This paper studies load balancing for multi-path Internet routing. We focus on traffic splitting algorithm based on dual hash table and counters called DHTC that work on the flow level to avoid packet reordering. The algorithm perform load balancing in the flow mapping manner at the variable length packet level. We show that the algorithm is practice and should be take into account for the application of load balancing in practice.
{"title":"A Traffic Splitting Algorithm Based on Dual Hash Table for Multi-path Internet Routing","authors":"Youjun Bu, Hong Guo, Hong-chao Hu, Binqiang Wang","doi":"10.1109/MVHI.2010.20","DOIUrl":"https://doi.org/10.1109/MVHI.2010.20","url":null,"abstract":"This paper studies load balancing for multi-path Internet routing. We focus on traffic splitting algorithm based on dual hash table and counters called DHTC that work on the flow level to avoid packet reordering. The algorithm perform load balancing in the flow mapping manner at the variable length packet level. We show that the algorithm is practice and should be take into account for the application of load balancing in practice.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84957065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haiwei Wu, Haiye Yu, Haoyu Yang, Lei Zhang, Keling Zhang, Huiyu Cui
A novel approach to achieve real-time protocol implementations is presented in this research. TWI, μC/OS-II, light sensor and our testing tools execute the protocol in the prediction and evaluation embedded systems of the light environment. The protocol is used by software simulation instead of TWI hardware. The method saves the hardware cost and brings the TWI protocol to a popular application. Furthermore this method is valid by validation test.
{"title":"Communication Protocols Realization of the Prediction and Evaluation Light Environment Embedded Systems","authors":"Haiwei Wu, Haiye Yu, Haoyu Yang, Lei Zhang, Keling Zhang, Huiyu Cui","doi":"10.1109/MVHI.2010.103","DOIUrl":"https://doi.org/10.1109/MVHI.2010.103","url":null,"abstract":"A novel approach to achieve real-time protocol implementations is presented in this research. TWI, μC/OS-II, light sensor and our testing tools execute the protocol in the prediction and evaluation embedded systems of the light environment. The protocol is used by software simulation instead of TWI hardware. The method saves the hardware cost and brings the TWI protocol to a popular application. Furthermore this method is valid by validation test.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85864774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To enhance present fingerprint encryption/ decryption algorithm security, a novel fingerprint encryption/ decryption algorithm based on chaotic system and fractional Fourier transform is proposed in this paper. The fingerprint encryption process includes two steps: first the fingerprint is encrypted by employing Fractional Fourier domain double random phase, then the confusion fingerprint is encrypted by using confusion matrix which is generated by chaotic system, and finally the cipher fingerprint is obtained. The security of the proposed algorithm depends on the sensitivity to the randomness of phase mask, the orders of FRFT and the initial conditions of chaotic system. Theoretical analysis and experimental results demonstrate that the algorithm is favorable.
{"title":"A Novel Fingerprint Encryption Algorithm Based on Chaotic System and Fractional Fourier Transform","authors":"Delong Cui","doi":"10.1109/MVHI.2010.38","DOIUrl":"https://doi.org/10.1109/MVHI.2010.38","url":null,"abstract":"To enhance present fingerprint encryption/ decryption algorithm security, a novel fingerprint encryption/ decryption algorithm based on chaotic system and fractional Fourier transform is proposed in this paper. The fingerprint encryption process includes two steps: first the fingerprint is encrypted by employing Fractional Fourier domain double random phase, then the confusion fingerprint is encrypted by using confusion matrix which is generated by chaotic system, and finally the cipher fingerprint is obtained. The security of the proposed algorithm depends on the sensitivity to the randomness of phase mask, the orders of FRFT and the initial conditions of chaotic system. Theoretical analysis and experimental results demonstrate that the algorithm is favorable.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85928234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The research recently focuses on the integration of peer-to-peer frame as incremental improvements to botnet. In hybrid P2P botnet, it is important to find a mechanism to select neighbor list for every super node, in order to improve stability of communication when some super nodes lose. At the same time, it needs to select high performance and nearest node as a super node, to provide command request and file transport for other ordinary nodes. In this paper, we propose a neighbor list selecting method based on Strongly Connected Graph and analysis a super node selecting mechanism based on AHP. Evaluation shows that this mechanism can increase coverage probability of commands and decrease average connection time (ACT) between super node and ordinary node.
