首页 > 最新文献

2016 International Conference on Computer, Information and Telecommunication Systems (CITS)最新文献

英文 中文
Optimal backup strategy in cloud disaster tolerance 云容灾中的最优备份策略
X. Liu, Xiaoqiang Di, Jinqing Li, Hui Qi, Huamin Yang, Ligang Cong
Cloud disaster tolerance has been widely used as a data security mechanism in which multiple replicas of disaster tolerance data are stored in different backup nodes for reliability. In this paper, we deeply study the optimal data backup strategy that backup nodes set the resources prices and source nodes determine the resources quantities that they want to rent. Firstly, we apply a Stackelberg game framework to simulate the interaction among source nodes and backup nodes whose objective is to gain the maximum payoff of every source node and the maximum total payoff of all the backup nodes by adjusting strategies interactively. And then we propose an algorithm to compute the equilibrium price strategy for backup nodes and equilibrium price strategy for source nodes. Finally, we validate this optimal backup strategy through numerical analysis.
云容灾已被广泛用作一种数据安全机制,其中容灾数据的多个副本存储在不同的备份节点中以提高可靠性。本文深入研究了备份节点确定资源价格、源节点确定资源出租数量的最优数据备份策略。首先,我们采用Stackelberg博弈框架模拟源节点和备份节点之间的交互,其目标是通过交互调整策略获得每个源节点的最大收益和所有备份节点的最大总收益。然后提出了一种计算备用节点均衡价格策略和源节点均衡价格策略的算法。最后,通过数值分析验证了该最优备份策略。
{"title":"Optimal backup strategy in cloud disaster tolerance","authors":"X. Liu, Xiaoqiang Di, Jinqing Li, Hui Qi, Huamin Yang, Ligang Cong","doi":"10.1109/CITS.2016.7546444","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546444","url":null,"abstract":"Cloud disaster tolerance has been widely used as a data security mechanism in which multiple replicas of disaster tolerance data are stored in different backup nodes for reliability. In this paper, we deeply study the optimal data backup strategy that backup nodes set the resources prices and source nodes determine the resources quantities that they want to rent. Firstly, we apply a Stackelberg game framework to simulate the interaction among source nodes and backup nodes whose objective is to gain the maximum payoff of every source node and the maximum total payoff of all the backup nodes by adjusting strategies interactively. And then we propose an algorithm to compute the equilibrium price strategy for backup nodes and equilibrium price strategy for source nodes. Finally, we validate this optimal backup strategy through numerical analysis.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129771872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A simple frequency-domain equalizer over doubly-selective channel without feedback 一个简单的频域均衡器在双选择信道上无反馈
Zhuo Ma, W. Gao, Shuanyi Du, Bong-Kwon Kang
Frequency-domain equalization (FDE) is prior than time-domain equalization in complexity. FDE is based on the cyclic signal property within a data block. This means that the channel must remain constant during this time interval. But in fast fading environments, the channel is time-variant. In order to deal with this problem, a variety of sub-block based FDE techniques have been proposed, but these kinds of algorithms have very high complexity because a tentative equalization and decoding are necessary before sub-block processed. In many practical applications requiring high real-time attribution, processing speed of algorithms is more important than processing capacity, so we must sacrifice performance of algorithm in exchange for speed at this time. In this paper, a simple FDE algorithm without tentative equalization and decoding is proposed for fast fading channel. The proposed method reduces the complexity of algorithm by preserving partial of the frequency equalization result instead of tentative equalizing and decoding. Numerical simulation results show that this lower complexity of algorithm can also effectively decrease the intersymbol interference(ISI) in fast fading environment.
