anywhere, and any service wireless access needs of mobile users. A truly seamless mobile environment can only be realized by considering vertical and horizontal handoffs together. One of the major design issues in heterogeneous wireless networks is the support of vertical handoff. Vertical handoff occurs when a user with a multi-interface terminal changes association from one type of wireless access technology to another while maintaining an active session. It is believed that vertical handoff decision will be based on multiple criteria. In this paper review of Vertical Handoff Mechanisms (VHM), decision models and IEEE standard 802.21 (also called Media Independent Handover) have been discussed for seamless vertical handover.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An Implementation of Moving Object Detection, Tracking and Counting Objects for Traffic Surveillance System 交通监控系统中运动目标检测、跟踪和计数的实现
Yoginee B. Brahme, P. S. Kulkarni
Moving vehicle detection in digital image sequences is one of the key technologies of Intelligent Transportation Systems (ITS). Traffic Surveillance System is being more and important with the enlarging of urban scale and increasing number of vehicles. This Paper presents an intelligent vehicle counting method based on blob analysis in traffic surveillance. The algorithm is composed of moving object segmentation, blob analysis, and tracking. By analyzing the blob of vehicles, the meaningful features are extracted. In addition, the speed of each vehicle and the vehicle flow through a predefined area can be calculated by analyzing blobs of vehicles. The experimental results show that the proposed system can provide useful information for traffic surveillance. We analyze the procedure of video-based traffic congestion system and divide it into graying, binarization, denoising and moving target detection. The system first reads video and converts them into grayscale images. We also put forward a Boundary block detection algorithm with noise reduction to identify the moving objects.
数字图像序列中的运动车辆检测是智能交通系统的关键技术之一。随着城市规模的扩大和车辆数量的增加,交通监控系统显得越来越重要。提出了一种基于blob分析的交通监控智能车辆计数方法。该算法由运动目标分割、斑点分析和跟踪组成。通过对车辆斑点的分析,提取有意义的特征。此外,可以通过分析车辆斑点来计算每辆车的速度和通过预定义区域的车辆流量。实验结果表明,该系统可以为交通监控提供有用的信息。分析了基于视频的交通拥堵系统的处理过程,将其分为灰度化、二值化、去噪和运动目标检测。该系统首先读取视频并将其转换为灰度图像。提出了一种带降噪的边界块检测算法来识别运动目标。
{"title":"An Implementation of Moving Object Detection, Tracking and Counting Objects for Traffic Surveillance System","authors":"Yoginee B. Brahme, P. S. Kulkarni","doi":"10.1109/CICN.2011.28","DOIUrl":"https://doi.org/10.1109/CICN.2011.28","url":null,"abstract":"Moving vehicle detection in digital image sequences is one of the key technologies of Intelligent Transportation Systems (ITS). Traffic Surveillance System is being more and important with the enlarging of urban scale and increasing number of vehicles. This Paper presents an intelligent vehicle counting method based on blob analysis in traffic surveillance. The algorithm is composed of moving object segmentation, blob analysis, and tracking. By analyzing the blob of vehicles, the meaningful features are extracted. In addition, the speed of each vehicle and the vehicle flow through a predefined area can be calculated by analyzing blobs of vehicles. The experimental results show that the proposed system can provide useful information for traffic surveillance. We analyze the procedure of video-based traffic congestion system and divide it into graying, binarization, denoising and moving target detection. The system first reads video and converts them into grayscale images. We also put forward a Boundary block detection algorithm with noise reduction to identify the moving objects.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121064865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Comparative Analysis of Various Optimization Techniques with Coded MIMO-OFDM Transmission 编码MIMO-OFDM传输中各种优化技术的比较分析
S. Singh, Sumit Raghuvanshi
This paper deals with the comparison of various optimization techniques used for detection of spatially multiplexed transmitted symbols in multiple input multiple output orthogonal frequency division multiplexing (MIMO OFDM) system. It may be helpful in evaluating the performance of the detection techniques viz zero forcing (ZF), minimum mean square error (MMSE) and maximum likelihood (ML) on the basis of the bit error rate (BER) for a given signal to noise ratio (SNR). A 2x2 MIMO system is used for the performance evaluation in simulation. The receiver decodes the binary phase shift keying (BPSK) signal through low density parity check (LDPC) decoder. A simulation result shows that ML is having a better performance over ZF and MMSE.
