Shaodong Feng, Jia-fu He, Yongqiang Li, Guangxia Li
Modeling and simulation is a very powerful tool for the traffic analysis and performance evaluation in communication networks. LEO (low earth orbit) satellite system is so complex and dynamic that it is very difficult to find a mathematical model to describe it. In this paper, a novel modeling and simulation method has been proposed for LEO satellite communication networks. Different from the traditional method focused on the packet generation, our model framework is “user oriented” with several layers which can reflect the behavior of users in the network. Layers offer services to the higher layer and require services from the layer below. Such a “user oriented” top-down manner has a great superiority in describing complex communication system. This approach is then demonstrated on modeling ISL traffic load in LEO satellite communication networks. By this way we get an estimation of the ISL traffic load for different number of users with various traffic characteristics. Furthermore this can be a very useful reference for system design.
{"title":"User Oriented Modeling and Simulation in LEO Satellite Networks","authors":"Shaodong Feng, Jia-fu He, Yongqiang Li, Guangxia Li","doi":"10.1109/NSWCTC.2009.260","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.260","url":null,"abstract":"Modeling and simulation is a very powerful tool for the traffic analysis and performance evaluation in communication networks. LEO (low earth orbit) satellite system is so complex and dynamic that it is very difficult to find a mathematical model to describe it. In this paper, a novel modeling and simulation method has been proposed for LEO satellite communication networks. Different from the traditional method focused on the packet generation, our model framework is “user oriented” with several layers which can reflect the behavior of users in the network. Layers offer services to the higher layer and require services from the layer below. Such a “user oriented” top-down manner has a great superiority in describing complex communication system. This approach is then demonstrated on modeling ISL traffic load in LEO satellite communication networks. By this way we get an estimation of the ISL traffic load for different number of users with various traffic characteristics. Furthermore this can be a very useful reference for system design.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132483919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As P2P applications and the amount of users continue to increase rapidly, the problems which the Internet faces, such as network congestion and the difficulty in ensuring Qos etc, become more and more serious. This paper design a model of Distributed Multi-Granularity P2P Traffic Identifying and Controlling in the light of large-scale and high-speed network environment, under the premise that it basically does not change the structure of network, not increase the special monitoring equipment and minimize the impact on the actual communication system, we resolve the entire network's P2P traffic identifying and controlling.
{"title":"Modeling Distributed Multi-Granularity P2P Traffic Identifying and Controlling System","authors":"Wang Jinsong, Wang Zhengxu, L. Tao, Liu Fan","doi":"10.1109/NSWCTC.2009.315","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.315","url":null,"abstract":"As P2P applications and the amount of users continue to increase rapidly, the problems which the Internet faces, such as network congestion and the difficulty in ensuring Qos etc, become more and more serious. This paper design a model of Distributed Multi-Granularity P2P Traffic Identifying and Controlling in the light of large-scale and high-speed network environment, under the premise that it basically does not change the structure of network, not increase the special monitoring equipment and minimize the impact on the actual communication system, we resolve the entire network's P2P traffic identifying and controlling.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134538071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless sensor network technology can provide optimal and integrated solution for distributed data collecting, delivering and analyzing in tough croplands environment. A wireless sensor network for cropland environmental monitoring is designed according to cropland application requirements. It consists of a set of sensor nodes for data sensing, a sink node for data aggregating and long-distance transmitting, and a base station for data storing and analyzing. In order to make sure of reliable communication performance, we have conducted radio propagation experiments in actual crop field. Antenna height is proven to be an important factor to propagation loss. Therefore, the lowest antenna height for cropland applications is discussed. Finally, we proposed regular patterns of sensor nodes deployment based on the communication range and the sampling range.
