首页 > 最新文献

The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.最新文献

英文 中文
Relayed multicast protocol for 1-to-many group communications 用于1对多组通信的中继多播协议
Juyoung Park, E. Kwon, O. Jung, S. Kang
IP multicast shows very strong advantage in the group communication services. But to deploy IP multicast in the current Internet, every IP routers must be changed into multicast enabled ones and several deployment issues should be solved. So theses problems prevent IP multicast mechanism from being deployed in IP world. And these problems give a good reason why today's group communication uses replicated IP unicast mechanism instead of IP multicast. Recently an overlay multicast is proposed as an alternative method of IP multicast. We propose a framework as an application-layer way to provide end-to-end multicast services over IP-network environment. In this paper we define the basic concepts of relayed multicast scheme, data delivery models, service scenarios and some test issues of RMCP as well as implementation and test on APAN
IP组播在群组通信业务中显示出很强的优势。但要在当前Internet上部署IP组播,必须将每个IP路由器都改为支持组播的路由器,并解决几个部署问题。这些问题阻碍了IP组播机制在IP世界的应用。这些问题说明了为什么现在的组通信采用复制IP单播机制而不是IP多播机制。最近提出了一种覆盖组播作为IP组播的替代方法。我们提出了一个框架,作为在ip网络环境下提供端到端多播服务的应用层方式。本文定义了中继组播方案的基本概念、数据传输模型、服务场景、RMCP的一些测试问题以及在APAN上的实现和测试
{"title":"Relayed multicast protocol for 1-to-many group communications","authors":"Juyoung Park, E. Kwon, O. Jung, S. Kang","doi":"10.1109/ICACT.2005.245886","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245886","url":null,"abstract":"IP multicast shows very strong advantage in the group communication services. But to deploy IP multicast in the current Internet, every IP routers must be changed into multicast enabled ones and several deployment issues should be solved. So theses problems prevent IP multicast mechanism from being deployed in IP world. And these problems give a good reason why today's group communication uses replicated IP unicast mechanism instead of IP multicast. Recently an overlay multicast is proposed as an alternative method of IP multicast. We propose a framework as an application-layer way to provide end-to-end multicast services over IP-network environment. In this paper we define the basic concepts of relayed multicast scheme, data delivery models, service scenarios and some test issues of RMCP as well as implementation and test on APAN","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126714101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Routing for multi-constrained path problem with imprecise state information 具有不精确状态信息的多约束路径问题的路由
Xin Jin, Xiande Liu, Zhongmin Wang
This paper discusses the NP-complete multi-constrained path problem with imprecise state information, and a distributed heuristic framework without any imprecision assumption is presented. This framework needs no link state exchanging message, and employs mobile agents to search feasible paths in parallel. Two key strategies are used: to select a suitable next node, and to choose the appropriate one from all feasible paths. Simulation results indicate that the presented solution is scaleable and efficient. An appropriate path selecting strategy with traffic engineering can improve network performance. And the framework can tolerate high degree of information imprecision
讨论了具有不精确状态信息的np -完全多约束路径问题,提出了一个不含不精确假设的分布式启发式框架。该框架不需要链路状态交换消息,采用移动代理并行搜索可行路径。使用了两个关键策略:选择合适的下一个节点,以及从所有可行路径中选择合适的节点。仿真结果表明,该方案具有可扩展性和高效性。适当的流量工程路径选择策略可以提高网络性能。该框架可以容忍高度的信息不精确
{"title":"Routing for multi-constrained path problem with imprecise state information","authors":"Xin Jin, Xiande Liu, Zhongmin Wang","doi":"10.1109/ICACT.2005.245900","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245900","url":null,"abstract":"This paper discusses the NP-complete multi-constrained path problem with imprecise state information, and a distributed heuristic framework without any imprecision assumption is presented. This framework needs no link state exchanging message, and employs mobile agents to search feasible paths in parallel. Two key strategies are used: to select a suitable next node, and to choose the appropriate one from all feasible paths. Simulation results indicate that the presented solution is scaleable and efficient. An appropriate path selecting strategy with traffic engineering can improve network performance. And the framework can tolerate high degree of information imprecision","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126370772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A load-sharing scheme in transport layer for improving throughput 一种传输层的负载共享方案,以提高吞吐量