{"title":"Research of an Innovative P2P-Based Botnet","authors":"Jian Gao, Yixian Yang, K. Zheng, Zhengming Hu","doi":"10.1109/MVHI.2010.135","DOIUrl":"https://doi.org/10.1109/MVHI.2010.135","url":null,"abstract":"The research recently focuses on the integration of peer-to-peer frame as incremental improvements to botnet. In hybrid P2P botnet, it is important to find a mechanism to select neighbor list for every super node, in order to improve stability of communication when some super nodes lose. At the same time, it needs to select high performance and nearest node as a super node, to provide command request and file transport for other ordinary nodes. In this paper, we propose a neighbor list selecting method based on Strongly Connected Graph and analysis a super node selecting mechanism based on AHP. Evaluation shows that this mechanism can increase coverage probability of commands and decrease average connection time (ACT) between super node and ordinary node.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85995305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To solve the flow pattern identification more difficult problem in electrical capacitance tomography (ECT)technology, a novel principal component analysis flow pattern identification algorithm for neural network is presented. Based on the introduction of the basic principles of feature selection and feature extraction for principal component analysis, Construction of Symmetric subspace model based on principal component analysis neural network, and the convergence of Symmetric subspace algorithm is analyzed. The feasibility of using this algorithm for ECT is also discussed. Algorithm to meet the convergence conditions and to simplify the complex pre-processing steps, greatly reducing the computational complexity, improve the speed of the identification. Experimental results indicate that the algorithm can obtain a higher recognition rate compared with BP neural network recognition algorithm and this new algorithm presents a feasible and effective way to research on flow pattern identification algorithm of electrical capacitance tomography.
{"title":"A Novel Principal Component Analysis Flow Pattern Identification Algorithm for Electrical Capacitance Tomography System","authors":"Yu Chen, Yuchen Song, Jian Zhang","doi":"10.1109/MVHI.2010.141","DOIUrl":"https://doi.org/10.1109/MVHI.2010.141","url":null,"abstract":"To solve the flow pattern identification more difficult problem in electrical capacitance tomography (ECT)technology, a novel principal component analysis flow pattern identification algorithm for neural network is presented. Based on the introduction of the basic principles of feature selection and feature extraction for principal component analysis, Construction of Symmetric subspace model based on principal component analysis neural network, and the convergence of Symmetric subspace algorithm is analyzed. The feasibility of using this algorithm for ECT is also discussed. Algorithm to meet the convergence conditions and to simplify the complex pre-processing steps, greatly reducing the computational complexity, improve the speed of the identification. Experimental results indicate that the algorithm can obtain a higher recognition rate compared with BP neural network recognition algorithm and this new algorithm presents a feasible and effective way to research on flow pattern identification algorithm of electrical capacitance tomography.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76838936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new watershed algorithm based on mathematical morphology is proposed and applied to cellular image segmentation. The improvement segmentation method of the watershed algorithm based on the marker introduce the idea of morphological reconstruction during the pretreatment, at the same time, use a relatively new method of coercing calibration of the minimum in the watershed transform. With the original method of simulation experiments, the method can be more accurate segmentation results. Compared with other tradition methods, requires fewer computations and simpler parameters and can more efficiently reduce the over-segmentation of the watershed algorithm.
{"title":"A New Watershed Algorithm for Cellular Image Segmentation Based on Mathematical Morphology","authors":"Wei-bin Chen, Xin Zhang","doi":"10.1109/MVHI.2010.55","DOIUrl":"https://doi.org/10.1109/MVHI.2010.55","url":null,"abstract":"A new watershed algorithm based on mathematical morphology is proposed and applied to cellular image segmentation. The improvement segmentation method of the watershed algorithm based on the marker introduce the idea of morphological reconstruction during the pretreatment, at the same time, use a relatively new method of coercing calibration of the minimum in the watershed transform. With the original method of simulation experiments, the method can be more accurate segmentation results. Compared with other tradition methods, requires fewer computations and simpler parameters and can more efficiently reduce the over-segmentation of the watershed algorithm.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77971825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Coal mine disaster has a serious threat to production and safety, mine safety prediction is an extremely challenging problem from many perspectives. This paper describes a generic fusion model for coal mine safety combining information from several physically different sensors aiming to the detection, monitoring and crisis management of such natural hazards. A conduct model base on least squares support vector machine (LSSVM) is proposed. Experimental results from the coal mine sensors are presented
{"title":"Prediction of Coal Mine Safety Level Based on LSSVM","authors":"Desheng Liu, Zhiru Xu, Wei Wang, Lei Wang","doi":"10.1109/MVHI.2010.71","DOIUrl":"https://doi.org/10.1109/MVHI.2010.71","url":null,"abstract":"Coal mine disaster has a serious threat to production and safety, mine safety prediction is an extremely challenging problem from many perspectives. This paper describes a generic fusion model for coal mine safety combining information from several physically different sensors aiming to the detection, monitoring and crisis management of such natural hazards. A conduct model base on least squares support vector machine (LSSVM) is proposed. Experimental results from the coal mine sensors are presented","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79910466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
DCF method has its unique problem when dealing in the risk evaluation circulated for cash-flow issues, and it also neglects the accurate assessment and value in changing different investment. In order to solve the high-risk evaluation for deferred allocation with supply chain finance, a binomial trees model of deferral option for pricing is uses to the valuation problem and solve to an uncertain environment. It is analyses the three key problems for VC investment on supply chain finance, when set up a binomial trees model of deferral option for pricing. The Results is that was tested in a real options and approach to the decision-making when investment to a maximize benefits for a high-risk evaluation, and this method is a practical analysis which provided a new solution for support to decision-makers.
