This paper focuses on protecting harbor by monitoring the behavior of ships moving in the harbor. In particular, we propose to combine a probabilistic Hidden Markov Model approach with a formal language approach to mo...
详细信息
ISBN:
(纸本)9781467308298;9781467308304
This paper focuses on protecting harbor by monitoring the behavior of ships moving in the harbor. In particular, we propose to combine a probabilistic Hidden Markov Model approach with a formal language approach to model and recognize usual and unusual ship behavior. The probabilistic approach was mainly used to recognize usual ship behavior. However, the reactive approach was used to recognize abnormal ship behavior and classify it into aggressive and transgressive. By combining probabilistic and reactive approaches, we conceived a Behavior Analysis Modulus that we called BAM. It is a decision support system for port team security that aims to generate security advice on ships as they enter into the harbor.
We propose a probabilistic greedy algorithm for decomposing partially specified index generation functions. These functions have numerous applications in a variety of circuit design problems. We show that finding an o...
详细信息
ISBN:
(纸本)9780769546735
We propose a probabilistic greedy algorithm for decomposing partially specified index generation functions. These functions have numerous applications in a variety of circuit design problems. We show that finding an optimal decomposition is an intractable problem, which motivates our approach.
Plug-in Hybrid Electric Vehicles (PHEVs) will strongly penetrate in the car fleet. Based on databases of the houses Daily Loads Profiles (DLPs) and on a probabilistic algorithm of PHEVs connections in residential elec...
详细信息
ISBN:
(纸本)9781467324199
Plug-in Hybrid Electric Vehicles (PHEVs) will strongly penetrate in the car fleet. Based on databases of the houses Daily Loads Profiles (DLPs) and on a probabilistic algorithm of PHEVs connections in residential electric grid areas, this paper determines the minimal charging current or PHEVs charging power which assures that the batteries reached the desired State of Charge (SOC) at the departure time without any charging restriction during peak hours. A dynamic optimization algorithm programming which defines an optimal constant charging current for the PHEV is developed. If charging occurs at home, the application of the proposed optimal algorithm on 10 000 cases shows statistically that a load power chargers for PHEVs charged in residential electric grid areas equals to 373W (230V×1.62A) ensures that 99.4% of the PHEVs batteries have a SOC equals to 100% for the next use.
In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be comprom...
详细信息
In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, we devise a technique to make RFID identification server dependent, providing a different unique secret key shared by a tag and a server. The solution proposed requires the tag to store just a single key, thus fitting the constraints on tag's memory. Second, we provide a probabilistic tag identification scheme that requires the server to perform just bitwise operations and simple list manipulation primitives, thus speeding up the identification process. The tag identification protocol assures privacy, security and resilience to DoS attacks thanks to its stateless nature. Moreover, we extend the tag identification protocol to achieve mutual authentication and resilience to replay attacks. The proposed identification protocol, unlike other probabilistic protocols, never rejects a legitimate tag. Furthermore, the identification protocol requires the reader to access the local database (DB) of tags' keys O(n) times-where n is the number of tags in the system-while it has been shown in the literature that a privacy preserving identification protocol requires a reader to access O(n) times this DB. In this sense, our protocol is optimal. Finally, the three features suggested in this paper, namely, reader-dependent key management, tag identification, and mutual authentication, can be independently adopted to build alternative solutions. (C) 2010 Elsevier Ltd. All rights reserved.
This paper focuses on protecting harbor by monitoring the behavior of ships moving in the harbor. In particular, we propose to combine a probabilistic Hidden Markov Model approach with a formal language approach to mo...
详细信息
ISBN:
(纸本)9781467308298
This paper focuses on protecting harbor by monitoring the behavior of ships moving in the harbor. In particular, we propose to combine a probabilistic Hidden Markov Model approach with a formal language approach to model and recognize usual and unusual ship behavior. The probabilistic approach was mainly used to recognize usual ship behavior. However, the reactive approach was used to recognize abnormal ship behavior and classify it into aggressive and transgressive. By combining probabilistic and reactive approaches, we conceived a Behavior Analysis Modulus that we called BAM. It is a decision support system for port team security that aims to generate security advice on ships as they enter into the harbor.
Estimating the number of RFID tags in the region of interest is an important task in many RFID applications. In this paper we propose a novel approach for efficiently estimating the approximate number of RFID tags. Co...
