A 4-code code switching keying (CSK) modulation scheme was proposed. It can scramble the optical codes (OC) bit by bit to defeat the differential eavesdropping toward the upstream of the optical code division multiple...
详细信息
ISBN:
(纸本)9781479905614
A 4-code code switching keying (CSK) modulation scheme was proposed. It can scramble the optical codes (OC) bit by bit to defeat the differential eavesdropping toward the upstream of the optical code division multiple access (OCDMA) network. The transmission and security test results for the 4-code CSK-OCDMA system at a data rate of 2.5 Gb/s were presented in this paper. It verified that the CSK-OCDMA system can provide a security and error free transmission service in an access network. The proposed system has a simple framework, enhanced security and especially asynchronous transmission compared to other CSK-OCDMA systems against eavesdropping.
With development of computer and networktechnology, string matching are widely used in information retrieval, intrusion detection, network data analysis and other fields. String matching algorithms and experimental a...
详细信息
ISBN:
(纸本)9781479905614
With development of computer and networktechnology, string matching are widely used in information retrieval, intrusion detection, network data analysis and other fields. String matching algorithms and experimental analysis of previous studies are set in the pattern scale to tens of thousands of circumstances, for the large-scale pattern set algorithm was not conducted under the in-depth analysis. This paper studies the classic multi-pattern matching algorithm Wu-manber algorithm is proposed under large-scale pattern set algorithm based on Wu-manber three improved algorithms: hash based on the shortest length of the key algorithm, the value of pre-screening algorithm multi-hash, group comparison algorithm. Experiment results show that these improvements can enhance the capability and performance of classic Wu-Manber algorithm.
Nowadays the outcome of Cardiopulmonary Resusciation (CPR) is dismal. There has been some research showing that if lower extremity counterpulsation is applied during CPR, it might augment coronary perfusion pressure, ...
详细信息
ISBN:
(纸本)9781479905614
Nowadays the outcome of Cardiopulmonary Resusciation (CPR) is dismal. There has been some research showing that if lower extremity counterpulsation is applied during CPR, it might augment coronary perfusion pressure, which is the most important hemodynamic merit of CPR. But lower extremity counterpulsation has not been widely recognized and used during CPR yet. In this paper, a computer model was constructed to simulate hemodynamics of CPR. Based on this computer model and under two simple restrictions, computer simulated evolution was performed to get evolved waveforms for external pressures applied during CPR from randomly chosen waveforms. The results show that the pattern of lower extremity counterpulsation is embodied in the evolved waveforms, thus validating the use of lower extremity counterpulsation during CPR. Our simulation studies show that lower extremity counterpulsation might improve hemodynamics of CPR and deserves further research.
Effective e-Learning requiresstudents to be active, thus, creating an environment that engages the students is one of the challenges. One of the ways to build an engaging e-Learning environment is by applying gamifica...
详细信息
ISBN:
(纸本)9781479905614
Effective e-Learning requiresstudents to be active, thus, creating an environment that engages the students is one of the challenges. One of the ways to build an engaging e-Learning environment is by applying gamification concept. It improves user engagement by enrichingthe system withthe game design elements. This research aims to analyze the impact of gamification environment on e-Learning system by looking at student's quantitative interaction. 38 students from different high schoolswere voluntarily joined to test out two different system. This experiment focus on observing the impact of removing and adding gamification on the existing e-Learning system. The result shows that removing gamification causes significant decrement on student participation while adding gamification had no significant impact.
With the demand driven of Web-Based security and the privacy protection for sensitive information, the research on Fine-Grained mandatory access control for data resources in database is getting more attention. A Fine...
详细信息
ISBN:
(纸本)9781479905614
With the demand driven of Web-Based security and the privacy protection for sensitive information, the research on Fine-Grained mandatory access control for data resources in database is getting more attention. A Fine-Grained access control model with security label features (SL-FGAC) is proposed. The data resources are divided by granularity at least on column-level and record-level, where the record-level is discussed in particular. The allocation rules for security labels and constraints on permission and role assignments are argued. Finally the model is applied to an actual access control system, where the processes of classification approval, authorization and access control are discussed in detail, especially adding the limit note expressed as filter conditions for the access control on record-level resources.
Because of the complex structure of large-scale network, it is necessary to study a targeted monitoring method. This article describes the cloud monitoring system, which consists of a cloud monitoring platform and sev...
