In this paper, two classes of stochastic optimization problems, which are expected value models and chance-constrained programming, are introduced. In order to solve the problems, the method of stochastic simulation is used to generate training samples for neural network, and then particle swarm optimization algorithm and neural network are integrated to produce a hybrid intelligent algorithm. Two numerical examples are provided to illustrate the effectiveness of the hybrid particle swarm optimization algorithm.
{"title":"Stochastic Optimization Problem through Particle Swarm Optimization Algorithm","authors":"Fangguo He, Wenlue Chen","doi":"10.1109/NSWCTC.2009.355","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.355","url":null,"abstract":"In this paper, two classes of stochastic optimization problems, which are expected value models and chance-constrained programming, are introduced. In order to solve the problems, the method of stochastic simulation is used to generate training samples for neural network, and then particle swarm optimization algorithm and neural network are integrated to produce a hybrid intelligent algorithm. Two numerical examples are provided to illustrate the effectiveness of the hybrid particle swarm optimization algorithm.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1801 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129644563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Smart antennas (SA) has not been applied widely in 3G except TD-SCDMA. As to the application of SA in CDMA system, we argued that people hold certain incorrect view, especial the reciprocity characteristic. Generally, people consider that only using a set of SA, we can simultaneously realize multiple CDMA channels directional transmission on a single carrier frequency with the same uplink & downlink SNR gain, and the transmitting beamforming can be realized by amplitude-weight transmitting baseband signal just like the receiving beamforming. For these views about the SA direction-transmission principle in CDMA system, we did careful analysis. We proved that these opinions mentioned above are incorrect. In order to take good use of smart antennas (SA) in the CDMA system, we also proposed a feasible carrier weight method.
{"title":"The Reciprocity Characteristic of Smart Antennas in CDMA System","authors":"Xiangdong Jia, Haibao Ding","doi":"10.1109/NSWCTC.2009.298","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.298","url":null,"abstract":"Smart antennas (SA) has not been applied widely in 3G except TD-SCDMA. As to the application of SA in CDMA system, we argued that people hold certain incorrect view, especial the reciprocity characteristic. Generally, people consider that only using a set of SA, we can simultaneously realize multiple CDMA channels directional transmission on a single carrier frequency with the same uplink & downlink SNR gain, and the transmitting beamforming can be realized by amplitude-weight transmitting baseband signal just like the receiving beamforming. For these views about the SA direction-transmission principle in CDMA system, we did careful analysis. We proved that these opinions mentioned above are incorrect. In order to take good use of smart antennas (SA) in the CDMA system, we also proposed a feasible carrier weight method.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129944303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we analyze wireless network and discuss the applications of wireless technology. In wireless network, the wireless devices should be able to operate independently of the broader Internet. In particular, there may be times during which the connection of a wireless device or network to the Internet is not available. During these times, wireless devices should be able to operate stably in modes disconnected from the rest of the infrastructure, as well as be able to opportunistically establish "local" ad-hoc networks using their own native protocols. This will require that devices are capable of discovering each other without the assistance of the broader network, as well as require that devices use local addressing and routing schemes.
{"title":"Wireless Network Technology and its Applications","authors":"Ning Zhang, Hong Bao","doi":"10.1109/NSWCTC.2009.255","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.255","url":null,"abstract":"In this paper we analyze wireless network and discuss the applications of wireless technology. In wireless network, the wireless devices should be able to operate independently of the broader Internet. In particular, there may be times during which the connection of a wireless device or network to the Internet is not available. During these times, wireless devices should be able to operate stably in modes disconnected from the rest of the infrastructure, as well as be able to opportunistically establish \"local\" ad-hoc networks using their own native protocols. This will require that devices are capable of discovering each other without the assistance of the broader network, as well as require that devices use local addressing and routing schemes.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130116848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on a realistic interference model and an effective framework for determining the optimum carrier sensing range. This paper investigates the changing rules of the optimum carrier sensing range of several types of wireless networks. Simulations are also performed using ns-2, and the results validate the effectiveness of the framework.