{"title":"A Wireless Sensor Network for Cropland Environmental Monitoring","authors":"Hui Liu, Zhijun Meng, Maohua Wang","doi":"10.1109/NSWCTC.2009.306","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.306","url":null,"abstract":"Wireless sensor network technology can provide optimal and integrated solution for distributed data collecting, delivering and analyzing in tough croplands environment. A wireless sensor network for cropland environmental monitoring is designed according to cropland application requirements. It consists of a set of sensor nodes for data sensing, a sink node for data aggregating and long-distance transmitting, and a base station for data storing and analyzing. In order to make sure of reliable communication performance, we have conducted radio propagation experiments in actual crop field. Antenna height is proven to be an important factor to propagation loss. Therefore, the lowest antenna height for cropland applications is discussed. Finally, we proposed regular patterns of sensor nodes deployment based on the communication range and the sampling range.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130695146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To deal with challenges and problems in trust measurement, we propose a dynamic behaviors measurement model based on Interactive Markov Chain (IMC). In this model, we use two different ways to obtain system runtime expectations of performance and functions. The one way is Temporal Probability of Executing Routes (TPER), which introduces the relationship between behavior sequences and time. The other is Steady-state Distribution of Executing Routes (SDER), which solves the problem of linear model that can not measure branch and concurrent system. Compared with traditional methods, the IMC-based model provides more powerful ability to measure runtime behaviors in complex and branch system.
{"title":"Dynamic Behavior Measurement Based on Interactive Markov Chain","authors":"Xing Zhang, Chen Li, Ruihua Li","doi":"10.1109/NSWCTC.2009.160","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.160","url":null,"abstract":"To deal with challenges and problems in trust measurement, we propose a dynamic behaviors measurement model based on Interactive Markov Chain (IMC). In this model, we use two different ways to obtain system runtime expectations of performance and functions. The one way is Temporal Probability of Executing Routes (TPER), which introduces the relationship between behavior sequences and time. The other is Steady-state Distribution of Executing Routes (SDER), which solves the problem of linear model that can not measure branch and concurrent system. Compared with traditional methods, the IMC-based model provides more powerful ability to measure runtime behaviors in complex and branch system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133255625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
On the basis of making full use of the computer technology, the Markov chain and the index system of the student's quality of sports, this article carries out a fuzzy evaluation to the quality of physical education and proves its feasibility with the examples. Nowadays, when the information technology, computer technology has been widely used in physical education, this kind of appraisal attempt has the positive practical significance
{"title":"A Fuzzy Comprehensive Appraisement Model Based on Markov Chain of Teaching Quality Evaluation on Physical Education","authors":"Liu Min-hang, Fu Yu-kun","doi":"10.1109/NSWCTC.2009.327","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.327","url":null,"abstract":"On the basis of making full use of the computer technology, the Markov chain and the index system of the student's quality of sports, this article carries out a fuzzy evaluation to the quality of physical education and proves its feasibility with the examples. Nowadays, when the information technology, computer technology has been widely used in physical education, this kind of appraisal attempt has the positive practical significance","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128884207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Service classification is becoming a central issue because of the emergence of new services (P2P, VoIP, Streaming video, etc.) which raises new challenges in resource reservation, pricing, network monitoring, etc. In order to identify a specific signature to an application, we first of all model the sequence of its packets at the transport layer by means of a first order Markov chain. Then, we decide which service should be associated to any new sequence by means of standard decision techniques. The evaluation of this automatic recognition procedure using a monitor port on campus network switch demonstrates the feasibility and the excellent performance of this approach.
{"title":"Notice of Violation of IEEE Publication PrinciplesApplication of Markov Chain in IP Traffic Classification","authors":"Zhou Xusheng, Wang Zhiming","doi":"10.1109/NSWCTC.2009.151","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.151","url":null,"abstract":"Service classification is becoming a central issue because of the emergence of new services (P2P, VoIP, Streaming video, etc.) which raises new challenges in resource reservation, pricing, network monitoring, etc. In order to identify a specific signature to an application, we first of all model the sequence of its packets at the transport layer by means of a first order Markov chain. Then, we decide which service should be associated to any new sequence by means of standard decision techniques. The evaluation of this automatic recognition procedure using a monitor port on campus network switch demonstrates the feasibility and the excellent performance of this approach.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"21 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127613483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the binary text image’s characteristics of simple pixel, complex texture and bad immunity of information concealment, a digital watermarking embedment location choosing method based upon compatible roughness class has been put forward. This method divides binary text images into different equivalence classes. Equivalence classes are further divided into different subclasses according to each pixel’s degree and texture changes between blocks. Through properties’ combination, the embedment block and location which are fit for watermarking are screened out. At last, different binary text images are chosen for emulation experiment.
