首页 > 最新文献

2016 International Conference on Computing, Networking and Communications (ICNC)最新文献

英文 中文
CloudPDB: A light-weight data privacy schema for cloud-based databases CloudPDB:用于基于云的数据库的轻量级数据隐私模式
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440634
M. Bahrami, M. Singhal
Cloud computing paradigm offers an opportunity to in-house IT departments to establish their services on the cloud with minimum investment, and lower maintenance cost. This opportunity includes database services that allow a massive amount of data to be stored on the cloud. However, outsourcing data to the cloud may expose users' data to the cloud vendor, or the vendors' partners. Although encryption schemes, such as AES can be used against an untrusted cloud vendor, or an adversary, those schemes add additional computation overheads. In this paper, we proposed a light-weight data privacy schema for cloud based databases (CloudPDB) that scrambles data on each selected bucket (multiple records, or fields) of a database. The proposed schema uses a pre-defined database of a chaos system to store data on the cloud that protect data against an adversary inside or outside of an untrusted cloud vendor. We implemented the proposed schema on a well-known standard database benchmark, TPC-H with different query sizes. We ran several queries to assess the performance of the proposed schema. The evaluation shows that the proposed schema provides a better performance over other well-known encryption methods. In addition, we assess the security level of the proposed schema.
云计算范例为内部IT部门提供了以最小的投资和更低的维护成本在云上建立服务的机会。这个机会包括允许将大量数据存储在云上的数据库服务。但是,将数据外包到云可能会将用户的数据暴露给云供应商或供应商的合作伙伴。虽然加密方案(如AES)可以用来对付不受信任的云供应商或对手,但这些方案增加了额外的计算开销。在本文中,我们为基于云的数据库(CloudPDB)提出了一种轻量级的数据隐私模式,该模式对数据库的每个选定桶(多条记录或字段)上的数据进行加密。提出的模式使用混沌系统的预定义数据库将数据存储在云上,以保护数据免受不受信任的云供应商内部或外部的攻击。我们在具有不同查询大小的著名标准数据库基准TPC-H上实现了建议的模式。我们运行了几个查询来评估所建议模式的性能。评估表明,与其他已知的加密方法相比,所提出的模式提供了更好的性能。此外,我们评估所建议模式的安全级别。
{"title":"CloudPDB: A light-weight data privacy schema for cloud-based databases","authors":"M. Bahrami, M. Singhal","doi":"10.1109/ICCNC.2016.7440634","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440634","url":null,"abstract":"Cloud computing paradigm offers an opportunity to in-house IT departments to establish their services on the cloud with minimum investment, and lower maintenance cost. This opportunity includes database services that allow a massive amount of data to be stored on the cloud. However, outsourcing data to the cloud may expose users' data to the cloud vendor, or the vendors' partners. Although encryption schemes, such as AES can be used against an untrusted cloud vendor, or an adversary, those schemes add additional computation overheads. In this paper, we proposed a light-weight data privacy schema for cloud based databases (CloudPDB) that scrambles data on each selected bucket (multiple records, or fields) of a database. The proposed schema uses a pre-defined database of a chaos system to store data on the cloud that protect data against an adversary inside or outside of an untrusted cloud vendor. We implemented the proposed schema on a well-known standard database benchmark, TPC-H with different query sizes. We ran several queries to assess the performance of the proposed schema. The evaluation shows that the proposed schema provides a better performance over other well-known encryption methods. In addition, we assess the security level of the proposed schema.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124055753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Tree search based configurable joint detection and decoding algorithms for MIMO systems 基于树搜索的MIMO系统可配置联合检测与解码算法
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440617
Chien-Hao Huang, C. Yu, Chung-An Shen
It has been shown that the Configurable Joint Detection-Decoding (CJDD) algorithms in MIMO systems can effectively reduce the complexity and improve the signal quality. Since the CJDD approach is based on the tree search algorithms and there exists various kinds of such methods with different characteristics, it is of great importance to explore the trade-offs between each algorithm and their impacts on different aspects of system performances. In this paper, we study the CJDD algorithm based on three types of tree search approaches: breadth-first search, depth-first search, and the Fano algorithm. We explicitly elucidate the advantages and disadvantages of each algorithm on the basis of timing complexity, area complexity, and run-time variability. Our goal is to shed more lights on the design and application of tree search type approaches on the MIMO wireless communication systems for different system design considerations.