频域均衡(FDE)在复杂度上优于时域均衡。FDE基于数据块内的循环信号属性。这意味着通道在此时间间隔内必须保持恒定。但在快衰落环境下,信道是时变的。为了解决这一问题,人们提出了各种基于子块的FDE技术,但由于这些算法在处理子块之前需要进行暂定均衡和解码,因此复杂度很高。在许多需要高实时属性的实际应用中,算法的处理速度比处理能力更重要,因此此时必须牺牲算法的性能来换取速度。本文针对快速衰落信道,提出了一种简单的不需要暂定均衡和解码的FDE算法。该方法通过保留频率均衡结果的部分而不是暂定均衡和解码来降低算法的复杂度。数值仿真结果表明,这种较低复杂度的算法也能有效地降低快速衰落环境下的码间干扰。
{"title":"A simple frequency-domain equalizer over doubly-selective channel without feedback","authors":"Zhuo Ma, W. Gao, Shuanyi Du, Bong-Kwon Kang","doi":"10.1109/CITS.2016.7546422","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546422","url":null,"abstract":"Frequency-domain equalization (FDE) is prior than time-domain equalization in complexity. FDE is based on the cyclic signal property within a data block. This means that the channel must remain constant during this time interval. But in fast fading environments, the channel is time-variant. In order to deal with this problem, a variety of sub-block based FDE techniques have been proposed, but these kinds of algorithms have very high complexity because a tentative equalization and decoding are necessary before sub-block processed. In many practical applications requiring high real-time attribution, processing speed of algorithms is more important than processing capacity, so we must sacrifice performance of algorithm in exchange for speed at this time. In this paper, a simple FDE algorithm without tentative equalization and decoding is proposed for fast fading channel. The proposed method reduces the complexity of algorithm by preserving partial of the frequency equalization result instead of tentative equalizing and decoding. Numerical simulation results show that this lower complexity of algorithm can also effectively decrease the intersymbol interference(ISI) in fast fading environment.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131089879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep semantic understanding of high resolution remote sensing image 高分辨率遥感图像的深度语义理解
Bo Qu, Xuelong Li, D. Tao, Xiaoqiang Lu
With the rapid development of remote sensing technology, huge quantities of high resolution remote sensing images are available now. Understanding these images in semantic level is of great significance. Hence, a deep multimodal neural network model for semantic understanding of the high resolution remote sensing images is proposed in this paper, which uses both visual and textual information of the high resolution remote sensing images to generate natural sentences describing the given images. In the proposed model, the convolution neural network is utilized to extract the image feature, which is then combined with the text descriptions of the images by RNN or LSTMs. And in the experiments, two new remote sensing image-captions datasets are built at first. Then different kinds of CNNs with RNN or LSTMs are combined to find which is the best combination for caption generation. The experiments results prove that the proposed method achieves good performances in semantic understanding of high resolution remote sensing images.
随着遥感技术的飞速发展,现在有大量的高分辨率遥感图像可供使用。从语义层面理解这些图像具有重要意义。为此,本文提出了一种用于高分辨率遥感图像语义理解的深度多模态神经网络模型,该模型利用高分辨率遥感图像的视觉和文本信息生成描述给定图像的自然句子。在该模型中,利用卷积神经网络提取图像特征,然后通过RNN或lstm将其与图像的文本描述相结合。在实验中,首先建立了两个新的遥感图像字幕数据集。然后将不同类型的cnn与RNN或lstm相结合,找出哪种组合最适合标题生成。实验结果表明,该方法在高分辨率遥感图像的语义理解方面取得了较好的效果。
{"title":"Deep semantic understanding of high resolution remote sensing image","authors":"Bo Qu, Xuelong Li, D. Tao, Xiaoqiang Lu","doi":"10.1109/CITS.2016.7546397","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546397","url":null,"abstract":"With the rapid development of remote sensing technology, huge quantities of high resolution remote sensing images are available now. Understanding these images in semantic level is of great significance. Hence, a deep multimodal neural network model for semantic understanding of the high resolution remote sensing images is proposed in this paper, which uses both visual and textual information of the high resolution remote sensing images to generate natural sentences describing the given images. In the proposed model, the convolution neural network is utilized to extract the image feature, which is then combined with the text descriptions of the images by RNN or LSTMs. And in the experiments, two new remote sensing image-captions datasets are built at first. Then different kinds of CNNs with RNN or LSTMs are combined to find which is the best combination for caption generation. The experiments results prove that the proposed method achieves good performances in semantic understanding of high resolution remote sensing images.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125678439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 119