{"title":"An Effective Binary Image Watermarking Algorithm Based on Stochastic Tree Division","authors":"Chao-yang Zhang, Zhilua Hu","doi":"10.1109/NSWCTC.2009.344","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.344","url":null,"abstract":"Aiming at the binary text image’s characteristics of simple pixel, complex texture and bad immunity of information concealment, a digital watermarking embedment location choosing method based upon compatible roughness class has been put forward. This method divides binary text images into different equivalence classes. Equivalence classes are further divided into different subclasses according to each pixel’s degree and texture changes between blocks. Through properties’ combination, the embedment block and location which are fit for watermarking are screened out. At last, different binary text images are chosen for emulation experiment.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127826957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For the problem of temperature drift, inexact and great transmission loss of the monitoring of environment temperature and humidity under the mine, this paper proposes the temperature and humidity monitoring and optical fiber communication transmission system under the mine based on TMS320LF2812(DSP) by controlling the digital temperature sensor. The system adopts RS232 serial communication, uploads data by optical communication. Data are dealed with by host computer to improve the speed and capability of system .The actual test results show that the system can work stably ,the measuring accuracy of temperature and humidity is up to 0.1¿ and 1%RH. It can realize reliable data transmission.
{"title":"Research on Temperature and Humidity Monitoring under Mine Based on Optical Fiber Communication System","authors":"W. Xiaolei, Wu Bingxin, Fu Bangsheng, P. Sheng","doi":"10.1109/NSWCTC.2009.258","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.258","url":null,"abstract":"For the problem of temperature drift, inexact and great transmission loss of the monitoring of environment temperature and humidity under the mine, this paper proposes the temperature and humidity monitoring and optical fiber communication transmission system under the mine based on TMS320LF2812(DSP) by controlling the digital temperature sensor. The system adopts RS232 serial communication, uploads data by optical communication. Data are dealed with by host computer to improve the speed and capability of system .The actual test results show that the system can work stably ,the measuring accuracy of temperature and humidity is up to 0.1¿ and 1%RH. It can realize reliable data transmission.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"507 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131408061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Exactly assessing the security risk of a network is the key to improving the security level of the network. The Hidden Markov Model based real time network security risk quantification method can get the risk value dynamically and in real-time, whose input is Intrusion Detection System alerts. The method is better than the traditional static assessment method. The paper resolves main fault of this method, which improves its accuracy and simplifies the configuration by automatically working out matrixes in HMM. In an experimental study we demonstrate the usefulness of our techniques.
{"title":"Hidden Markov Model Based Real Time Network Security Quantification Method","authors":"Weiming Li, Zhengbiao Guo","doi":"10.1109/NSWCTC.2009.375","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.375","url":null,"abstract":"Exactly assessing the security risk of a network is the key to improving the security level of the network. The Hidden Markov Model based real time network security risk quantification method can get the risk value dynamically and in real-time, whose input is Intrusion Detection System alerts. The method is better than the traditional static assessment method. The paper resolves main fault of this method, which improves its accuracy and simplifies the configuration by automatically working out matrixes in HMM. In an experimental study we demonstrate the usefulness of our techniques.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115378808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Support vector machine has been widely used in the area of load forecasting, but there are still many disadvantages that are large processed data and slow processing speed etc when training data.. According to the disadvantages, this paper proposes a kind of forecasting method of SVM based on Boolean kernel function. In order to determine the super parameters which exert a direct influence on the ability of extension of SVM, the fixed step iteration method is presented, achieving the automatic selection of super parameters. The practical example shows that the system with BKF-SVM(Boolean Kernel Functions of SVM) method, comparing with the RBF-SVM method, when being applied to short-term load-forecasting has got higher prediction accuracy with such advantages as simple structure and good generalization performance without over-fitting phenomenon.
{"title":"Short-Term Load Forecasting Based on the BKF-SVM","authors":"Kebin Cui, Yingshuang Du","doi":"10.1109/NSWCTC.2009.170","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.170","url":null,"abstract":"Support vector machine has been widely used in the area of load forecasting, but there are still many disadvantages that are large processed data and slow processing speed etc when training data.. According to the disadvantages, this paper proposes a kind of forecasting method of SVM based on Boolean kernel function. In order to determine the super parameters which exert a direct influence on the ability of extension of SVM, the fixed step iteration method is presented, achieving the automatic selection of super parameters. The practical example shows that the system with BKF-SVM(Boolean Kernel Functions of SVM) method, comparing with the RBF-SVM method, when being applied to short-term load-forecasting has got higher prediction accuracy with such advantages as simple structure and good generalization performance without over-fitting phenomenon.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115424315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}