本文对多输入多输出正交频分复用(MIMO OFDM)系统中用于空间复用发射信号检测的各种优化技术进行了比较。在给定信噪比(SNR)下,基于误码率(BER)评估零强迫(ZF)、最小均方误差(MMSE)和最大似然(ML)检测技术的性能可能会有所帮助。仿真中采用2x2 MIMO系统进行性能评估。接收机通过低密度奇偶校验(LDPC)解码器解码二进制相移键控(BPSK)信号。仿真结果表明,ML比ZF和MMSE具有更好的性能。
{"title":"Comparative Analysis of Various Optimization Techniques with Coded MIMO-OFDM Transmission","authors":"S. Singh, Sumit Raghuvanshi","doi":"10.1109/CICN.2011.54","DOIUrl":"https://doi.org/10.1109/CICN.2011.54","url":null,"abstract":"This paper deals with the comparison of various optimization techniques used for detection of spatially multiplexed transmitted symbols in multiple input multiple output orthogonal frequency division multiplexing (MIMO OFDM) system. It may be helpful in evaluating the performance of the detection techniques viz zero forcing (ZF), minimum mean square error (MMSE) and maximum likelihood (ML) on the basis of the bit error rate (BER) for a given signal to noise ratio (SNR). A 2x2 MIMO system is used for the performance evaluation in simulation. The receiver decodes the binary phase shift keying (BPSK) signal through low density parity check (LDPC) decoder. A simulation result shows that ML is having a better performance over ZF and MMSE.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116270301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Scheme for Cooperative Communication in LEACH Based Wireless Sensor Network 基于LEACH的无线传感器网络协同通信新方案
N. Purohit, H. Agrawal, A. Jain
Wireless Sensor Networks need energy efficient protocol for carrying out various operations. Cooperation among nodes may save significant energy by avoiding retransmission from distant nodes. In this work, a new scheme has been suggested for LEACH based WSN by introducing cooperation among various cluster heads. Significant improvement in BER has been observed for comparable overall lifetime of ordinary WSN. Cooperative communication with punctured convolutional channel coding is used in operation phase where as point to point transmission technique is used in clustering phase. Rayleigh fading channel and additional energy consumption due to retransmissions by relay nodes has been accounted in simulation. Bit error rate (BER) and overall life time of WSN is found to be dependent on the number of cooperative nodes, sensor nodes density in WSN, etc factors.
无线传感器网络需要高效节能的协议来执行各种操作。节点之间的合作可以通过避免远程节点的重传而节省大量的能量。本文提出了一种新的基于LEACH的无线传感器网络方案,通过引入簇头之间的协作。在普通无线传感器网络的可比总寿命下,BER有了显著的改善。操作阶段采用刺破卷积信道编码协同通信,聚类阶段采用点对点传输技术。仿真中考虑了瑞利衰落信道和中继节点重传带来的额外能量消耗。研究发现,无线传感器网络的误码率(BER)和总寿命与无线传感器网络中的合作节点数量、传感器节点密度等因素有关。
{"title":"A New Scheme for Cooperative Communication in LEACH Based Wireless Sensor Network","authors":"N. Purohit, H. Agrawal, A. Jain","doi":"10.1109/CICN.2011.10","DOIUrl":"https://doi.org/10.1109/CICN.2011.10","url":null,"abstract":"Wireless Sensor Networks need energy efficient protocol for carrying out various operations. Cooperation among nodes may save significant energy by avoiding retransmission from distant nodes. In this work, a new scheme has been suggested for LEACH based WSN by introducing cooperation among various cluster heads. Significant improvement in BER has been observed for comparable overall lifetime of ordinary WSN. Cooperative communication with punctured convolutional channel coding is used in operation phase where as point to point transmission technique is used in clustering phase. Rayleigh fading channel and additional energy consumption due to retransmissions by relay nodes has been accounted in simulation. Bit error rate (BER) and overall life time of WSN is found to be dependent on the number of cooperative nodes, sensor nodes density in WSN, etc factors.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127007792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Attacks on Anonymity in VANET VANET中的匿名攻击
B. Chaurasia, S. Verma, G. Tomar
A vehicular ad-hoc network (VANET), is an instance of intelligent transportation system that provides vehicle-to-vehicle communication aided by road side infrastructure for in-vehicle entertainment and safer road environment. VANET is characterized by highly mobile vehicles, predetermined topology and the requirement of reliable time bound message delivery over error prone shared wireless medium. The security solutions are constrained by these characteristics. In this paper we are discussing the various type of attack on VANET along with intersection attack on anonymity and the security issue that need to kept in mind while developing any protocol to make VANET secure. Simulation and results indicate that intersection attack is breach the privacy even though cryptographic and noncryptographic security mechanism is enabled over the VANET.