Feedback method for estimation and compensation of carrier frequency offset in LTE uplink LTE上行链路载波频偏估计与补偿的反馈方法
Saadullah Kalwar, F. Umrani, M. Magarini
Long Term Evolution (LTE) is getting popularity among cellular service providers throughout the World and it is going to dominate cellular systems in coming years. According to 3GPP specifications, LTE adopts Orthogonal Frequency-Division Multiplexing (OFDM) as modulation scheme in the downlink. The problem of systems based on OFDM is that they are prone to Carrier Frequency Offset (CFO). In uplink, LTE uses Single-Carrier Frequency Division Multiple Access (SC-FDMA) instead of OFDM. The main reason of its use is the better peak-to-average power ratio performance in comparison to OFDM, a property required in uplink to increase the duration of the battery of the user device. As OFDM, also SC-FDMA suffers with the problem of CFO. In this paper, a CFO estimation method for LTE uplink is analyzed and simulated by using MATLAB. The proposed method, termed feedback method, uses demodulation reference signals to estimate the CFO. After estimation of CFO, its effect is compensated in time-domain by multiplication with a linear phase.
长期演进(LTE)技术在全球蜂窝服务提供商中越来越受欢迎,并将在未来几年主导蜂窝系统。根据3GPP规范,LTE在下行链路采用正交频分复用(OFDM)作为调制方案。基于OFDM的系统存在载波频偏(CFO)的问题。在上行链路上,LTE采用单载波频分多址(SC-FDMA)而不是OFDM。使用它的主要原因是与OFDM相比,它具有更好的峰值-平均功率比性能,这是上行链路中增加用户设备电池持续时间所需的特性。与OFDM一样,SC-FDMA也存在CFO问题。本文利用MATLAB对LTE上行链路的CFO估计方法进行了分析和仿真。所提出的方法被称为反馈方法,使用解调参考信号来估计CFO。在估计CFO后,其影响在时域上通过与线性相位相乘来补偿。
{"title":"Feedback method for estimation and compensation of carrier frequency offset in LTE uplink","authors":"Saadullah Kalwar, F. Umrani, M. Magarini","doi":"10.1109/CITS.2016.7546402","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546402","url":null,"abstract":"Long Term Evolution (LTE) is getting popularity among cellular service providers throughout the World and it is going to dominate cellular systems in coming years. According to 3GPP specifications, LTE adopts Orthogonal Frequency-Division Multiplexing (OFDM) as modulation scheme in the downlink. The problem of systems based on OFDM is that they are prone to Carrier Frequency Offset (CFO). In uplink, LTE uses Single-Carrier Frequency Division Multiple Access (SC-FDMA) instead of OFDM. The main reason of its use is the better peak-to-average power ratio performance in comparison to OFDM, a property required in uplink to increase the duration of the battery of the user device. As OFDM, also SC-FDMA suffers with the problem of CFO. In this paper, a CFO estimation method for LTE uplink is analyzed and simulated by using MATLAB. The proposed method, termed feedback method, uses demodulation reference signals to estimate the CFO. After estimation of CFO, its effect is compensated in time-domain by multiplication with a linear phase.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127719612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving physical layer security in underlay D2D communication via Stackelberg game based power control 通过基于Stackelberg游戏的功率控制提高底层D2D通信的物理层安全性
Wanbing He, Wei Zhang, Wei Bai, Yueming Cai, Xinrong Guan, Junyue Qu
Device-to-Device (D2D) communication has advantages of improving the spectral resource efficiency. But unfortunately, it brings about interference and potential secrecy hazard. In this paper, a Stackelberg game based power control algorithm is provided to enhance the physical layer security underlaying D2D communication by utilizing the interference. Then, a mathematical model based on Stackelberg game is set up, in which we regard the secrecy energy efficiency as the utility function. After that, the existence and uniqueness of the Stackelberg Equilibrium is proved. In addition, a power control algorithm is offered, which can iteratively converge to the Stackelberg Equilibrium. Finally the simulation results show that by applying the provided algorithm, both the cellular user and the D2D pair have the secrecy energy efficiency improved.
