首页 > 最新文献

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

英文 中文
Fault-Tolerant Algorithm for Distributed Primary Detection in Cognitive Radio Networks 认知无线网络中分布式主检测的容错算法
H. Qin, Youfu Du, Jun Su
This paper attempts to identify the reliability of detection of licensed primary transmission based on cooperative sensing in cognitive radio networks. With a parallel fusion network model, the correlation issue of the received signals between the nodes in the worst case is derived. Leveraging the property of false sensing data due to malfunctioning or malicious software, the optimizing strategy, namely Fault-Tolerant algorithm for Distributed Detection (FTDD) is proposed, and quantitative analysis of false alarm reliability and detection probability under the scheme is presented. In particular, the tradeoff between licensed transmissions and user cooperation among nodes is discussed. Simulation experiments are also used to evaluate the fusion performance under practical settings. The model and analytic results provide useful tools for reliability analysis for other wireless decentralization-based applications (e.g., those involving robust spectrum sensing).
本文试图在认知无线网络中,确定基于协同感知的许可主传输检测的可靠性。利用并行融合网络模型,推导了最坏情况下节点间接收信号的相关问题。利用由于故障或恶意软件导致的误感数据的特性,提出了一种优化策略,即分布式检测容错算法(FTDD),并对该方案下的虚警可靠性和检测概率进行了定量分析。特别地,讨论了许可传输和节点间用户合作之间的权衡。通过仿真实验对实际环境下的融合性能进行了评价。该模型和分析结果为其他基于无线分散的应用(例如,涉及鲁棒频谱传感的应用)的可靠性分析提供了有用的工具。
{"title":"Fault-Tolerant Algorithm for Distributed Primary Detection in Cognitive Radio Networks","authors":"H. Qin, Youfu Du, Jun Su","doi":"10.1109/NSWCTC.2009.149","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.149","url":null,"abstract":"This paper attempts to identify the reliability of detection of licensed primary transmission based on cooperative sensing in cognitive radio networks. With a parallel fusion network model, the correlation issue of the received signals between the nodes in the worst case is derived. Leveraging the property of false sensing data due to malfunctioning or malicious software, the optimizing strategy, namely Fault-Tolerant algorithm for Distributed Detection (FTDD) is proposed, and quantitative analysis of false alarm reliability and detection probability under the scheme is presented. In particular, the tradeoff between licensed transmissions and user cooperation among nodes is discussed. Simulation experiments are also used to evaluate the fusion performance under practical settings. The model and analytic results provide useful tools for reliability analysis for other wireless decentralization-based applications (e.g., those involving robust spectrum sensing).","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115336873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on Mine Equipment Systems Combined with a Reliability Assessment Model 结合可靠性评估模型的矿山设备系统研究
Dai Jingxia
This thesis discusses a methodology involving the merging of a reliability assessment model based on genetic algorithms with simulation. The purpose of the simulation study in this thesis is to assess the impact of equipment failures to mine'production throughput. Two simulation models are developed using different simulation tools. The end results demonstrate a successful application of the methodology to study the impact of equipment failure on a mine’pruduction. There is potential for future research involving methodology developed in this thesis. Logically,the next undertaking would be to incorporate failure patterns for all equipment. A second future direction is to incorporate other predictive models into the methodology and study and compare the results with the genetic algorithm model presented in this thesis
本文讨论了一种基于遗传算法的可靠性评估模型与仿真相结合的方法。本文模拟研究的目的是评估设备故障对矿山生产能力的影响。利用不同的仿真工具建立了两个仿真模型。最终结果表明,该方法成功地应用于研究设备故障对矿山生产的影响。未来的研究有可能涉及本论文开发的方法。从逻辑上讲,下一个任务将是合并所有设备的故障模式。未来的第二个方向是将其他预测模型纳入该方法,并将结果与本文提出的遗传算法模型进行研究和比较
{"title":"Study on Mine Equipment Systems Combined with a Reliability Assessment Model","authors":"Dai Jingxia","doi":"10.1109/NSWCTC.2009.68","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.68","url":null,"abstract":"This thesis discusses a methodology involving the merging of a reliability assessment model based on genetic algorithms with simulation. The purpose of the simulation study in this thesis is to assess the impact of equipment failures to mine'production throughput. Two simulation models are developed using different simulation tools. The end results demonstrate a successful application of the methodology to study the impact of equipment failure on a mine’pruduction. There is potential for future research involving methodology developed in this thesis. Logically,the next undertaking would be to incorporate failure patterns for all equipment. A second future direction is to incorporate other predictive models into the methodology and study and compare the results with the genetic algorithm model presented in this thesis","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116786693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MSR: A Novel MPLS-Like Secure Routing Protocol for Mobile Ad Hoc Networks MSR:一种新的移动自组织网络类mpls安全路由协议