{"title":"Investigating the Optimum Carrier Sensing Range in Wireless Ad Hoc Networks","authors":"Chongqing Zhang, Qiang Xu","doi":"10.1109/NSWCTC.2009.349","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.349","url":null,"abstract":"Based on a realistic interference model and an effective framework for determining the optimum carrier sensing range. This paper investigates the changing rules of the optimum carrier sensing range of several types of wireless networks. Simulations are also performed using ns-2, and the results validate the effectiveness of the framework.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128905971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the application of wireless sensor networks (WSN), the balance of energy consumption plays an important role in extending the life cycle of WSN. Aim at energy consumption of Wireless sensors network, a dynamic cluster-based routing protocol based on the greedy algorithm (GDCRP). In the protocol, nodes run for the cluster head according to the energy and location. The elected cluster head has optimal value of energy and location. When the cluster is formed, the sink node initiates the request of routing establishment; the cluster heads choose the nodes that send it the packet as the upper nodes according to energy and hops count to the sink node. After a period of the network operating, then choose nodes according to the energy value and distance as the cluster head once again in order to avoid network failure because of one node failure. The protocol balances energy consumption of the network effectively, and extends the life cycle of the entire network.
{"title":"The Research on Routing Protocol of Sense Wireless Network Based on the Greedy Algorithm","authors":"Yuan Xin, Xu Guang-hua, Chen Xiao-jun","doi":"10.1109/NSWCTC.2009.159","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.159","url":null,"abstract":"In the application of wireless sensor networks (WSN), the balance of energy consumption plays an important role in extending the life cycle of WSN. Aim at energy consumption of Wireless sensors network, a dynamic cluster-based routing protocol based on the greedy algorithm (GDCRP). In the protocol, nodes run for the cluster head according to the energy and location. The elected cluster head has optimal value of energy and location. When the cluster is formed, the sink node initiates the request of routing establishment; the cluster heads choose the nodes that send it the packet as the upper nodes according to energy and hops count to the sink node. After a period of the network operating, then choose nodes according to the energy value and distance as the cluster head once again in order to avoid network failure because of one node failure. The protocol balances energy consumption of the network effectively, and extends the life cycle of the entire network.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130694108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qina Yong, Zhang Bang-ning, Guo Dao-sheng, Ye Zhan
The article provides a new design of P-code direct acquisition module based on segmented coherent accumulation at frequency domain. Firstly, realizable solution of acquisition system is given, and its principle is introduced. Subsequently, according to specific environment where navigation terminal works, probability of detection and average acquisition time of acquisition system are deduced. The conclusion is proved by simulation, and average acquisition time and probability of detection are analyzed in different condition. Research shows that the P-code direct acquisition module works effectively at low signal-to-noise rate in high dynamic environment.
{"title":"Research of P-code Direct Acquisition Technology","authors":"Qina Yong, Zhang Bang-ning, Guo Dao-sheng, Ye Zhan","doi":"10.1109/NSWCTC.2009.34","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.34","url":null,"abstract":"The article provides a new design of P-code direct acquisition module based on segmented coherent accumulation at frequency domain. Firstly, realizable solution of acquisition system is given, and its principle is introduced. Subsequently, according to specific environment where navigation terminal works, probability of detection and average acquisition time of acquisition system are deduced. The conclusion is proved by simulation, and average acquisition time and probability of detection are analyzed in different condition. Research shows that the P-code direct acquisition module works effectively at low signal-to-noise rate in high dynamic environment.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130735301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although trusted computing group proposed the concept of trusted remediation, the detailed implementations are not given, and also how to build isolated environment was not involved. A new trusted remediation model called TRNM was put forward. Also the implementations of the presented model were given. Moreover, the communication and authentication process of presented model were discussed. Simulations results show that by the proposed model, not only the safety and reliability of network can be ensured, but also the convenient and reliable remediation services are able to be provided to those terminals without according with the security policy of local network.