Moonjeong Chang, Meejeong Lee, H. Lee
In this paper, we propose a transport layer load distribution mechanism utilizing the multiple network interfaces simultaneously. We specifically propose an extension of stream control transmission protocol (SCTP) to have load sharing over multiple network interfaces. We named the particular service provided by the proposed load sharing mechanism to be LSMS (load sharing mode service). We show through simulations that LSMS of SCTP effectively performs bandwidth aggregation even when the difference of the properties of the paths, such as the delay and bandwidth, is large
本文提出了一种同时利用多个网络接口的传输层负载分配机制。我们特别提出了流控制传输协议(SCTP)的扩展,以便在多个网络接口上实现负载共享。我们将提议的负载共享机制提供的特定服务命名为LSMS(负载共享模式服务)。仿真结果表明,SCTP的LSMS可以有效地进行带宽聚合,即使路径的延迟和带宽等属性差异很大
{"title":"A load-sharing scheme in transport layer for improving throughput","authors":"Moonjeong Chang, Meejeong Lee, H. Lee","doi":"10.1109/ICACT.2005.245899","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245899","url":null,"abstract":"In this paper, we propose a transport layer load distribution mechanism utilizing the multiple network interfaces simultaneously. We specifically propose an extension of stream control transmission protocol (SCTP) to have load sharing over multiple network interfaces. We named the particular service provided by the proposed load sharing mechanism to be LSMS (load sharing mode service). We show through simulations that LSMS of SCTP effectively performs bandwidth aggregation even when the difference of the properties of the paths, such as the delay and bandwidth, is large","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116240728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PAPR comparison of different orthogonal base in multicarrier systems 多载波系统中不同正交基的PAPR比较
Haixia Zhang, D. Yuan, Feng Zhao
An important discovery about the PAPR in multicarrier modulation (MCM) systems with different orthogonal base is reported at the first time. In this paper PAPR of MCM is gained respectively by employing seven different kinds of orthogonal bases, six of which are wavelet bases and one is the well-known Fourier base. Simulation results show that according to PAPR of Fourier based MCM (OFDM) outperforms those based on wavelet regardless of which wavelet is chosen
首次报道了不同正交基多载波调制(MCM)系统中PAPR的重要发现。本文采用7种不同的正交基分别获得了MCM的PAPR,其中6种是小波基,1种是众所周知的傅立叶基。仿真结果表明,无论选择哪种小波,基于傅里叶的MCM (OFDM)都优于基于小波的MCM (OFDM)
{"title":"PAPR comparison of different orthogonal base in multicarrier systems","authors":"Haixia Zhang, D. Yuan, Feng Zhao","doi":"10.1109/ICACT.2005.246230","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246230","url":null,"abstract":"An important discovery about the PAPR in multicarrier modulation (MCM) systems with different orthogonal base is reported at the first time. In this paper PAPR of MCM is gained respectively by employing seven different kinds of orthogonal bases, six of which are wavelet bases and one is the well-known Fourier base. Simulation results show that according to PAPR of Fourier based MCM (OFDM) outperforms those based on wavelet regardless of which wavelet is chosen","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121179691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improvement of front-back sound localization characteristics in headphone-based 3D sound generation 基于耳机的三维声音生成中前后声音定位特性的改进
Man-ho Park, Song-in Choi, Siho Kim, Keun-Sung Bae
A binaural filtering method using HRTF database is generally used to make the headphone-based 3D sound. this method can create some confusion between the front and back directions or between the up and down directions due to the non-individual HRTF that depends on each listener. To reduce the confusion of sound image localization, we propose a new method to boost the spectral cue by modifying the HRTF spectra with spectrum difference between the front and back directions. Informal listening tests show that the proposed method improves the front-back sound localization characteristics much better than the conventional methods
利用HRTF数据库的双耳滤波方法一般用于制作基于耳机的三维声音。由于依赖于每个听众的非独立HRTF,这种方法可能会在前后方向或上下方向之间造成一些混淆。为了减少声像定位的混乱,我们提出了一种新的方法,通过修改前后方向的频谱差来增强频谱提示。非正式听力测试表明,该方法比传统方法更能改善前后声定位特性