{"title":"Benefits Distribution Model of High-Risk Projects Based on Deferral Options for Supply Chain Finance","authors":"Duan Weichang","doi":"10.1109/MVHI.2010.93","DOIUrl":"https://doi.org/10.1109/MVHI.2010.93","url":null,"abstract":"DCF method has its unique problem when dealing in the risk evaluation circulated for cash-flow issues, and it also neglects the accurate assessment and value in changing different investment. In order to solve the high-risk evaluation for deferred allocation with supply chain finance, a binomial trees model of deferral option for pricing is uses to the valuation problem and solve to an uncertain environment. It is analyses the three key problems for VC investment on supply chain finance, when set up a binomial trees model of deferral option for pricing. The Results is that was tested in a real options and approach to the decision-making when investment to a maximize benefits for a high-risk evaluation, and this method is a practical analysis which provided a new solution for support to decision-makers.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76795520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yimin Hou, Tao Liu, Xiangmin Lun, Jianjun Lan, Yang Cui
The paper proposed a monitoring system for the circuit breakers in the substation based on the Back Propagation Neural Networks(BPNN). The novel temperature and humidity sensor was used in the system to get temperature and humidity value in the breakers. The carbon resistor displacement sensor was employed to get the displacement data of the contact in the closing or breaking procedure. All the data was transferred into the BPNN to obtain the remainder service life of the breakers set and give an alarm for the malfunction. In the experiments, the parameters were measured and the results showed that the system in this paper was efficient.
{"title":"Research on Monitoring System of Circuit Breakers Based on Neural Networks","authors":"Yimin Hou, Tao Liu, Xiangmin Lun, Jianjun Lan, Yang Cui","doi":"10.1109/MVHI.2010.194","DOIUrl":"https://doi.org/10.1109/MVHI.2010.194","url":null,"abstract":"The paper proposed a monitoring system for the circuit breakers in the substation based on the Back Propagation Neural Networks(BPNN). The novel temperature and humidity sensor was used in the system to get temperature and humidity value in the breakers. The carbon resistor displacement sensor was employed to get the displacement data of the contact in the closing or breaking procedure. All the data was transferred into the BPNN to obtain the remainder service life of the breakers set and give an alarm for the malfunction. In the experiments, the parameters were measured and the results showed that the system in this paper was efficient.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87129354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongkui Yu, Yanping Yang, Yuxiang Li, Jianfeng Wang
The paper has analyzed to the current situation of the domestic and international report form tool, have pointed out systematic existing problem and deficiency of the report form now at first. Then to the relevant knowledge of the report form, the key technology that the report form tool involves, XML technology, dynamic SQL technology, database technology, etc. have been analyzed and introduced. Finally, how this text has recommended using the technology and report form technology to combine together and make the system be realized synthetically.
{"title":"Research and Design of General Report Form System","authors":"Hongkui Yu, Yanping Yang, Yuxiang Li, Jianfeng Wang","doi":"10.1109/MVHI.2010.51","DOIUrl":"https://doi.org/10.1109/MVHI.2010.51","url":null,"abstract":"The paper has analyzed to the current situation of the domestic and international report form tool, have pointed out systematic existing problem and deficiency of the report form now at first. Then to the relevant knowledge of the report form, the key technology that the report form tool involves, XML technology, dynamic SQL technology, database technology, etc. have been analyzed and introduced. Finally, how this text has recommended using the technology and report form technology to combine together and make the system be realized synthetically.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80654253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}