研究表明,MIMO系统中的可配置联合检测-解码(CJDD)算法可以有效地降低复杂性,提高信号质量。由于CJDD方法基于树搜索算法,并且存在各种不同特征的方法,因此探索每种算法之间的权衡及其对系统性能不同方面的影响是非常重要的。本文研究了基于三种树搜索方法的CJDD算法:广度优先搜索、深度优先搜索和Fano算法。基于时间复杂度、面积复杂度和运行时间可变性,我们明确阐述了每种算法的优缺点。我们的目标是为MIMO无线通信系统的不同设计考虑提供更多关于树搜索型方法的设计和应用。
{"title":"Tree search based configurable joint detection and decoding algorithms for MIMO systems","authors":"Chien-Hao Huang, C. Yu, Chung-An Shen","doi":"10.1109/ICCNC.2016.7440617","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440617","url":null,"abstract":"It has been shown that the Configurable Joint Detection-Decoding (CJDD) algorithms in MIMO systems can effectively reduce the complexity and improve the signal quality. Since the CJDD approach is based on the tree search algorithms and there exists various kinds of such methods with different characteristics, it is of great importance to explore the trade-offs between each algorithm and their impacts on different aspects of system performances. In this paper, we study the CJDD algorithm based on three types of tree search approaches: breadth-first search, depth-first search, and the Fano algorithm. We explicitly elucidate the advantages and disadvantages of each algorithm on the basis of timing complexity, area complexity, and run-time variability. Our goal is to shed more lights on the design and application of tree search type approaches on the MIMO wireless communication systems for different system design considerations.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128008122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network security analyzing and modeling based on Petri net and Attack tree for SDN 基于Petri网和攻击树的SDN网络安全分析与建模
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440631
L. Yao, Ping Dong, T. Zheng, Hongke Zhang, Xiaojiang Du, M. Guizani
Due to the widespread research on Software Defined Networks (SDNs), its security has received much attention recently. But most of those attempts consider SDN security from the OpenFlow perspective. To the best of our knowledge, none so far has paid attention to the security analysis and modeling of Forwarding and Control planes Separation Network Structure (FCSNS) in SDN. Therefore, this paper provides a different approach to network security based on Petri net and Attack tree models. Our objective is to analyze the FCSNS security via the combination of model and state. This method represents the network structure and state transferring by way of Petri net. In addition, it introduces the security analysis method of STRIDE to build up the Attack tree model. Finally, we analyze FCSNS via the combination of Petri net and Attack tree model and present the results. Our results are very promising in using such models to achieve such security objectives.
随着对软件定义网络(sdn)的广泛研究,其安全性受到越来越多的关注。但这些尝试大多是从OpenFlow的角度考虑SDN安全性的。据我们所知,目前还没有人关注SDN中转发和控制平面分离网络结构(FCSNS)的安全性分析和建模。因此,本文提出了一种基于Petri网和攻击树模型的网络安全方法。我们的目标是通过模型和状态的结合来分析FCSNS的安全性。该方法通过Petri网表示网络结构和状态传递。此外,介绍了STRIDE的安全分析方法,建立了攻击树模型。最后,结合Petri网和攻击树模型对FCSNS进行了分析,并给出了分析结果。我们的结果非常有希望使用这样的模型来实现这样的安全目标。
{"title":"Network security analyzing and modeling based on Petri net and Attack tree for SDN","authors":"L. Yao, Ping Dong, T. Zheng, Hongke Zhang, Xiaojiang Du, M. Guizani","doi":"10.1109/ICCNC.2016.7440631","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440631","url":null,"abstract":"Due to the widespread research on Software Defined Networks (SDNs), its security has received much attention recently. But most of those attempts consider SDN security from the OpenFlow perspective. To the best of our knowledge, none so far has paid attention to the security analysis and modeling of Forwarding and Control planes Separation Network Structure (FCSNS) in SDN. Therefore, this paper provides a different approach to network security based on Petri net and Attack tree models. Our objective is to analyze the FCSNS security via the combination of model and state. This method represents the network structure and state transferring by way of Petri net. In addition, it introduces the security analysis method of STRIDE to build up the Attack tree model. Finally, we analyze FCSNS via the combination of Petri net and Attack tree model and present the results. Our results are very promising in using such models to achieve such security objectives.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134366094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Peek: A mobile-to-mobile remote computing protocol for smartphones and tablets Peek:用于智能手机和平板电脑的移动到移动远程计算协议
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440689
U. Moravapalle, Raghupathy Sivakumar
A mobile-to-mobile remote computing protocol for smartphones presents a user with the ability to run an application remotely and to interact with it in a responsive way, where I/O updates can be performed midstream and the results can be viewed in real time. Even though several protocols exist for desktop remote computing, we argue that these cannot be applied as-is for mobile-to-mobile remote computing. In this context, we introduce Peek, a remote computing protocol with i) multi-touch support, ii) context association, and iii) multi-modal frame compression. Through implementation on real devices, we show that Peek reduces the time taken to perform actions on a server by 62% on average, compared to Virtual Network Computing (VNC). We also test Peek's multi-modal frame compression, against VNC, on datasets and show that it has the potential to reduce 30% of the bytes sent on the network.