{"title":"Improvement of front-back sound localization characteristics in headphone-based 3D sound generation","authors":"Man-ho Park, Song-in Choi, Siho Kim, Keun-Sung Bae","doi":"10.1109/ICACT.2005.245845","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245845","url":null,"abstract":"A binaural filtering method using HRTF database is generally used to make the headphone-based 3D sound. this method can create some confusion between the front and back directions or between the up and down directions due to the non-individual HRTF that depends on each listener. To reduce the confusion of sound image localization, we propose a new method to boost the spectral cue by modifying the HRTF spectra with spectrum difference between the front and back directions. Informal listening tests show that the proposed method improves the front-back sound localization characteristics much better than the conventional methods","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116605645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Design of attack generation test-suite based scenario for security solutions testing 设计基于攻击生成测试套件的场景,用于安全解决方案测试
Hwan-Kuk Kim, Yangseo Choi, D. Seo
Currently, Internet is deeply rooted in everyday life and many things are performed using Internet in real world. Internet users increased because of convenience. But then, Internet accident is on the increase rapidly. Recently, large scale network attack infestations, as seen last year in the cases Code Red, Nimda, are a cause great concern for the computer security communication. These network worm attack becomes the biggest threat that could be the down utility of network availability. Therefore, it needs high efficiency information protection system development. And the security companies have developed numerous security reinforcement systems to protect systems and networks from various intrusions. A traditional performing test tools are not adequate for testing and benchmarking of security solutions against exploits (attacks on a network), Trojans (viruses), DoS attacks, and other intrusions. Also, there are many individual test suites to evaluate security solutions. However, automating testing eliminates the effects of individual differences. Therefore, it is necessary that test suites generate automatically various attack patterns, and traffics based scenario on purpose to analyze the functional stability and performance of security solution. In this paper, we describe a method of design and implementation about AGT (attack generation test suite) simulator based scenario, which generate various attack patterns using multiple agents
目前,互联网已经深入到人们的日常生活中,现实生活中很多事情都是通过互联网进行的。互联网用户增加是因为方便。但是,网络事故正在迅速增加。最近,像去年发生的“红色代码”、“Nimda”等大规模网络攻击事件,引起了人们对计算机安全通信的高度关注。这些网络蠕虫攻击成为网络可用性下降的最大威胁。因此,需要高效的信息保护系统开发。安全公司已经开发了许多安全加固系统来保护系统和网络免受各种入侵。传统的执行测试工具不适用于针对漏洞利用(对网络的攻击)、木马(病毒)、DoS攻击和其他入侵的安全解决方案的测试和基准测试。此外,还有许多单独的测试套件来评估安全性解决方案。然而,自动化测试消除了个体差异的影响。因此,测试套件有必要自动生成各种攻击模式和基于流量的场景,以分析安全解决方案的功能稳定性和性能。本文描述了一种基于场景的AGT(攻击生成测试套件)模拟器的设计和实现方法,该模拟器使用多个代理生成各种攻击模式
{"title":"Design of attack generation test-suite based scenario for security solutions testing","authors":"Hwan-Kuk Kim, Yangseo Choi, D. Seo","doi":"10.1109/ICACT.2005.245959","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245959","url":null,"abstract":"Currently, Internet is deeply rooted in everyday life and many things are performed using Internet in real world. Internet users increased because of convenience. But then, Internet accident is on the increase rapidly. Recently, large scale network attack infestations, as seen last year in the cases Code Red, Nimda, are a cause great concern for the computer security communication. These network worm attack becomes the biggest threat that could be the down utility of network availability. Therefore, it needs high efficiency information protection system development. And the security companies have developed numerous security reinforcement systems to protect systems and networks from various intrusions. A traditional performing test tools are not adequate for testing and benchmarking of security solutions against exploits (attacks on a network), Trojans (viruses), DoS attacks, and other intrusions. Also, there are many individual test suites to evaluate security solutions. However, automating testing eliminates the effects of individual differences. Therefore, it is necessary that test suites generate automatically various attack patterns, and traffics based scenario on purpose to analyze the functional stability and performance of security solution. In this paper, we describe a method of design and implementation about AGT (attack generation test suite) simulator based scenario, which generate various attack patterns using multiple agents","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122699110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An effective handover scheme using the reserved addresses in mobile IPv6 在移动IPv6中使用保留地址的有效切换方案