D2D (Device-to-Device)通信具有提高频谱资源利用率的优点。但不幸的是,它带来了干扰和潜在的保密风险。本文提出了一种基于Stackelberg博弈的功率控制算法,利用干扰增强D2D通信的物理层安全性。然后,建立了一个基于Stackelberg博弈的数学模型,将保密能量效率作为效用函数。然后,证明了Stackelberg均衡的存在唯一性。此外,还提出了一种可迭代收敛到Stackelberg平衡点的功率控制算法。仿真结果表明,采用该算法,蜂窝用户和D2D对的保密能量效率都得到了提高。
{"title":"Improving physical layer security in underlay D2D communication via Stackelberg game based power control","authors":"Wanbing He, Wei Zhang, Wei Bai, Yueming Cai, Xinrong Guan, Junyue Qu","doi":"10.1109/CITS.2016.7546390","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546390","url":null,"abstract":"Device-to-Device (D2D) communication has advantages of improving the spectral resource efficiency. But unfortunately, it brings about interference and potential secrecy hazard. In this paper, a Stackelberg game based power control algorithm is provided to enhance the physical layer security underlaying D2D communication by utilizing the interference. Then, a mathematical model based on Stackelberg game is set up, in which we regard the secrecy energy efficiency as the utility function. After that, the existence and uniqueness of the Stackelberg Equilibrium is proved. In addition, a power control algorithm is offered, which can iteratively converge to the Stackelberg Equilibrium. Finally the simulation results show that by applying the provided algorithm, both the cellular user and the D2D pair have the secrecy energy efficiency improved.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129231735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Air pollution source estimation profiling via mobile sensor networks 基于移动传感器网络的空气污染源估算分析
Xue Yang, Junzhao Du, Sicong Liu, Rui Li, Hui Liu
The atmospheric environment is facing increasing threats from industrial pollutions. This paper presents an air pollution source estimation algorithm using mobile sensor networks. We propose a continuous point source model of pollution under windy conditions. Then we use quadrocopters which equipped with sensors that can detect pollutants to collect concentration information. Based on the collected information, we take advantage of the maximum likelihood estimation method to estimate the diffusion parameters. To improve the accuracy of the estimation of diffusion source position and make the quadrocopter approaching the source, we further propose a scheduling strategy based on the particle swarm optimizer basis. We conduct extensive experiments to show the effectiveness of our proposed approach.
大气环境正面临着工业污染日益严重的威胁。提出了一种基于移动传感器网络的空气污染源估计算法。我们提出了一个有风条件下的连续点源污染模型。然后我们用装有传感器的四轴飞行器来收集污染物的浓度信息。根据收集到的信息,利用极大似然估计方法估计扩散参数。为了提高扩散源位置估计的精度,使四旋翼飞行器接近扩散源,我们进一步提出了基于粒子群优化器的调度策略。我们进行了大量的实验来证明我们提出的方法的有效性。
{"title":"Air pollution source estimation profiling via mobile sensor networks","authors":"Xue Yang, Junzhao Du, Sicong Liu, Rui Li, Hui Liu","doi":"10.1109/CITS.2016.7546456","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546456","url":null,"abstract":"The atmospheric environment is facing increasing threats from industrial pollutions. This paper presents an air pollution source estimation algorithm using mobile sensor networks. We propose a continuous point source model of pollution under windy conditions. Then we use quadrocopters which equipped with sensors that can detect pollutants to collect concentration information. Based on the collected information, we take advantage of the maximum likelihood estimation method to estimate the diffusion parameters. To improve the accuracy of the estimation of diffusion source position and make the quadrocopter approaching the source, we further propose a scheduling strategy based on the particle swarm optimizer basis. We conduct extensive experiments to show the effectiveness of our proposed approach.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116792859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Behavior analysis of self-evolving botnets 自进化僵尸网络的行为分析
Takanori Kudo, Tomotaka Kimura, Yoshiaki Inoue, Hirohisa Aman, K. Hirata
Machine learning techniques have been achieving significant performance improvements in various kinds of tasks, and they are getting applied in many research fields. While we benefit from such techniques in many ways, they can be a serious security threat to the Internet if malicious attackers become able to utilize them to detect software vulnerabilities. This paper introduces a new concept of self-evolving botnets, where computing resources of infected hosts are exploited to discover unknown vulnerabilities in non-infected hosts. We propose a stochastic epidemic model that incorporates such a feature of botnets, and show its behaviors through numerical experiments and simulations.