Qiaolin Hu, Qingyuan Huang, Biao Han, Bao-kang Zhao, Jinshu Su
Protecting sensitive routing information is very fundamental and critical in mobile ad hoc networks (MANETs)that operates in hostile environments,  which  also  bring  great  challenges. Recent research have been focus on  secure  routing, however, most of them relies on cryptographic infrastructure, and which greatly limits their usage. To overcome these drawbacks, we propose MSR, a novel MPLS-like Secure Routing protocol for MANETs, Motivated by the MPLS techniques, MSR integrates the key agreement that doesn’t need the support of online trusted third party and label switching techniques into the secure routing and forwarding process. By establishing multiple label switching paths within the key agreement process, MSR is   resistant to  traf¿c  analysis attack, and provides the desirable identity and  relationship anonymity  through  multiple  pseudonyms and local label negotiation. We then  implement MSR in Glomosim and conduct  extensive  experiments. The detailed analysis and simulation results show that MSR protocol is very efficient and brings low overhead to the network.
在恶劣环境下运行的移动自组网(manet)中,敏感路由信息的保护是非常基础和关键的,这也带来了巨大的挑战。最近的研究主要集中在安全路由上,然而,它们大多依赖于加密基础设施,这极大地限制了它们的使用。为了克服这些缺点,我们提出了一种新的类似MPLS的manet安全路由协议MSR,在MPLS技术的推动下,MSR将不需要在线可信第三方支持的密钥协议和标签交换技术集成到安全路由和转发过程中。通过在密钥协议过程中建立多条标签交换路径,MSR可以抵抗流量分析攻击,并通过多个假名和本地标签协商提供理想的身份和关系匿名性。然后,我们在Glomosim中实现了MSR并进行了广泛的实验。详细的分析和仿真结果表明,MSR协议效率高,网络开销小。
{"title":"MSR: A Novel MPLS-Like Secure Routing Protocol for Mobile Ad Hoc Networks","authors":"Qiaolin Hu, Qingyuan Huang, Biao Han, Bao-kang Zhao, Jinshu Su","doi":"10.1109/NSWCTC.2009.369","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.369","url":null,"abstract":"Protecting sensitive routing information is very fundamental and critical in mobile ad hoc networks (MANETs)that operates in hostile environments,  which  also  bring  great  challenges. Recent research have been focus on  secure  routing, however, most of them relies on cryptographic infrastructure, and which greatly limits their usage. To overcome these drawbacks, we propose MSR, a novel MPLS-like Secure Routing protocol for MANETs, Motivated by the MPLS techniques, MSR integrates the key agreement that doesn’t need the support of online trusted third party and label switching techniques into the secure routing and forwarding process. By establishing multiple label switching paths within the key agreement process, MSR is   resistant to  traf¿c  analysis attack, and provides the desirable identity and  relationship anonymity  through  multiple  pseudonyms and local label negotiation. We then  implement MSR in Glomosim and conduct  extensive  experiments. The detailed analysis and simulation results show that MSR protocol is very efficient and brings low overhead to the network.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121053705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Timesaving Recursive Flow Packet Classification Algorithm 一种省时的递归流包分类算法
Yuke Pan, Bing Chen, Tao Xu
Packet classification, which classifies the incoming packets according to their head information, is an important technique for the next-generation routers, firewalls and so on. Recursive flow classification algorithm is one of the fastest software packet classification algorithms, but its initialization time is too long, so a timesaving recursive flow classification algorithm is proposed. In phase 0, equivalence classes are defined by the set of filters matched in processing the packet. A more effective method for finding every entry’s equivalence class is given. In phase 1, in order to combine the results for different chunks together, cross-producting tables are used to store precomputed results and a faster method of merging two chunks is given. Its initialization time is greatly reduced because of heuristic learning while its classification phase retaining the same time complexity with RFC. The experimental results show that the total time has an average decrease of 40%.