车辆自组织网络(VANET)是智能交通系统的一个实例,它通过道路侧基础设施提供车对车通信,以实现车内娱乐和更安全的道路环境。VANET的特点是高度移动的车辆,预先确定的拓扑结构以及在容易出错的共享无线媒体上可靠的限时消息传递要求。安全解决方案受到这些特征的限制。在本文中,我们讨论了对VANET的各种类型的攻击,以及对匿名性的交叉攻击,以及在开发任何协议以使VANET安全时需要牢记的安全问题。仿真结果表明,即使在VANET上启用了加密和非加密安全机制,交叉攻击仍然会破坏用户的隐私。
{"title":"Attacks on Anonymity in VANET","authors":"B. Chaurasia, S. Verma, G. Tomar","doi":"10.1109/CICN.2011.43","DOIUrl":"https://doi.org/10.1109/CICN.2011.43","url":null,"abstract":"A vehicular ad-hoc network (VANET), is an instance of intelligent transportation system that provides vehicle-to-vehicle communication aided by road side infrastructure for in-vehicle entertainment and safer road environment. VANET is characterized by highly mobile vehicles, predetermined topology and the requirement of reliable time bound message delivery over error prone shared wireless medium. The security solutions are constrained by these characteristics. In this paper we are discussing the various type of attack on VANET along with intersection attack on anonymity and the security issue that need to kept in mind while developing any protocol to make VANET secure. Simulation and results indicate that intersection attack is breach the privacy even though cryptographic and noncryptographic security mechanism is enabled over the VANET.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133914926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Prevention Algorithm against the Vulnerability of Type 0 Routing Header in Ipv6 Ipv6中Type 0路由头漏洞的防范算法
Mohit Wadhwa, Manju Khari
The next generation internet protocol version 6 was developed by the network working group of the Internet Engineering Task Force (IETF), to extend and eventually replace IPv4 capabilities and brings many new features over IPv4 like large address space, flow labelling capabilities, expended address capabilities, demand for real time data transfer, security at IP level and so on. However there are various vulnerabilities reported in contrast to the new features emerging in IPv6. One of the kinds of these vulnerabilities exists in routing header of IPv6. Routing header is a kind of extension header of IPv6 and it's used by an IPv6 source to list one or more intermediate nodes to be visited on the way to a packet destination. But routing header has serious vulnerability and by using this vulnerability attacker can by-pass the security principles at packet filtering system such as router/firewall without breaking the packet filtering rules and than he can access the internal protected network by using routing header. This paper suggests a prevention algorithm that uses with existed packet filtering system and solves the vulnerabilities caused by routing header.
下一代互联网协议版本6由互联网工程任务组(IETF)的网络工作组开发,扩展并最终取代IPv4功能,并在IPv4上带来许多新特性,如大地址空间、流标签功能、扩展地址功能、实时数据传输需求、IP级别的安全性等。然而,与IPv6中出现的新特性相比,报告中存在各种漏洞。其中一种漏洞存在于IPv6的路由头中。路由报头是IPv6的一种扩展报头,它被IPv6源用来列出一个或多个在到达数据包目的地的途中要访问的中间节点。但是路由头存在着严重的漏洞,攻击者利用这一漏洞可以在不违反包过滤规则的情况下绕过路由器/防火墙等包过滤系统的安全原则,从而利用路由头访问受保护的内部网络。本文提出了一种与现有包过滤系统结合使用的防范算法,解决了路由头所带来的漏洞。
{"title":"Prevention Algorithm against the Vulnerability of Type 0 Routing Header in Ipv6","authors":"Mohit Wadhwa, Manju Khari","doi":"10.1109/CICN.2011.133","DOIUrl":"https://doi.org/10.1109/CICN.2011.133","url":null,"abstract":"The next generation internet protocol version 6 was developed by the network working group of the Internet Engineering Task Force (IETF), to extend and eventually replace IPv4 capabilities and brings many new features over IPv4 like large address space, flow labelling capabilities, expended address capabilities, demand for real time data transfer, security at IP level and so on. However there are various vulnerabilities reported in contrast to the new features emerging in IPv6. One of the kinds of these vulnerabilities exists in routing header of IPv6. Routing header is a kind of extension header of IPv6 and it's used by an IPv6 source to list one or more intermediate nodes to be visited on the way to a packet destination. But routing header has serious vulnerability and by using this vulnerability attacker can by-pass the security principles at packet filtering system such as router/firewall without breaking the packet filtering rules and than he can access the internal protected network by using routing header. This paper suggests a prevention algorithm that uses with existed packet filtering system and solves the vulnerabilities caused by routing header.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115533383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A GA-Based Approach to Resource Scheduling Supporting Flexible Quality Management of Ubiquitous Services 支持泛在服务柔性质量管理的基于遗传算法的资源调度方法
M. Horng, Yen-Ching Chan, Y. Kuo, Chia-Ming Yang, Jang-Pong Hsu
In ubiquitous services, concurrent requests from various services for limited service resources such as network bandwidth, easily lead to a problem of resource insufficiency. The resource scheduling for ubiquitous services is the key to improve the tradeoff between request admittance, resource utilization and service quality. In this paper, a GA-based approach to resource scheduling to enable a flexible quality management of ubiquitous services is proposed to solve the problem mentioned above. First, the relationships between service of quality and resource requirements are explored. There are four different types of relations including (1) linear with saturation (LWS), (2) linear with dead zone and saturation (LWDS), (3) shifted step (SS), and (4) exponential (EX). Based on the derivation of the resource-quality model with the four relations, we define the maximum and minimum of resource requirement and regard the scope as the negotiation criterion for quality guarantee in genetic algorithm. Experimental results show that the proposed approach definitely benefits quality guarantee of service and the increasing of service request admittance ratio.