Heeyoung Jung, JongWha Yi
This paper proposes an extension scheme to support effectively real-time services in Mobile IPv6. The proposed scheme could very simplify the handover procedure by using the proposed reserved addresses scheme and layer 2 triggers so that it could considerably reduce handover latency in Mobile IPv6. The performance analysis shows that the handover latency in the proposed scheme could be reduced by a minimum of 1 second, maximum of above 3 second as compared to that of basic Mobile IPv6. Accordingly the proposed scheme could be considered as a strong candidate to support real-time services like VoIP in future network based on Mobile IPv6
本文提出了一种扩展方案来有效地支持移动IPv6的实时业务。该方案通过使用保留地址方案和第二层触发器,大大简化了切换过程,从而大大降低了移动IPv6中的切换延迟。性能分析表明,与基本移动IPv6相比,该方案的切换延迟最少减少1秒,最多减少3秒以上。因此,该方案可作为未来基于移动IPv6的网络中支持VoIP等实时业务的有力候选方案
{"title":"An effective handover scheme using the reserved addresses in mobile IPv6","authors":"Heeyoung Jung, JongWha Yi","doi":"10.1109/ICACT.2005.245994","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245994","url":null,"abstract":"This paper proposes an extension scheme to support effectively real-time services in Mobile IPv6. The proposed scheme could very simplify the handover procedure by using the proposed reserved addresses scheme and layer 2 triggers so that it could considerably reduce handover latency in Mobile IPv6. The performance analysis shows that the handover latency in the proposed scheme could be reduced by a minimum of 1 second, maximum of above 3 second as compared to that of basic Mobile IPv6. Accordingly the proposed scheme could be considered as a strong candidate to support real-time services like VoIP in future network based on Mobile IPv6","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131600580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building secure agents on the semantic web 在语义网上构建安全代理
Joo-Young Lee, Kiyoung Moon
Security for agents on the semantic Web is vital because they usually handle a lot of privacy related information. Using this information such like financial information, agents purchase goods, reserve hotels, flights, and cars and make a contract with others on behalf of their users. These features bring them more subtle attacks and dangers. For example, sensitive information about the user may be disclosed or sabotaged by malicious parties. In this paper, we suggest a method to build secure agents on the semantic Web as a solution to this problem. Especially because agents have charges of different and various roles on the distributed systems and platforms on the semantic Web, required qualification for access to resource is dynamically changed according to the case. Therefore, at the first, we discuss the requirement of agent security on the semantic Web and propose a method that the agent dynamically exchanges its authentication and authorization information using SAML (security assertion markup language). Because SAML doesn't need to share same security infrastructure and allows applications to exchange authentication and authorization information, it is suitable for securing the agent that plays various roles in heterogeneous platforms, dynamically changes their requirements, and acts on behalf of users with diverse access permission on the semantic Web. In addition to this, since SAML is based on XML, it has an advantage of easy integration and extension without modification of legacy system and protocol on the semantic Web
语义Web上代理的安全性至关重要,因为它们通常处理大量与隐私相关的信息。代理商利用这些信息,如金融信息,购买商品,预订酒店,机票和汽车,并代表他们的用户与他人签订合同。这些特点给他们带来了更微妙的攻击和危险。例如,有关用户的敏感信息可能被恶意方泄露或破坏。在本文中,我们提出了一种在语义Web上构建安全代理的方法来解决这个问题。特别是由于代理在语义Web上的分布式系统和平台上具有不同的角色,因此访问资源所需的资格会根据情况动态更改。因此,本文首先讨论了语义Web对代理安全性的要求,提出了一种代理使用安全断言标记语言(SAML)动态交换身份验证和授权信息的方法。由于SAML不需要共享相同的安全基础设施,并且允许应用程序交换身份验证和授权信息,因此它适合保护在异构平台中扮演各种角色、动态更改其需求并代表在语义Web上具有不同访问权限的用户的代理。除此之外,由于SAML是基于XML的,因此它具有易于集成和扩展的优点,而无需修改语义Web上的遗留系统和协议