机器学习技术已经在各种任务中取得了显著的性能改进,并在许多研究领域得到了应用。虽然我们在许多方面受益于这些技术,但如果恶意攻击者能够利用它们来检测软件漏洞,它们可能会对Internet构成严重的安全威胁。本文引入了自进化僵尸网络的新概念,利用受感染主机的计算资源发现未受感染主机的未知漏洞。我们提出了一个包含僵尸网络这一特征的随机流行病模型,并通过数值实验和模拟来展示其行为。
{"title":"Behavior analysis of self-evolving botnets","authors":"Takanori Kudo, Tomotaka Kimura, Yoshiaki Inoue, Hirohisa Aman, K. Hirata","doi":"10.1109/CITS.2016.7546428","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546428","url":null,"abstract":"Machine learning techniques have been achieving significant performance improvements in various kinds of tasks, and they are getting applied in many research fields. While we benefit from such techniques in many ways, they can be a serious security threat to the Internet if malicious attackers become able to utilize them to detect software vulnerabilities. This paper introduces a new concept of self-evolving botnets, where computing resources of infected hosts are exploited to discover unknown vulnerabilities in non-infected hosts. We propose a stochastic epidemic model that incorporates such a feature of botnets, and show its behaviors through numerical experiments and simulations.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114654536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Improved soft fusion-based cooperative spectrum sensing defense against SSDF attacks 改进的基于软融合的协同频谱感知防御SSDF攻击
Ting Peng, Yuebin Chen, Jie Xiao, Yang Zheng, Jiangfeng Yang
In the cognitive radios (CR), there is a security issue-spectrum sensing data falsification attacks (SSDF) in the process of cooperation. Some malicious users (MUs) who unwilling to cooperate friendly with other users may launch SSDF attacks by falsifying their local sensing information sent to fusion center (FC) intentionally, result in interfering with the detection and threat the CR networks. In order to defense against the SSDF attacks, an improved soft fusion-based algorithm is given in this paper, the key idea of the algorithm is that the cooperation is viewed as a service-evaluation process and making use of cognitive users' (CUs) average reputation degrees to reflect the service quality, then allocate properly the CUs' weights in the fusion according to the reputation degrees. Simulation results show that the sensing performance of the improved algorithm is better than the traditional soft-fusion CSS in the presence of SSDF attacks.