详细信息
ISBN:
(纸本)9781479905614
Because of the complex structure of large-scale network, it is necessary to study a targeted monitoring method. This article describes the cloud monitoring system, which consists of a cloud monitoring platform and several probes deployed in the network. For the selection of monitoring nodes, it must be weighed cost against coverage. In order to minimizing the number of probes, it developed a method of network monitoring and probe deployment which is based on ant colony optimization (ACO). This system provides three monitoring methods to meet the needs of different users, which also deploys the probes dynamically and adjusts position flexibly in the monitoring process. It tests and collects measured data on the global overlay test-bed PlanetLab.
An improved methodology of soft drink discrimination using an electronic nose is developed in this study. 4 kinds of soft drinks, namely Coca Cola, Pepsi Cola, Future Cola and Sprite are detected. 3 pattern recognitio...
详细信息
ISBN:
(纸本)9781479905614
An improved methodology of soft drink discrimination using an electronic nose is developed in this study. 4 kinds of soft drinks, namely Coca Cola, Pepsi Cola, Future Cola and Sprite are detected. 3 pattern recognition techniques, PCA (Principle Component Analysis), MDA (Mahalanobis Distances Analysis) and PNN (Probabilistic Neural network) are employed to verify the effectiveness of the 3 sampling procedures. The results indicated that, sampling by static headspace, 25 samples are misclassified in PNN analysis. The electronic nose cannot discriminate the 3 Colas due to the presence of humidity in the headspace, only Sprite can be discriminated from the Colas. With 21 samples are misclassified in PNN analysis, the EDU (Enrichment and Desorption Unit) cannot improve the results significantly. Sodium carbonate powder is very effective in adsorbing moisture in the samples, which effectively improves the sensitivity and the stability of the electronic nose sensors. Consequently, all the samples are classified correctly in PNN, and the electronic nose can be used in soft drink detection.
Flood attack patterns have variability depending on the network environment. It has been necessitated that the need for visual analysis within an Intrusion Detection System (IDS) is to identify these flood-attack patt...
详细信息
ISBN:
(纸本)9781479905614
Flood attack patterns have variability depending on the network environment. It has been necessitated that the need for visual analysis within an Intrusion Detection System (IDS) is to identify these flood-attack patterns. The challenges are how to increase the accuracy of detection and how to visualize and present flood attack patterns in networks for early detection. In this paper, we propose a Two-Layer density model for flood attack detection. The first density layer describes sending-density and receiving-density in analyzing Internet traffic. The second density layer describes attack-density and normal-density in analyzing local network traffic at a victim site. Several visualization techniques are used to facilitate the detection process. The experiments demonstrate that the Two-Layer density model has significantly improved the accuracy of the detection of flood attacks and provides users with a better understanding of the nature of flood attacks.
This paper analyses an incremental relaying uplink model with partial relay selection. It describes the transmission between the base station (BS) and the mobile station (MS). The BS is a multi-antenna destination. Th...
详细信息
ISBN:
(纸本)9781479905614
This paper analyses an incremental relaying uplink model with partial relay selection. It describes the transmission between the base station (BS) and the mobile station (MS). The BS is a multi-antenna destination. The performance measured of the system are derived which include ergodic capacity and outage probability over Rayleigh fading channel. Combined with the other papers, this paper mainly uses the partial relaying selection and incremental relaying. In this paper, we analyze the end-to-end performance of incremental relaying cooperative diversity networks which uses amplify-and-forward relay stations (RS) over independent non-identical Rayleigh fading channels. Closed form expressions for the signal-to-noise ratio (SNR) outage probability and ergodic capacity are determined. We prove out our analysis by showing that simulation results which is coinciding with our analytical results in Rayleigh fading channels.
An adapt Active Appearance Model (AAM) which can initialize the contour automatically is proposed to segment lung CT images with pathologies. Current segmentation methods have failed because the traditional PCA is not...
详细信息
ISBN:
(纸本)9781479905614
An adapt Active Appearance Model (AAM) which can initialize the contour automatically is proposed to segment lung CT images with pathologies. Current segmentation methods have failed because the traditional PCA is not suitable to handle outliers caused by update points of pathology area. A fast robust PCA is cited to design the active AAM which can effectively segment the pathology lungs. For the same 30-cases from Jilin Province Tumor Hospital, two other schemes and algorithm in the paper are compared. The experiment results confirm feasibility of the active AAM which achieved a 93.9% overall sensitivity per section.
暂无评论