分组分类是根据报文的头部信息对进入的报文进行分类,是下一代路由器、防火墙等的重要技术。递归流分类算法是目前最快的软件包分类算法之一,但其初始化时间过长,因此提出了一种节省时间的递归流分类算法。在阶段0中,等价类由处理数据包时匹配的一组过滤器定义。给出了一种更有效的求每个条目等价类的方法。在阶段1中,为了将不同块的结果合并在一起,使用交叉生成表存储预计算结果,并给出了一种更快的合并两个块的方法。由于启发式学习,其初始化时间大大缩短,而分类阶段与RFC保持相同的时间复杂度。实验结果表明,总时间平均减少了40%。
{"title":"A Timesaving Recursive Flow Packet Classification Algorithm","authors":"Yuke Pan, Bing Chen, Tao Xu","doi":"10.1109/NSWCTC.2009.245","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.245","url":null,"abstract":"Packet classification, which classifies the incoming packets according to their head information, is an important technique for the next-generation routers, firewalls and so on. Recursive flow classification algorithm is one of the fastest software packet classification algorithms, but its initialization time is too long, so a timesaving recursive flow classification algorithm is proposed. In phase 0, equivalence classes are defined by the set of filters matched in processing the packet. A more effective method for finding every entry’s equivalence class is given. In phase 1, in order to combine the results for different chunks together, cross-producting tables are used to store precomputed results and a faster method of merging two chunks is given. Its initialization time is greatly reduced because of heuristic learning while its classification phase retaining the same time complexity with RFC. The experimental results show that the total time has an average decrease of 40%.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124854789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Low-Complexity Weight Based Power Allocation Scheme for Distributed OSTBC System 一种基于权重的分布式OSTBC系统低复杂度功率分配方案
Xingzai Lv, Jinkang Zhu
Distributed wireless communication system has been considered as a promising architecture for future wireless communication networks. This paper aims to characterize the power allocation scheme for orthogonal space time block coding in DWCS. Firstly, an optimal method is investigated, which minimizes the upper bound of the ergodic pair-wise symbol error rate, and it is proved to be equivalent to water¿lling based on the knowledge of large-scale fading. In order to reduce the complexity, a low-complexity power allocation method is proposed through approximating the optimization problem. This method assigns a power allocation weight to each distributed base station, and then allocates the power to base stations proportional to these weights. Numerical results show that the performance of this low-complexity algorithm holds close performance with the water¿lling method in most situations.
分布式无线通信系统被认为是未来无线通信网络的一种很有前途的体系结构。研究了DWCS中正交空时分组编码的功率分配方案。首先,研究了一种使遍历对符号错误率上界最小的最优方法,并基于大规模衰落的知识,证明了该方法等价于注水。为了降低复杂度,通过逼近优化问题,提出了一种低复杂度的功率分配方法。该方法为每个分布式基站分配一个功率分配权值,然后将功率按这些权值的比例分配给基站。数值结果表明,在大多数情况下,这种低复杂度算法的性能与注水方法接近。
{"title":"A Novel Low-Complexity Weight Based Power Allocation Scheme for Distributed OSTBC System","authors":"Xingzai Lv, Jinkang Zhu","doi":"10.1109/NSWCTC.2009.83","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.83","url":null,"abstract":"Distributed wireless communication system has been considered as a promising architecture for future wireless communication networks. This paper aims to characterize the power allocation scheme for orthogonal space time block coding in DWCS. Firstly, an optimal method is investigated, which minimizes the upper bound of the ergodic pair-wise symbol error rate, and it is proved to be equivalent to water¿lling based on the knowledge of large-scale fading. In order to reduce the complexity, a low-complexity power allocation method is proposed through approximating the optimization problem. This method assigns a power allocation weight to each distributed base station, and then allocates the power to base stations proportional to these weights. Numerical results show that the performance of this low-complexity algorithm holds close performance with the water¿lling method in most situations.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123423554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cheating Resistance for Secret Sharing 秘密共享的欺骗抵抗
Chao-Wen Chan, Chinchen Chang, Zhi-Hui Wang
In this paper we propose a notion, the (t, n)-threshold agreement certificate. The (t, n)-threshold agreement certificates of a secret are also shadows derived from the original secret using a different access structure. Based on these certificates, we present a (t, n)-threshold secret sharing scheme which can resist participants’ cheating. That is, any participant’s cheating would not work in the proposed scheme provided that the assumptions in the paper are true. This electronic document is a “live” template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document.