针对智能手机的移动到移动远程计算协议为用户提供了远程运行应用程序并以响应方式与之交互的能力,其中I/O更新可以在中途执行,并且可以实时查看结果。尽管存在一些用于桌面远程计算的协议,但我们认为这些协议不能按原样应用于移动到移动的远程计算。在这种情况下,我们介绍Peek,它是一种远程计算协议,具有i)多点触摸支持,ii)上下文关联和iii)多模态帧压缩。通过在真实设备上的实现,我们发现与虚拟网络计算(VNC)相比,Peek在服务器上执行操作所需的时间平均减少了62%。我们还针对VNC在数据集上测试了Peek的多模态帧压缩,并显示它有可能减少30%的网络上发送的字节。
{"title":"Peek: A mobile-to-mobile remote computing protocol for smartphones and tablets","authors":"U. Moravapalle, Raghupathy Sivakumar","doi":"10.1109/ICCNC.2016.7440689","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440689","url":null,"abstract":"A mobile-to-mobile remote computing protocol for smartphones presents a user with the ability to run an application remotely and to interact with it in a responsive way, where I/O updates can be performed midstream and the results can be viewed in real time. Even though several protocols exist for desktop remote computing, we argue that these cannot be applied as-is for mobile-to-mobile remote computing. In this context, we introduce Peek, a remote computing protocol with i) multi-touch support, ii) context association, and iii) multi-modal frame compression. Through implementation on real devices, we show that Peek reduces the time taken to perform actions on a server by 62% on average, compared to Virtual Network Computing (VNC). We also test Peek's multi-modal frame compression, against VNC, on datasets and show that it has the potential to reduce 30% of the bytes sent on the network.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132955947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recent results on correlated lognormal atmospheric turbulence channels 相关对数正态大气湍流通道的最新结果
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440656
Fan Yang, Julian Cheng
The performance of free-space optical (FSO) communication systems is often compromised by atmospheric attenuation and fading effects. One effective counter fading technique is the spatial diversity. In this paper, an FSO system with spatial diversity is analyzed over correlated lognormal fading channels that may have nonidentical variance. We use a novel lognormal-Nakagami composite channel model to reveal the asymptotic behaviors of the correlated lognormal fading channels. We discover that the correlation among the lognormal channels can impose large signal-to-noise ratio (SNR) penalty when compared to the same system with independent lognormal channels. This property is not shared with the other commonly used fading channels. In addition, we also derive a compact expression for the asymptotic relative diversity order (ARDO) between an L branch maximal ratio combing system over correlated lognormal channels and a single branch system. It is found that the ARDO is related to the number of diversity branches as well as entry-wise norm of the covariance matrix of the logarithm of the lognormal channel states.