详细信息
ISBN:
(纸本)9780769543642
Estimating the number of RFID tags in the region of interest is an important task in many RFID applications. In this paper we propose a novel approach for efficiently estimating the approximate number of RFID tags. Compared with existing approaches, the proposed probabilistic Estimating Tree (PET) protocol achieves O(loglogn) estimation efficiency, which remarkably reduces the estimation time while meeting the accuracy requirement. PET also largely reduces the computation and memory overhead at RFID tags. As a result, we are able to apply PET with passive RFID tags and provide scalable and inexpensive solutions for large-scale RFID systems. We validate the efficacy and effectiveness of PET through theoretical analysis as well as extensive simulations. Our results suggest that PET outperforms existing approaches in terms of estimation accuracy, efficiency, and overhead.
Due to the wireless nature of communication in sensor networks, the communication patterns between sensors could be leaked regardless of the adoption of encryption mechanisms those would just protect the message conte...
详细信息
Due to the wireless nature of communication in sensor networks, the communication patterns between sensors could be leaked regardless of the adoption of encryption mechanisms those would just protect the message content. However, communication patterns could provide valuable information to an adversary. For instance, this is the case when sensors reply to a query broadcast by a Base Station (BS);an adversary eavesdropping the communication traffic could realize which sensors are the ones that possibly match the query (that is, the ones that replied). This issue is complicated by the severe resource constrained environment WSNs are subject to, that call for efficient and scalable solutions. In this paper, we have addressed the problem of preserving the location privacy of the sensors of a wireless sensor network when they send a reply to a query broadcast by the BS. In particular, we deal with one of the worst scenarios for privacy: When sensors are queried by a BS to provide the MAX of their stored readings. We provide a probabilistic and scalable protocol to compute the MAX that enjoys the following features: (i) it guarantees the location privacy of the sensors replying to the query;(ii) it is resilient to an active adversary willing to alter the readings sent by the sensors;and, (iii) it allows to trade-off the accuracy of the result with (a small) overhead increase. Finally, extensive simulations support our analysis, showing the quality of our proposal. (C) 2010 Elsevier B.V. All rights reserved.
In order to appear in a good position on a search engine's result list it is not enough to be relevant regarding the request. Someone also have to be "popular". This notion of popularity is calculated by...
详细信息
ISBN:
(纸本)9783642243950
In order to appear in a good position on a search engine's result list it is not enough to be relevant regarding the request. Someone also have to be "popular". This notion of popularity is calculated by the search engine and is related to links made to the webpage. In order to artificially increase their popularity, webmasters sometimes use malicious techniques referred to as Webspam. It can take many forms and is in constant evolution, but Webspam usually consists of building a specific dedicated structure of spam pages around a given target page. It is really important for a search engine to address the issue of Webspam otherwise it won't be able to provide users with fair and reliable results. In this paper we propose a technique to identify webspam through the frequency language associated with random walks amongst those dedicated structures. We identify the language by calculating the frequency of appearance of k-grains on random walks launch from every node.
Detecting, tracking and identifying different non-rigid agents in smart spaces is solved with a probabilistic filter proposed in this paper. A camera ring statically mounted in the intelligent space is used as observa...
详细信息
ISBN:
(纸本)9781424463916
Detecting, tracking and identifying different non-rigid agents in smart spaces is solved with a probabilistic filter proposed in this paper. A camera ring statically mounted in the intelligent space is used as observation system. Besides, three subsystems create the global detection and tracking algorithm: a three-dimensional reconstruction of these entities;a global tracker of all these entities made of a multimodal filter;and a deterministic classifier based on a connectivity map that obtains the individual agents in the smart space. A the end of the paper, different results and reliability statistics are presented in order to demonstrate the global functionality in real executions of the proposal presented.
An algorithm based on correlation analysis was adopted to estimate the probability of the presence of damage in aluminum plates using Lamb wave signals from an active sensor network. Both finite element analysis and e...
详细信息
An algorithm based on correlation analysis was adopted to estimate the probability of the presence of damage in aluminum plates using Lamb wave signals from an active sensor network. Both finite element analysis and experimental evaluations were presented. The Shannon entropy optimization criterion was applied to calibrate the optimal mother wavelet and the most appropriate continuous wavelet transform scale for signal processing. The correlation coefficients for individual sensing paths between the present state (with damage) and the reference state (without damage) were calculated, and the probability of the presence of damage in the monitoring area enclosed by the active sensor network was estimated to identify the damage. A concept of virtual sensing paths (VSPs) was proposed to enhance the performance of the algorithm by increasing the number of sensing paths in data fusion. The results identified using both simulation and experimental Lamb wave signals from different groups of sensing paths at different central frequencies agreed well with the actual situations, demonstrating the potential of the correlation-based algorithm with the application of VSPs for identification of damage in structures.
暂无评论