认知无线电(CR)在合作过程中存在一个安全问题——频谱感知数据伪造攻击(SSDF)。一些恶意用户不愿与其他用户友好合作,通过故意伪造发送到FC的本地感知信息,发起SSDF攻击,从而干扰检测,威胁到CR网络。为了防御SSDF攻击,本文提出了一种改进的基于软融合算法,该算法的核心思想是将合作视为一个服务评价过程,利用认知用户(cu)的平均信誉度来反映服务质量,然后根据信誉度合理分配融合中cu的权重。仿真结果表明,在存在SSDF攻击时,改进算法的感知性能优于传统的软融合CSS。
{"title":"Improved soft fusion-based cooperative spectrum sensing defense against SSDF attacks","authors":"Ting Peng, Yuebin Chen, Jie Xiao, Yang Zheng, Jiangfeng Yang","doi":"10.1109/CITS.2016.7546433","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546433","url":null,"abstract":"In the cognitive radios (CR), there is a security issue-spectrum sensing data falsification attacks (SSDF) in the process of cooperation. Some malicious users (MUs) who unwilling to cooperate friendly with other users may launch SSDF attacks by falsifying their local sensing information sent to fusion center (FC) intentionally, result in interfering with the detection and threat the CR networks. In order to defense against the SSDF attacks, an improved soft fusion-based algorithm is given in this paper, the key idea of the algorithm is that the cooperation is viewed as a service-evaluation process and making use of cognitive users' (CUs) average reputation degrees to reflect the service quality, then allocate properly the CUs' weights in the fusion according to the reputation degrees. Simulation results show that the sensing performance of the improved algorithm is better than the traditional soft-fusion CSS in the presence of SSDF attacks.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114688338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Spatial co-location pattern ordering 空间共位模式排序
Gongsheng Yuan, Lizhen Wang, Peizhong Yang, Lan Chen
Mining spatial co-location pattern is one of the most important researches in the field of spatial data mining. In the past researches, many spatial co-location pattern mining algorithms and the expansions about these algorithms have been proposed. However, some of these methods often produce a large number of patterns which are difficult to use. If we want to use the subset of the prevalent co-location pattern set to summarize the whole set and as the increase of the number of patterns in subset, the patterns in subset always are the best summary for the original prevalent set. This is a NP-hard problem. In this paper, we consider the problem of ordering a prevalent co-location pattern set so that each prefix of the ordering gives as good a summary of the set as possible. And according to the features of spatial data, we define an estimation of participation index function and a prevalent co-location pattern loss function to formulate this problem and design a greedy algorithm which gives an approximation quality.
空间共位模式挖掘是空间数据挖掘领域的重要研究内容之一。在过去的研究中,提出了许多空间共位模式挖掘算法及其扩展。然而,其中一些方法经常产生大量难以使用的模式。如果我们想用普遍同位模式集的子集来总结整个模式集,随着子集中模式数量的增加,子集中的模式总是对原始普遍模式集的最佳总结。这是np困难问题。在本文中,我们考虑了一个普遍的共定位模式集的排序问题,使得排序的每个前缀给出了该集合的尽可能好的摘要。根据空间数据的特点,定义了参与指标函数的估计和普遍存在的同位模式损失函数来表述该问题,并设计了具有近似质量的贪心算法。
{"title":"Spatial co-location pattern ordering","authors":"Gongsheng Yuan, Lizhen Wang, Peizhong Yang, Lan Chen","doi":"10.1109/CITS.2016.7546423","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546423","url":null,"abstract":"Mining spatial co-location pattern is one of the most important researches in the field of spatial data mining. In the past researches, many spatial co-location pattern mining algorithms and the expansions about these algorithms have been proposed. However, some of these methods often produce a large number of patterns which are difficult to use. If we want to use the subset of the prevalent co-location pattern set to summarize the whole set and as the increase of the number of patterns in subset, the patterns in subset always are the best summary for the original prevalent set. This is a NP-hard problem. In this paper, we consider the problem of ordering a prevalent co-location pattern set so that each prefix of the ordering gives as good a summary of the set as possible. And according to the features of spatial data, we define an estimation of participation index function and a prevalent co-location pattern loss function to formulate this problem and design a greedy algorithm which gives an approximation quality.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128329339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A study on transient electromagnetic signal acquisition and processing for exploring hidden disaster-causing factors in coalmine 煤矿隐患探测瞬变电磁信号采集与处理研究
Bin Sun, Haiying Li
By general exploration there is one or more geologic abnormal areas within Fumei No. 1 Coalmine Industrial Square and Shaft, which will affect the mine shaft construction and safety production. However, traditional methods for hidden disaster-causing factors will not meet the exploration demands because of their defects. For example, direct current electric method, geological radar and even three-dimensional seismic prospecting can not simultaneously identify geologic abnormal areas of water-bearing condition both underground and in mid-deep zone. Therefore, to explore hidden disaster-causing factors more fully, this paper puts forward a signal acquisition and processing way based on transient electromagnetic method. On the principle of transient electromagnetic method, a system of transient electromagnetic signal acquisition is built and composed of transmitter unit and receiver unit. By triggering start button, the system wirelessly triggers transmitter unit, i.e. one pulse magnetic field to the underground each time. 4ms later, two receiver coils simultaneously collect signals of the secondary pulsed magnetic field caused by underground medium. Finally the signal data are stored in CF card after RC filtering, operational amplifying, sample integral and analog-to-digital conversion. From the signal data processing and analyzing results, there are hidden disaster-causing factors in the exploration zone: one collapse column, one coalmine goaf and one underground watercourse. Compared with the geological data of pilot holes of shaft, these three geologic abnormal places are confirmed, which powerfully helps prove the reliability and efficiency of this method of signal acquisition and processing. These relevant exploration data can not only provide geologic basis for construction of industrial square buildings and structures, but also supply design and construction of shafts with instructions, and furthermore, serve as data reference for exploration of hidden disaster-causing factors in more complicated geological conditions areas.