自由空间光通信系统的性能经常受到大气衰减和衰落效应的影响。空间分集是一种有效的抗衰落技术。本文分析了具有空间分集的FSO系统在相关对数正态衰落信道中可能存在的不相同方差。我们使用一种新的对数正态- nakagami复合信道模型来揭示相关对数正态衰落信道的渐近行为。我们发现,与具有独立对数正态信道的系统相比,对数正态信道之间的相关性会造成较大的信噪比损失。此属性不与其他常用的衰落信道共享。此外,我们还得到了相关对数正态信道上的L支路最大比组合系统与单支路系统之间渐近相对分集阶(ARDO)的一个紧凑表达式。研究发现,ARDO与分集分支数以及对数正态信道状态的对数协方差矩阵的入口范数有关。
{"title":"Recent results on correlated lognormal atmospheric turbulence channels","authors":"Fan Yang, Julian Cheng","doi":"10.1109/ICCNC.2016.7440656","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440656","url":null,"abstract":"The performance of free-space optical (FSO) communication systems is often compromised by atmospheric attenuation and fading effects. One effective counter fading technique is the spatial diversity. In this paper, an FSO system with spatial diversity is analyzed over correlated lognormal fading channels that may have nonidentical variance. We use a novel lognormal-Nakagami composite channel model to reveal the asymptotic behaviors of the correlated lognormal fading channels. We discover that the correlation among the lognormal channels can impose large signal-to-noise ratio (SNR) penalty when compared to the same system with independent lognormal channels. This property is not shared with the other commonly used fading channels. In addition, we also derive a compact expression for the asymptotic relative diversity order (ARDO) between an L branch maximal ratio combing system over correlated lognormal channels and a single branch system. It is found that the ARDO is related to the number of diversity branches as well as entry-wise norm of the covariance matrix of the logarithm of the lognormal channel states.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129373501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
QoE-based resource allocation for mixed services over cognitive radio networks 基于qos的认知无线网络混合业务资源分配
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440653
B. Liu, Lei He
In cognitive radio (CR) networks, secondary users (SUs) may have various applications such as video streaming and file transfer, resulting in different bandwidth requirements. In this paper, we propose a Quality of Experience (QoE) based resource allocation scheme for mixed services over spectrum underlay cognitive radio networks. The proposed scheme jointly optimize the transmission rate and transmission power at each secondary session to maximize the network resource usage and all users' average QoE. The mean opinion score (MOS), which is an effective measurement of QoE, is used as the unifying metric over different service classes. The optimization is solved efficiently using geometric programming techniques. The simulation results demonstrate that the proposed QoE-based resource allocation scheme outperforms the conventional rate-based scheme in terms of user perceived quality.
在认知无线电(cognitive radio, CR)网络中,辅助用户(secondary user, su)可能有各种不同的应用,如视频流和文件传输,从而对带宽有不同的需求。在本文中,我们提出了一种基于体验质量(QoE)的频谱底层认知无线电网络混合业务资源分配方案。该方案通过联合优化各次会话的传输速率和传输功率,最大限度地提高网络资源利用率和所有用户的平均QoE。评价平均分(mean opinion score, MOS)是一种有效的质量评价(QoE)度量方法,作为不同服务类别之间的统一度量。利用几何规划技术有效地解决了优化问题。仿真结果表明,基于qos的资源分配方案在用户感知质量方面优于传统的基于速率的资源分配方案。
{"title":"QoE-based resource allocation for mixed services over cognitive radio networks","authors":"B. Liu, Lei He","doi":"10.1109/ICCNC.2016.7440653","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440653","url":null,"abstract":"In cognitive radio (CR) networks, secondary users (SUs) may have various applications such as video streaming and file transfer, resulting in different bandwidth requirements. In this paper, we propose a Quality of Experience (QoE) based resource allocation scheme for mixed services over spectrum underlay cognitive radio networks. The proposed scheme jointly optimize the transmission rate and transmission power at each secondary session to maximize the network resource usage and all users' average QoE. The mean opinion score (MOS), which is an effective measurement of QoE, is used as the unifying metric over different service classes. The optimization is solved efficiently using geometric programming techniques. The simulation results demonstrate that the proposed QoE-based resource allocation scheme outperforms the conventional rate-based scheme in terms of user perceived quality.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127823118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Latent fingerprint matching in large databases using high performance computing 基于高性能计算的大型数据库潜在指纹匹配
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440633
Y. Reddy
Most of the fingerprint matching systems use the minutiae-based algorithms with matching of ridge patterns. These systems consider ridge activity in the vicinity of minutiae points, which has poorly recorded/captured exemplar prints (information). In this research, we recommend the MapReduce technique to identify a required fingerprint from the reference fingerprint database. In the proposed MapReduce process, minutiae of the latent fingerprint used as keys. The latent fingerprints are analyzed using Bezier ridge descriptors to enhance the matching of partial latent against reference prints. Since the retrieval of reference print is same as retrieval of the required document, we suggested the MapReduce model for detection of required fingerprint.