{"title":"Research on Remediation Model and Its Realization Based on Trusted Network","authors":"J. Zhang, Yanheng Liu, Jian Wang, Xiaomin Liu","doi":"10.1109/NSWCTC.2009.101","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.101","url":null,"abstract":"Although trusted computing group proposed the concept of trusted remediation, the detailed implementations are not given, and also how to build isolated environment was not involved. A new trusted remediation model called TRNM was put forward. Also the implementations of the presented model were given. Moreover, the communication and authentication process of presented model were discussed. Simulations results show that by the proposed model, not only the safety and reliability of network can be ensured, but also the convenient and reliable remediation services are able to be provided to those terminals without according with the security policy of local network.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130470276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper makes an analyzing and discussing of Breadth-first Search technology of both FCN and VCN in searching without information, and points out that, merits and demerits of two Numbers on searching without information. And then, it gives a novel realization method of Breadth-first Search in problem-solving which sometimes we should think simultaneously over the intelligent properties of VCN, and gives out an example of the problem-solving method, i.e. the problem-solving such as catching fish with casting a net or boy-herder picks peaches by climbing up a tree.
{"title":"A Novel Method of Breadth-first Searches with AI-Properties of VCN","authors":"Qiusun Ye","doi":"10.1109/NSWCTC.2009.121","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.121","url":null,"abstract":"This paper makes an analyzing and discussing of Breadth-first Search technology of both FCN and VCN in searching without information, and points out that, merits and demerits of two Numbers on searching without information. And then, it gives a novel realization method of Breadth-first Search in problem-solving which sometimes we should think simultaneously over the intelligent properties of VCN, and gives out an example of the problem-solving method, i.e. the problem-solving such as catching fish with casting a net or boy-herder picks peaches by climbing up a tree.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127820710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anomaly detection of privileged program behaviors is one of the most important means to ensure the system security. An alternative modeling method is proposed based on the BP neural network classifier, which builds upon the concept of the context dependency short sequences and the specially designed m-nearest algorithm. It is because that the neural network classifiers have the advantages of high generalization capability on unknown data, and the context dependency can more accurately determine the nature of local behaviors for the short sequences, behavior detection performance of program traces was evidently improved as compared with the previous modeling method.
{"title":"Detection of Programs Behaviors on Context Dependency","authors":"Pan Jianjing, Peng Xinguang","doi":"10.1109/NSWCTC.2009.143","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.143","url":null,"abstract":"Anomaly detection of privileged program behaviors is one of the most important means to ensure the system security. An alternative modeling method is proposed based on the BP neural network classifier, which builds upon the concept of the context dependency short sequences and the specially designed m-nearest algorithm. It is because that the neural network classifiers have the advantages of high generalization capability on unknown data, and the context dependency can more accurately determine the nature of local behaviors for the short sequences, behavior detection performance of program traces was evidently improved as compared with the previous modeling method.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127900745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
All attacks come from the successful utilization of the vulnerabilities of the telecommunication network or systems by the attackers. So it is the first important thing to clear the vulnerability of certain network or system. The theoretic methods are available to analyze the shortcomings of network topology and actions. Lots of vulnerabilities are found by practical work. This paper analyzes and summarizes the vulnerabilities of intelligent network system from realization application cases. It is valuable to the father research and development work.
{"title":"Vulnerability Analysis of Intelligent Network System","authors":"Danfeng Yan, Fangchun Yang","doi":"10.1109/NSWCTC.2009.27","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.27","url":null,"abstract":"All attacks come from the successful utilization of the vulnerabilities of the telecommunication network or systems by the attackers. So it is the first important thing to clear the vulnerability of certain network or system. The theoretic methods are available to analyze the shortcomings of network topology and actions. Lots of vulnerabilities are found by practical work. This paper analyzes and summarizes the vulnerabilities of intelligent network system from realization application cases. It is valuable to the father research and development work.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123262163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}