本文提出了(t, n)阈值协议证书的概念。秘密的(t, n)阈值协议证书也是使用不同的访问结构从原始秘密派生出来的影子。基于这些证书,我们提出了一种(t, n)阈值秘密共享方案,该方案可以抵抗参与者的欺骗行为。也就是说,只要论文中的假设是正确的,任何参与者的作弊行为都不会在提议的方案中起作用。这个电子文档是一个“实时”模板。论文的各个组成部分[标题,正文,标题等]已经在样式表中定义,如本文档中给出的部分所示。
{"title":"Cheating Resistance for Secret Sharing","authors":"Chao-Wen Chan, Chinchen Chang, Zhi-Hui Wang","doi":"10.1109/NSWCTC.2009.390","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.390","url":null,"abstract":"In this paper we propose a notion, the (t, n)-threshold agreement certificate. The (t, n)-threshold agreement certificates of a secret are also shadows derived from the original secret using a different access structure. Based on these certificates, we present a (t, n)-threshold secret sharing scheme which can resist participants’ cheating. That is, any participant’s cheating would not work in the proposed scheme provided that the assumptions in the paper are true. This electronic document is a “live” template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123555367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design of CMOS Variable Gain Amplifier for DTV Tuners 数字电视调谐器用CMOS变增益放大器的设计
Shu‐Jenn Yu, Yunfei Ye
A CMOS variable gain amplifier (VGA) is designed, which is suitable for the turner of digital video broadcasting-cable(DVB-C). The amplifier is consists of exponential control circuit, amplifier circuit and common mode feedback circuit. The exponential circuit is presented by an approximate exponential function. The VGA is fabricated in 0.35um CMOS technology, and is simulated by Mentor’s circuit simulation tool Eldo. Simulation results show that the VGA core consumes 4.63mW at 3.3V supply voltage and has a gain range from 0 to 32dB. The frequency range is 46MHz~267MHz and noise figure is less than 10dB.
设计了一种适用于数字视频广播电缆(DVB-C)转发器的CMOS可变增益放大器(VGA)。该放大器由指数控制电路、放大电路和共模反馈电路组成。指数电路用近似指数函数表示。VGA采用0.35um CMOS技术制造,并通过Mentor的电路仿真工具Eldo进行仿真。仿真结果表明,在3.3V供电电压下,VGA核心功耗为4.63mW,增益范围为0 ~ 32dB。频率范围为46MHz~267MHz,噪声系数小于10dB。
{"title":"Design of CMOS Variable Gain Amplifier for DTV Tuners","authors":"Shu‐Jenn Yu, Yunfei Ye","doi":"10.1109/NSWCTC.2009.234","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.234","url":null,"abstract":"A CMOS variable gain amplifier (VGA) is designed, which is suitable for the turner of digital video broadcasting-cable(DVB-C). The amplifier is consists of exponential control circuit, amplifier circuit and common mode feedback circuit. The exponential circuit is presented by an approximate exponential function. The VGA is fabricated in 0.35um CMOS technology, and is simulated by Mentor’s circuit simulation tool Eldo. Simulation results show that the VGA core consumes 4.63mW at 3.3V supply voltage and has a gain range from 0 to 32dB. The frequency range is 46MHz~267MHz and noise figure is less than 10dB.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125681749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Behaviors of Antenna Polarization for RSSI Location Identification RSSI位置识别中的天线极化行为
Xu Huang, Mark Barralet, D. Sharma
Real-time position localization of moving objects in an indoor environment is an encouraging technology for realizing the vision of creating numerous novel location-aware services and applications in various market segments. An off the shelf development platform that uses Radio Signal Strength Indication (RSSI) based location tracking technique is studied. In this paper we investigate the affects of polarization on the accuracy of an indoor location tracking system. We present an approach to increase system accuracy based on this investigation. We established a model for determining range from RSSI and showed that the model fits our own experimental data. The model includes parameters used to account of environmental effects and we use the least squares method of determining the parameter values. Antenna polarization angle will affect RSSI and thus range accuracy. We empirically show that the model is still valid for polarization mismatch but with different environmental parameter values. A method based on semi-automated trail and error is proposed as a better method for selecting the environmental parameters. Using experimental data we show that if we adjust the model parameters to account for polarization angle then we can increase location accuracy. A practical solution for determining the polarization angle is with an accelerometer. The addition of an accelerometer could also be used to increase the battery life of the node.