大多数指纹匹配系统都采用基于微特征的脊纹匹配算法。这些系统考虑了细节点附近的山脊活动,这些点记录/捕获的样本印刷品(信息)很差。在本研究中,我们推荐使用MapReduce技术从参考指纹数据库中识别所需的指纹。在本文提出的MapReduce过程中,利用潜在指纹的细节信息作为密钥。利用贝塞尔脊描述符对潜在指纹进行分析,增强部分潜在指纹与参考指纹的匹配。由于参考指纹的检索与所需文档的检索相同,我们建议使用MapReduce模型来检测所需指纹。
{"title":"Latent fingerprint matching in large databases using high performance computing","authors":"Y. Reddy","doi":"10.1109/ICCNC.2016.7440633","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440633","url":null,"abstract":"Most of the fingerprint matching systems use the minutiae-based algorithms with matching of ridge patterns. These systems consider ridge activity in the vicinity of minutiae points, which has poorly recorded/captured exemplar prints (information). In this research, we recommend the MapReduce technique to identify a required fingerprint from the reference fingerprint database. In the proposed MapReduce process, minutiae of the latent fingerprint used as keys. The latent fingerprints are analyzed using Bezier ridge descriptors to enhance the matching of partial latent against reference prints. Since the retrieval of reference print is same as retrieval of the required document, we suggested the MapReduce model for detection of required fingerprint.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124555398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internet video traffic classification using QoS features 基于QoS特性的互联网视频流分类
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440599
Zaijian Wang, Yu-ning Dong, Hai-xian Shi, Lingyun Yang, Pingping Tang
This paper addresses the issue of effective classification of video traffic with the view of QoS guarantee, and presents a modified K-Singular Value Decomposition (K-SVD) classification framework based on the concept of QFAg (QoS based Flow Aggregation). By statistical analysis of video flows on large-scale real networks, we define 5 Quality of Service (QoS) categories with the features of downstream/upstream rates. To investigate the sparsity property of multimedia QoS feature, this paper utilizes modified K-SVD to train dictionary extracted from training samples. By learning feature-set to obtain sparse representation for video traffic, we propose a feature-based method to classify video traffic. Experimental results reveal that the proposed method can improve the classification performance significantly compared to previous methods.
从QoS保证的角度研究视频流量的有效分类问题,提出了一种基于QoS的流量聚合(QFAg)概念的改进k -奇异值分解(K-SVD)分类框架。通过对大规模真实网络视频流的统计分析,我们定义了5种具有下游/上游速率特征的服务质量(QoS)类别。为了研究多媒体QoS特征的稀疏性,本文利用改进的K-SVD对训练样本提取的字典进行训练。通过学习特征集获得视频流量的稀疏表示,提出了一种基于特征的视频流量分类方法。实验结果表明,与已有的分类方法相比,该方法能显著提高分类性能。
{"title":"Internet video traffic classification using QoS features","authors":"Zaijian Wang, Yu-ning Dong, Hai-xian Shi, Lingyun Yang, Pingping Tang","doi":"10.1109/ICCNC.2016.7440599","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440599","url":null,"abstract":"This paper addresses the issue of effective classification of video traffic with the view of QoS guarantee, and presents a modified K-Singular Value Decomposition (K-SVD) classification framework based on the concept of QFAg (QoS based Flow Aggregation). By statistical analysis of video flows on large-scale real networks, we define 5 Quality of Service (QoS) categories with the features of downstream/upstream rates. To investigate the sparsity property of multimedia QoS feature, this paper utilizes modified K-SVD to train dictionary extracted from training samples. By learning feature-set to obtain sparse representation for video traffic, we propose a feature-based method to classify video traffic. Experimental results reveal that the proposed method can improve the classification performance significantly compared to previous methods.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114508778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The expected impact of smart devices visualization 智能设备可视化的预期影响
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440551
R. Bolla, F. Davoli, C. Lombardo, Laura Masullo, R. Bruschi
Overcoming the typical ossification of the traditional TCP/IP-based Internet infrastructure will allow opening the way for more flexible and energy efficient paradigms, able to provide a sustainable support to the constantly increasing number of devices and services. To this goal, the INPUT Project will overcome current limitations by introducing computing and storage capabilities to edge network devices in order to allow users/telecom operators to create/manage private clouds "in the network". In addition, these new capabilities will allow replacing smart devices, such as network-attached storage servers, set-top-boxes, video sensors etc. with their virtual images. Although this virtualization process can clearly bring to a reduction of the emissions, along with the lowering of capital (CAPEX) and operational (OPEX) expenditures, on the other hand it requires more computational capacity at server level, which may erase the savings produced by virtualization in the absence of a thorough management and planning. In this respect, this paper presents a mathematical model that analyzes the impact of different levels of virtualization on the overall energy efficiency by thoroughly outlining how the carbon footprint varies depending on the virtualization level of a device.