在泛在服务中,各种业务对有限的业务资源(如网络带宽)进行并发请求,容易导致资源不足的问题。泛在服务的资源调度是实现请求准入、资源利用率和服务质量之间平衡的关键。为了解决上述问题,本文提出了一种基于遗传算法的资源调度方法,以实现对泛在服务的灵活质量管理。首先,探讨了服务质量与资源需求之间的关系。有四种不同类型的关系,包括(1)线性与饱和(LWS),(2)线性与死区和饱和(LWDS),(3)移阶(SS)和(4)指数(EX)。在推导具有这四种关系的资源质量模型的基础上,定义了资源需求的最大值和最小值,并将其范围作为遗传算法质量保证的协商准则。实验结果表明,该方法对保证服务质量和提高服务请求准入率有明显的好处。
{"title":"A GA-Based Approach to Resource Scheduling Supporting Flexible Quality Management of Ubiquitous Services","authors":"M. Horng, Yen-Ching Chan, Y. Kuo, Chia-Ming Yang, Jang-Pong Hsu","doi":"10.1109/CICN.2011.6","DOIUrl":"https://doi.org/10.1109/CICN.2011.6","url":null,"abstract":"In ubiquitous services, concurrent requests from various services for limited service resources such as network bandwidth, easily lead to a problem of resource insufficiency. The resource scheduling for ubiquitous services is the key to improve the tradeoff between request admittance, resource utilization and service quality. In this paper, a GA-based approach to resource scheduling to enable a flexible quality management of ubiquitous services is proposed to solve the problem mentioned above. First, the relationships between service of quality and resource requirements are explored. There are four different types of relations including (1) linear with saturation (LWS), (2) linear with dead zone and saturation (LWDS), (3) shifted step (SS), and (4) exponential (EX). Based on the derivation of the resource-quality model with the four relations, we define the maximum and minimum of resource requirement and regard the scope as the negotiation criterion for quality guarantee in genetic algorithm. Experimental results show that the proposed approach definitely benefits quality guarantee of service and the increasing of service request admittance ratio.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115650250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Study of Different Face Recognition Techniques 不同人脸识别技术的比较研究
Sandeep Kukreja, Rekha Gupta
This paper presents performance comparison of three leading face recognition techniques. In the first method, the face recognition is done using principle component analysis (PCA). In the second method we combine K-nearest neighbor (KNN) classification method with PCA. The face recognition using histogram is also carried out. The above methods are compared on the basis of accuracy and time taken in an ORL database and YALE database.
本文介绍了三种主要人脸识别技术的性能比较。在第一种方法中,使用主成分分析(PCA)进行人脸识别。在第二种方法中,我们将k近邻(KNN)分类方法与主成分分析法相结合。利用直方图进行人脸识别。以ORL数据库和YALE数据库为例,对上述方法的精度和时间进行了比较。
{"title":"Comparative Study of Different Face Recognition Techniques","authors":"Sandeep Kukreja, Rekha Gupta","doi":"10.1109/CICN.2011.55","DOIUrl":"https://doi.org/10.1109/CICN.2011.55","url":null,"abstract":"This paper presents performance comparison of three leading face recognition techniques. In the first method, the face recognition is done using principle component analysis (PCA). In the second method we combine K-nearest neighbor (KNN) classification method with PCA. The face recognition using histogram is also carried out. The above methods are compared on the basis of accuracy and time taken in an ORL database and YALE database.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124774311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2011 International Conference on Computational Intelligence and Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1