室内环境中移动物体的实时位置定位是一种令人鼓舞的技术,可以实现在各种细分市场中创建许多新颖的位置感知服务和应用的愿景。研究了一种基于无线电信号强度指示(RSSI)的位置跟踪技术的现成开发平台。本文研究了极化对室内定位跟踪系统精度的影响。在此基础上提出了一种提高系统精度的方法。我们建立了一个由RSSI确定量程的模型,并证明该模型与我们自己的实验数据吻合。该模型包括用于考虑环境影响的参数,我们使用最小二乘法确定参数值。天线极化角度会影响RSSI,从而影响距离精度。我们的经验表明,该模型在不同环境参数值下仍然适用于极化失配。提出了一种基于半自动化跟踪误差的环境参数选择方法。实验数据表明,通过调整模型参数来考虑偏振角,可以提高定位精度。确定偏振角的一种实用方法是使用加速度计。增加一个加速度计也可以用来增加节点的电池寿命。
{"title":"Behaviors of Antenna Polarization for RSSI Location Identification","authors":"Xu Huang, Mark Barralet, D. Sharma","doi":"10.1109/NSWCTC.2009.49","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.49","url":null,"abstract":"Real-time position localization of moving objects in an indoor environment is an encouraging technology for realizing the vision of creating numerous novel location-aware services and applications in various market segments. An off the shelf development platform that uses Radio Signal Strength Indication (RSSI) based location tracking technique is studied. In this paper we investigate the affects of polarization on the accuracy of an indoor location tracking system. We present an approach to increase system accuracy based on this investigation. We established a model for determining range from RSSI and showed that the model fits our own experimental data. The model includes parameters used to account of environmental effects and we use the least squares method of determining the parameter values. Antenna polarization angle will affect RSSI and thus range accuracy. We empirically show that the model is still valid for polarization mismatch but with different environmental parameter values. A method based on semi-automated trail and error is proposed as a better method for selecting the environmental parameters. Using experimental data we show that if we adjust the model parameters to account for polarization angle then we can increase location accuracy. A practical solution for determining the polarization angle is with an accelerometer. The addition of an accelerometer could also be used to increase the battery life of the node.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116186641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Application of Bridge Function Sequences in Passive Beamformer 桥函数序列在无源波束形成器中的应用
Sheng Hong, Huagang Xiong, Kefei Liu, Qing Chang, Qishan Zhang, Yongqiang Liu, Xiaoxiang He, M. Tentzeris
This paper provides a new kind of passive beamformer which uses bridge function sequences as spreading sequence weights. The passive beamformer uses pseudorandom spreading sequence as weight of signal from each antenna element. Then it forms spatial radiation pattern by combining these signals. It can track and locate multiple objects’ positions simultaneously without the need of phase shifters and attenuators and any adaptive electronic beamsteering. And its antenna array can be any arbitrary geometry displacement. It can discriminate directions of arrival with as high angle resolution as 1.40 when there are 2000 elements in the antenna array.  We use bridge function sequences as its pseudorandom spreading sequence weights.  Owing to Bridge function sequences with better cross correlation characteristics, the passive beamformer gets better performance promotion than ones with Walsh function sequences as spreading sequences.