克服传统的基于TCP/ ip的互联网基础设施的典型僵化,将为更灵活和更节能的范例开辟道路,能够为不断增加的设备和服务数量提供可持续的支持。为了实现这一目标,INPUT项目将通过向边缘网络设备引入计算和存储功能来克服当前的限制,从而允许用户/电信运营商在“网络中”创建/管理私有云。此外,这些新功能将允许用虚拟图像取代智能设备,如网络附加存储服务器、机顶盒、视频传感器等。虽然这种虚拟化过程可以明显地减少排放,同时降低资本(CAPEX)和运营(OPEX)支出,但另一方面,它在服务器层面需要更多的计算能力,这可能会在缺乏彻底的管理和规划的情况下抵消虚拟化带来的节省。在这方面,本文提出了一个数学模型,该模型通过全面概述碳足迹如何根据设备的虚拟化级别而变化,分析了不同级别虚拟化对整体能源效率的影响。
{"title":"The expected impact of smart devices visualization","authors":"R. Bolla, F. Davoli, C. Lombardo, Laura Masullo, R. Bruschi","doi":"10.1109/ICCNC.2016.7440551","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440551","url":null,"abstract":"Overcoming the typical ossification of the traditional TCP/IP-based Internet infrastructure will allow opening the way for more flexible and energy efficient paradigms, able to provide a sustainable support to the constantly increasing number of devices and services. To this goal, the INPUT Project will overcome current limitations by introducing computing and storage capabilities to edge network devices in order to allow users/telecom operators to create/manage private clouds \"in the network\". In addition, these new capabilities will allow replacing smart devices, such as network-attached storage servers, set-top-boxes, video sensors etc. with their virtual images. Although this virtualization process can clearly bring to a reduction of the emissions, along with the lowering of capital (CAPEX) and operational (OPEX) expenditures, on the other hand it requires more computational capacity at server level, which may erase the savings produced by virtualization in the absence of a thorough management and planning. In this respect, this paper presents a mathematical model that analyzes the impact of different levels of virtualization on the overall energy efficiency by thoroughly outlining how the carbon footprint varies depending on the virtualization level of a device.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121963298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An exact performance analysis for mobile communications over generalized fading channels 广义衰落信道上移动通信的精确性能分析
Pub Date : 2016-02-01 DOI: 10.1109/ICCNC.2016.7440691
Osamah. S. Badarneh, I. Atawi, M. Aloqlah
This paper derives novel, unified, and exact closed-form analytical expressions for the moment generating function (MGF), the generalized moments, and the average symbol error probability (SEP) of wireless communication systems that operate over the α - η - β fading channels. The derived expressions are then used to analyze the influence of the fading parameters on the system performance. However, to validate the accuracy of the derived expressions, we present a comparison between numerical results and Monte-Carlo simulations. Both results are in excellent agreement over a wide range of signal-to-noise ratio (SNR) and for different values of the fading parameters.
本文导出了运行在α - η - β衰落信道上的无线通信系统的矩产生函数(MGF)、广义矩和平均符号误差概率(SEP)的新颖、统一和精确的封闭解析表达式。然后利用导出的表达式分析了衰落参数对系统性能的影响。然而,为了验证导出表达式的准确性,我们将数值结果与蒙特卡罗模拟进行了比较。这两个结果在很宽的信噪比(SNR)范围内和不同的衰落参数值上都非常一致。
{"title":"An exact performance analysis for mobile communications over generalized fading channels","authors":"Osamah. S. Badarneh, I. Atawi, M. Aloqlah","doi":"10.1109/ICCNC.2016.7440691","DOIUrl":"https://doi.org/10.1109/ICCNC.2016.7440691","url":null,"abstract":"This paper derives novel, unified, and exact closed-form analytical expressions for the moment generating function (MGF), the generalized moments, and the average symbol error probability (SEP) of wireless communication systems that operate over the α - η - β fading channels. The derived expressions are then used to analyze the influence of the fading parameters on the system performance. However, to validate the accuracy of the derived expressions, we present a comparison between numerical results and Monte-Carlo simulations. Both results are in excellent agreement over a wide range of signal-to-noise ratio (SNR) and for different values of the fading parameters.","PeriodicalId":308458,"journal":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128587970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 International Conference on Computing, Networking and Communications (ICNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1