{"title":"Building secure agents on the semantic web","authors":"Joo-Young Lee, Kiyoung Moon","doi":"10.1109/ICACT.2005.245879","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245879","url":null,"abstract":"Security for agents on the semantic Web is vital because they usually handle a lot of privacy related information. Using this information such like financial information, agents purchase goods, reserve hotels, flights, and cars and make a contract with others on behalf of their users. These features bring them more subtle attacks and dangers. For example, sensitive information about the user may be disclosed or sabotaged by malicious parties. In this paper, we suggest a method to build secure agents on the semantic Web as a solution to this problem. Especially because agents have charges of different and various roles on the distributed systems and platforms on the semantic Web, required qualification for access to resource is dynamically changed according to the case. Therefore, at the first, we discuss the requirement of agent security on the semantic Web and propose a method that the agent dynamically exchanges its authentication and authorization information using SAML (security assertion markup language). Because SAML doesn't need to share same security infrastructure and allows applications to exchange authentication and authorization information, it is suitable for securing the agent that plays various roles in heterogeneous platforms, dynamically changes their requirements, and acts on behalf of users with diverse access permission on the semantic Web. In addition to this, since SAML is based on XML, it has an advantage of easy integration and extension without modification of legacy system and protocol on the semantic Web","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127582695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
2-step wavelet-based edge detection using gabor and cauchy directional wavelets 基于gabor和cauchy方向小波的两步小波边缘检测
J.N. Niya, A. Aghagolzadeh, M. A. Tinati, S. Feizi
In this paper we propose a new wavelet-based approach for solving edge detection problem. Using primary knowledge of the direction of the edges extracted by ordinary separable and isotropic wavelet transform, we can classify the pixels as edge points, background and candidate edge point. For the candidate edge points, we propose implementing the Gabor and Cauchy directional wavelets and detecting the edge points precisely
本文提出了一种新的基于小波的边缘检测方法。利用普通可分和各向同性小波变换提取的边缘方向的初步知识,将像素点分为边缘点、背景点和候选边缘点。对于候选边缘点,我们提出采用Gabor和Cauchy方向小波对边缘点进行精确检测
{"title":"2-step wavelet-based edge detection using gabor and cauchy directional wavelets","authors":"J.N. Niya, A. Aghagolzadeh, M. A. Tinati, S. Feizi","doi":"10.1109/ICACT.2005.246020","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246020","url":null,"abstract":"In this paper we propose a new wavelet-based approach for solving edge detection problem. Using primary knowledge of the direction of the edges extracted by ordinary separable and isotropic wavelet transform, we can classify the pixels as edge points, background and candidate edge point. For the candidate edge points, we propose implementing the Gabor and Cauchy directional wavelets and detecting the edge points precisely","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127800966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The design of IPSec application in lXDP2400 IPSec在lXDP2400中的应用设计
Minho Han, Jeong-Nyeo Kim, Jongsoo Jang
Network processors in general, enable us to add, through software, the latest-and-greatest network services while maintaining high packet throughput and low packet latency. Simply put, the network processors offer performance and flexibility for implementing network service. IPSec is a set of protocols developed by the IETF to support secures exchange of packets at the IP layer. This paper describes the design of an IPSec application using the Intel IXP2400 network processor. The application described in this paper is supported on the Intel IXDP2400 advanced development platform
一般来说,网络处理器使我们能够通过软件添加最新最好的网络服务,同时保持高数据包吞吐量和低数据包延迟。简单地说,网络处理器为实现网络服务提供了性能和灵活性。IPSec是IETF开发的一组协议,用于支持IP层的安全数据包交换。本文介绍了一个基于Intel IXP2400网络处理器的IPSec应用程序的设计。本文描述的应用是在Intel IXDP2400高级开发平台上支持的
{"title":"The design of IPSec application in lXDP2400","authors":"Minho Han, Jeong-Nyeo Kim, Jongsoo Jang","doi":"10.1109/ICACT.2005.245940","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245940","url":null,"abstract":"Network processors in general, enable us to add, through software, the latest-and-greatest network services while maintaining high packet throughput and low packet latency. Simply put, the network processors offer performance and flexibility for implementing network service. IPSec is a set of protocols developed by the IETF to support secures exchange of packets at the IP layer. This paper describes the design of an IPSec application using the Intel IXP2400 network processor. The application described in this paper is supported on the Intel IXDP2400 advanced development platform","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"590 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128076617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1