经综合勘查,富美一矿工业广场及竖井内存在一个或多个地质异常区,影响矿井建设和安全生产。然而,传统的灾害隐患分析方法由于存在缺陷,已不能满足勘探需求。例如,直流电法、地质雷达甚至三维地震勘探都无法同时识别地下和中深层含水地质异常区。因此,为了更充分地挖掘潜在的灾害因素,本文提出了一种基于瞬变电磁法的信号采集与处理方法。根据瞬变电磁法原理,建立了由发射单元和接收单元组成的瞬变电磁信号采集系统。系统通过触发启动按钮,无线触发发射单元,即每次向地下发射一个脉冲磁场。4ms后,两个接收线圈同时采集地下介质产生的二次脉冲磁场信号。最后信号数据经过RC滤波、运算放大、采样积分、模数转换后存储到CF卡中。从信号数据处理和分析结果来看,探区存在一个陷落柱、一个煤矿采空区和一个地下水道的隐伏致灾因素。通过与竖井导孔地质资料的对比,确定了这三个地质异常点,有力地证明了该信号采集处理方法的可靠性和有效性。这些相关勘探资料不仅可以为工业广场建筑和构造物的施工提供地质依据,还可以为竖井的设计和施工提供指导,还可以为地质条件更复杂地区的隐伏致灾因素的勘探提供数据参考。
{"title":"A study on transient electromagnetic signal acquisition and processing for exploring hidden disaster-causing factors in coalmine","authors":"Bin Sun, Haiying Li","doi":"10.1109/CITS.2016.7546395","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546395","url":null,"abstract":"By general exploration there is one or more geologic abnormal areas within Fumei No. 1 Coalmine Industrial Square and Shaft, which will affect the mine shaft construction and safety production. However, traditional methods for hidden disaster-causing factors will not meet the exploration demands because of their defects. For example, direct current electric method, geological radar and even three-dimensional seismic prospecting can not simultaneously identify geologic abnormal areas of water-bearing condition both underground and in mid-deep zone. Therefore, to explore hidden disaster-causing factors more fully, this paper puts forward a signal acquisition and processing way based on transient electromagnetic method. On the principle of transient electromagnetic method, a system of transient electromagnetic signal acquisition is built and composed of transmitter unit and receiver unit. By triggering start button, the system wirelessly triggers transmitter unit, i.e. one pulse magnetic field to the underground each time. 4ms later, two receiver coils simultaneously collect signals of the secondary pulsed magnetic field caused by underground medium. Finally the signal data are stored in CF card after RC filtering, operational amplifying, sample integral and analog-to-digital conversion. From the signal data processing and analyzing results, there are hidden disaster-causing factors in the exploration zone: one collapse column, one coalmine goaf and one underground watercourse. Compared with the geological data of pilot holes of shaft, these three geologic abnormal places are confirmed, which powerfully helps prove the reliability and efficiency of this method of signal acquisition and processing. These relevant exploration data can not only provide geologic basis for construction of industrial square buildings and structures, but also supply design and construction of shafts with instructions, and furthermore, serve as data reference for exploration of hidden disaster-causing factors in more complicated geological conditions areas.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133843362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 International Conference on Computer, Information and Telecommunication Systems (CITS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1