To defend DoS (denial of service) attacks, an access filtering mechanism is adopted in the end servers or the IDS (intrusion detection system). The difficulty to define the filtering rules lies where normal and anomal...
详细信息
ISBN:
(纸本)9781424435692
To defend DoS (denial of service) attacks, an access filtering mechanism is adopted in the end servers or the IDS (intrusion detection system). The difficulty to define the filtering rules lies where normal and anomaly packets have to be distinguished in incoming packets. The purpose of our research is to explore the early detective method for anomaly accesses based on statistic analysis. In this paper, we defined the chi-square method, and then analyze the all amount of incoming packets to our College focusing on the source IP address using chi-square method. As the results, we were able to extract the following features. Firstly, the number of packets was the more suitable scale of the window in the chi-square method than the time scale. Secondly, the setting of the window size with 500 packets and 2 bins made the detection of the DoS attacks within 10 minutes for DNS packets possible. Finally, we verified that the DoS attacks from the same source IP address was detected using the chi-square method.
This paper presents a hybrid excitation motor for a main spindle drive in end- and face-milling tools which is operated with high speed 50,000min -1. The proposed motor has not only a permanent magnet but also the fie...
详细信息
Many studies have been made for MANET (Mobile Ad Hoc Networks) as a communication tool which is an autonomous network requiring no fixed infrastructures such as base stations. However, contents discovery mechanism is ...
详细信息
ISBN:
(纸本)1601320841
Many studies have been made for MANET (Mobile Ad Hoc Networks) as a communication tool which is an autonomous network requiring no fixed infrastructures such as base stations. However, contents discovery mechanism is not well tackled. This paper tackles with contents discovery which needs urgency such as refuge, home, hospital, and so on especially in case of disaster. It proposes and shows the effectiveness of an efficient discovery algorithm making the most of GPS and map information without knowing route information or node addresses which is mandatory in the existing studies.
computer systems involve increasingly complex hardware components and software abstractions, e.g. an Xen Hypervisor managing virtual machines running on a multi-core CPU. In the industry, computer engineers are asked ...
详细信息
In the Chinese character culture area, calligraphy-brush writing is important technique, which sometimes develops to art. To acquire this skill, we need to train for long term under masters' guidance. On the other...
详细信息
ISBN:
(纸本)9789728924591
In the Chinese character culture area, calligraphy-brush writing is important technique, which sometimes develops to art. To acquire this skill, we need to train for long term under masters' guidance. On the other hand, one of the 3D pointing devices, the PHANTOM omni, also has a haptic function, which is available to create the senses of both vision and force virtually. Furthermore LCD shutter glasses aid us to be absorbed in the virtual reality. Therefore we propose implementation of a virtual training system for the calligraphy-brush- writing with these 3D I/O devices. The 3D I/O devices and their APIs are familiar to archive the virtual environments for our purpose easily. Especially the haptic functions are useful to memorize masters' writing motions and to recover them when the apprentices train. Consequently, this system is useful for the apprentices to train the calligraphy-brush writing skill.
Supporting multimedia applications over wireless networks has become a very active research topic recently because video applications are prognosticated to receive high demand in future wireless networks, such as ad h...
详细信息
ISBN:
(纸本)1601320841
Supporting multimedia applications over wireless networks has become a very active research topic recently because video applications are prognosticated to receive high demand in future wireless networks, such as ad hoc networks. However, enabling video transmission over wireless ad hoc networks is more challenging than over other wireless networks due to the node mobility, interference and the absence of supporting infrastructure. This paper addresses the problem of video transmission over ad hoc networks. We propose to combine Multiple Description Coding (MDC) with multiple source transport (Multipoint-to-Point: MP2P) video transmission in order to maintain a smooth video streaming over wireless ad hoc networks. In this paper, we perform comprehensive simulation and test bed experiment in order to show the effect of the proposed MP2P video transfer with MDC for two descriptions case on video streaming over wireless ad hoc networks. The results show that the proposed mechanism successfully improves the video transfer performance in terms of video packet reachability and throughput.
In this paper, it is presented the development of an innovative and low-cost robotic mobile system to be employed in inspection of underground electrical distribution lines and pipes. The system is composed of a robot...
详细信息
In this paper, it is presented the development of an innovative and low-cost robotic mobile system to be employed in inspection of underground electrical distribution lines and pipes. The system is composed of a robot with different sensors (infrared, acoustic, and FEF) which permit to move inside pipes and detect overheated points, partial electrical discharges and the occurrence of cable treeing. It is showed the mechanical structure of the robot, the overall architecture of the system and preliminary results.
Several key management frameworks have been proposed as a certification technology in mobile ad hoc networks. However, these methods require a long time to collect and a huge memory to store all the certificates in th...
详细信息
ISBN:
(纸本)1601320841
Several key management frameworks have been proposed as a certification technology in mobile ad hoc networks. However, these methods require a long time to collect and a huge memory to store all the certificates in the network. Generally these involve a huge cost of communication. Moreover, the validity of each certificate has to be checked periodically. In this paper, we propose a trust relationship based self-organized Public key management scheme. This proposed scheme requires each node to manage the certificates generated by itself only, and at the time when certification is needed, a node collects the certificates from other nodes based on the record in the list of trust relationship.
Supporting multimedia applications over wireless networks has become a very active research topic recently because video applications are prognosticated to receive high demand in future wireless networks, such as ad h...
详细信息
暂无评论