The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet, causing the defense against Distributed Denial of Service attacks to become one of the hardest problems on the Inte...
详细信息
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet, causing the defense against Distributed Denial of Service attacks to become one of the hardest problems on the Internet today. Previous solutions for this problem try to traceback to the exact origin of the attack by requiring every router's participation. For many reasons this requirement is impractical and the victim results with an approximate location of the attacker. Reconstruction of the whole path is also very difficult due to the sheer size of the Internet. This paper presents lightweight schemes for tracing back to the attack-originating AS instead to the exact origin itself. Once the attack-originating AS is determined, all further routers in the path to the attacker are within that AS and under the control of a single entity; which can presumably monitor local traffic in a more direct way than a generalized, Internet scale, packet marking scheme can. We furthermore, provide a scheme to prevent compromised routers from forging markings.
Nd:YAG pulse laser was used to ignite powdered and preheated PETN. To enhance efficiency of laser absorption by PETN, it was mixed with a small amount of carbon black powder. In this study, we will propose two‐pulse ...
Nd:YAG pulse laser was used to ignite powdered and preheated PETN. To enhance efficiency of laser absorption by PETN, it was mixed with a small amount of carbon black powder. In this study, we will propose two‐pulse laser ignition method, the first pulse is a long pulse to heat up PETN up to melting point, then second laser to ignite the heated PETN. By adopting this procedure, second short pulse laser energy can be reduced to ensure that the energy can be transferred by relatively slender plastic optical fiber. To simulate the slow laser heating process by long pulse laser, high‐power cw YAG laser up to 30W was used. While two ns‐YAG laser of about 200 mJ/pulse with 4 ns and 12 ns were used for ignition. Higher peak power with donut‐like profile laser beam of 4 ns duration gives damage to fibers, while lower peak power with relatively flat profile laser beam of 12 ns duration can safely pass through optical fiber of 1 mm diameter. We performed a series of melting experiments of PETN under normal optical microscope. From these experiments, the experimental conditions and time to the onset of PETN melting was determined. Then the ignition experiments were performed by choosing a delay time between two laser irradiation timing as a parameter. Shortest detonation delay was evidenced at the delay time close to the time that the PETN specimen is almost starting to melt.
This paper presents a collaborative filtering recommendation system combined with market value functions. In the approach, by building market value function model for each item, we can produce a user rating informatio...
详细信息
ISBN:
(纸本)981238961X
This paper presents a collaborative filtering recommendation system combined with market value functions. In the approach, by building market value function model for each item, we can produce a user rating information table. Then Collaborative Filtering algorithm can produce a list of recommended items. Experiment in real world examples shows that the method is effective.
A Verilog HDL-based fault simulator for testing embedded cores-based synchronous sequential circuits is proposed in the paper to detect single stuck-line faults The simulator emulates a typical BIST (built-in self-tes...
详细信息
Controllability and observability problems may manifest themselves during the application of a test or checking sequence in a test architecture where there are multiple remote testers. These problems often require the...
详细信息
The routing algorithms for multimedia communication should use for routing more than one QoS parameter. This is because new services such as video on demand and remote meeting systems require better QoS. However, the ...
详细信息
ISBN:
(纸本)0769520510
The routing algorithms for multimedia communication should use for routing more than one QoS parameter. This is because new services such as video on demand and remote meeting systems require better QoS. However, the problem of QoS routing is difficult and to find a feasible route with two independent path constraints is NP-complete. Also, QoS routing algorithms for broadband networks must be adaptive, flexible, and intelligent for efficient network management. In this paper, we propose a multipurpose optimization method for QoS routing based on Genetic Algorithm (GA). The simulation results show that proposed method has a good performance and is a promising method for QoS routing.
In order to support multimedia communication, it is necessary to develop routing algorithms that make decisions based on multiple Quality of Service (QoS) parameters. This is because new services such as video on dema...
详细信息
In order to support multimedia communication, it is necessary to develop routing algorithms that make decisions based on multiple Quality of Service (QoS) parameters. This is because new services such as video on demand and remote meeting systems have multiple QoS requirements. However, the problem of QoS routing is difficult because finding a feasible route with two independent path constraints is NP-complete problem. Also, QoS routing algorithms for broadband networks must be adaptive, flexible, and intelligent for efficient network management. In this paper, we propose a multi-purpose optimization method for QoS routing based on Genetic Algorithm (GA). The simulation results show that the proposed method has a good performance and therefore is a promising method for QoS routing.
This paper presents highly reliable adaptive image watermark embedding using a stochastic perceptual model based on multiwavelet transform. To embedding watermark, the original image is decomposed into 4 levels using ...
详细信息
In this paper we propose a new packet classification algorithm, which can substantially improve the performance of a classifier by decreasing the rulebase lookup latency. The algorithm hierarchically partitions the ru...
详细信息
This paper proposes a unified knowledge model establishing a core structure of knowledge representation in natural and artificial intelligence systems. The Concept Cell Model proposes the use of acyclic lattices to mo...
详细信息
This paper proposes a unified knowledge model establishing a core structure of knowledge representation in natural and artificial intelligence systems. The Concept Cell Model proposes the use of acyclic lattices to model a concept formed from a knowledge network of simpler concepts. Declarative and procedural knowledge are explicitly defined as the time-invariant and time-variant relationship of concepts. Examples of a Restaurant Servicing Concept Cell and an extended Shopping Complex Concept Cell are used to demonstrate the functionality of this model. Major existing theoretic and engineering Ontology knowledge schools are compared under this framework.
暂无评论