本文提出了一种利用桥函数序列作为扩频序列权值的新型无源波束形成器。无源波束形成器采用伪随机扩频序列作为各天线单元信号的权值。然后将这些信号组合形成空间辐射图。它可以同时跟踪和定位多个目标的位置,而不需要移相器和衰减器以及任何自适应电子波束导向。它的天线阵列可以是任意几何位移。当天线阵中有2000个单元时,它能以1.40的高角度分辨到达方向。我们使用桥函数序列作为其伪随机扩展序列权值。由于桥函数序列具有较好的互相关特性,使得无源波束形成器比以沃尔什函数序列作为扩频序列的波束形成器有更好的性能提升。
{"title":"Application of Bridge Function Sequences in Passive Beamformer","authors":"Sheng Hong, Huagang Xiong, Kefei Liu, Qing Chang, Qishan Zhang, Yongqiang Liu, Xiaoxiang He, M. Tentzeris","doi":"10.1109/NSWCTC.2009.24","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.24","url":null,"abstract":"This paper provides a new kind of passive beamformer which uses bridge function sequences as spreading sequence weights. The passive beamformer uses pseudorandom spreading sequence as weight of signal from each antenna element. Then it forms spatial radiation pattern by combining these signals. It can track and locate multiple objects’ positions simultaneously without the need of phase shifters and attenuators and any adaptive electronic beamsteering. And its antenna array can be any arbitrary geometry displacement. It can discriminate directions of arrival with as high angle resolution as 1.40 when there are 2000 elements in the antenna array.  We use bridge function sequences as its pseudorandom spreading sequence weights.  Owing to Bridge function sequences with better cross correlation characteristics, the passive beamformer gets better performance promotion than ones with Walsh function sequences as spreading sequences.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116487380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Intrusion Detection Method Based on High Speed and Precise Genetic Algorithm Neural Network 基于高速精确遗传算法神经网络的网络入侵检测方法
Jingwen Tian, Meijuan Gao
Aimed at the network intrusion behaviors are characterized with uncertainty, complexity, diversity and dynamic tendency and the advantages of neural network, an intrusion detection method based on high speed and precise genetic algorithm neural network is presented in this paper. The high speed and precise genetic algorithm neural network is combined the adaptive and floating-point code genetic algorithm with BP network which has higher accuracy and faster convergence speed. We construct the network structure, and give the algorithm flow. We discussed and analyzed the impact factor of intrusion behaviors. With the ability of strong self-learning and faster convergence of high speed and precise genetic algorithm neural network, the network intrusion detection method can detect various intrusion behaviors rapidly and effectively by learning the typical intrusion characteristic information. The experimental result shows that this intrusion detection method is feasible and effective.
针对网络入侵行为具有不确定性、复杂性、多样性和动态倾向性等特点,结合神经网络的优势,提出了一种基于高速、精确的遗传算法神经网络的入侵检测方法。高速精密遗传算法神经网络将自适应浮点码遗传算法与BP网络相结合,具有更高的精度和更快的收敛速度。构造了网络结构,给出了算法流程。对入侵行为的影响因素进行了讨论和分析。网络入侵检测方法利用高速精确遗传算法神经网络强大的自学习能力和更快的收敛速度,通过学习典型的入侵特征信息,能够快速有效地检测出各种入侵行为。实验结果表明,该入侵检测方法是可行和有效的。
{"title":"Network Intrusion Detection Method Based on High Speed and Precise Genetic Algorithm Neural Network","authors":"Jingwen Tian, Meijuan Gao","doi":"10.1109/NSWCTC.2009.228","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.228","url":null,"abstract":"Aimed at the network intrusion behaviors are characterized with uncertainty, complexity, diversity and dynamic tendency and the advantages of neural network, an intrusion detection method based on high speed and precise genetic algorithm neural network is presented in this paper. The high speed and precise genetic algorithm neural network is combined the adaptive and floating-point code genetic algorithm with BP network which has higher accuracy and faster convergence speed. We construct the network structure, and give the algorithm flow. We discussed and analyzed the impact factor of intrusion behaviors. With the ability of strong self-learning and faster convergence of high speed and precise genetic algorithm neural network, the network intrusion detection method can detect various intrusion behaviors rapidly and effectively by learning the typical intrusion characteristic information. The experimental result shows that this intrusion detection method is feasible and effective.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122410977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1