Malicious attackers intended to annihilate the availability of network server with threats such as Transmission Control Protocol (TCP) Synchronized (SYN) Flood. The attackers usually make the server exhausted and unav...
详细信息
Speech recorded in real environments by distant microphones is degraded by factor like reverberation. This degradation strongly affects the performance of the speaker identification system. Three compensation approach...
详细信息
Speech recorded in real environments by distant microphones is degraded by factor like reverberation. This degradation strongly affects the performance of the speaker identification system. Three compensation approaches are investigated to improve the robustness of speaker identification in such scenarios. The first approach applies spectral subtraction before feature extraction in order to reduce the late reverberation effect. The second approach makes use of feature warping as robust features of distant speaker identification under mismatched training-testing conditions. The third approach presents a novel GMM parameters initialization method: combination division and k-means clustering. The experiment results show that the compensated system as compared with baseline system, the channel average identification rate has an increase of 11.4%, 15.4%, 17%, 17.8% on TIMIT database and 6.82%, 6.36%, 9.34%, 14% on JNAS database.
Voice over Internet Protocol (VoIP) is one of the emerging technologies today. This application offers the user a service by which one can call another person at a low cost as compare with traditional phone services. ...
详细信息
ISBN:
(纸本)9781424469925;9780769540436
Voice over Internet Protocol (VoIP) is one of the emerging technologies today. This application offers the user a service by which one can call another person at a low cost as compare with traditional phone services. One drawback to the Internet is spam, which are unsolicited or unwanted objects which often appear as unwanted messages in various email applications. For VoIP, spam refers to unsolicited and unwanted calls by the VoIP user. In this paper, we have purposed a solution to prevent the spam in VoIP. The CAPTCHA (Completely Automated Public Turing Test to Tell computers and Human Apart) method aims to determine whether the call is coming from a human or a machine. The key contribution of this paper is a proof-of-concept implementation of a CAPTCHA mechanism to prevent VoIP Spam.
Thread migration is an effective technique for fault resilience and load balancing in high performance computing. However, flexible thread migration is not easy to achieve. In this paper, we present an approach to cre...
详细信息
Thread migration is an effective technique for fault resilience and load balancing in high performance computing. However, flexible thread migration is not easy to achieve. In this paper, we present an approach to creating migratory threads dynamically at application level. The targets must be executable source files. Compared to the static ones, the number of threads created during migration with the new scheme is independent from the context. Various thread cases are considered for migration. Thread state is handled at application level. Variables are saved in structures in C language for speedy state construction. In order to solve the inability of traditional methods in tracking the created threads, a tree of active function calls is used to record the callback. The preprocessor of the proposed one is written in YACC for accuracy and programmability. The migration enabling process is transparent to programmers with the help of the preprocess. The experimental results have demonstrated the effectiveness of this approach.
As networks develop into large-scale systems, survivability of network systems is imperative. The systematic metrics of network survivability are used to measure or evaluate network survivability. This Paper summarize...
详细信息
As networks develop into large-scale systems, survivability of network systems is imperative. The systematic metrics of network survivability are used to measure or evaluate network survivability. This Paper summarizes the systematic metrics and their lack for measuring or computing network survivability while providing an easy way to reference baseline of the current state. It also provides some principles of network survivability metrics, and divides the current network survivability metrics into three types: target-based network survivability metrics, method-based network survivability metrics, and description-based network survivability metrics. At last, the trend of network survivability metrics is given: A set of quantitative, user-orientation, hierarchical and systematic survivability metrics, which can reflect full aspects and characters during the whole process of survivable networks, are required.
This paper describes a novel noninvasive method for sensing heartbeat, respiration and body-movement biosignals of a subject in bed by using ceramic piezo devices set under the legs of the bed.
ISBN:
(纸本)9781424476428
This paper describes a novel noninvasive method for sensing heartbeat, respiration and body-movement biosignals of a subject in bed by using ceramic piezo devices set under the legs of the bed.
With the rapid evolution of network speed from 1Gbps to 10Gbps, a wide spectrum of research has been done on TCP/IP to improve its processing efficiency on general purpose processors. However, most of them did studies...
详细信息
With the rapid evolution of network speed from 1Gbps to 10Gbps, a wide spectrum of research has been done on TCP/IP to improve its processing efficiency on general purpose processors. However, most of them did studies only from the performance perspective and ignored its power efficiency. As power has become a major concern in data centers, where servers are often interconnected with 10GbE, it becomes critical to understand power efficiency of TCP/IP packet processing over 10GbE. In this paper, we extensively examine power consumption of TCP/IP packet processing over 10GbE on Intel Nehalem platforms across a range of I/O sizes by using a power analyzer. In order to understand the power consumption, we use an external Data Acquisition system (DAQ) to obtain a breakdown of power consumption for individual hardware components such as CPU, memory and NIC etc. In addition, as integrated NIC architectures are gaining more attention in high-end servers, we also study power consumption of TCP/IP packet processing on an integrated NIC by using a Sun Niagara 2 processor with two integrated 10GbE NICs. We carefully compare the power efficiency of using an integrated NIC with using a PCI-E based discrete NIC. We make many new observations as follows: 1) Unlike 1GbE NICs, 10GbE NICs have high idle power dissipation, and TCP/IP packet processing over 10GbE consumes significant dynamic power. 2) Our power breakdown reveals that CPU is the major source of the dynamic power consumption, followed by memory. As the I/O size increases, the CPU power consumption reduces but the memory power consumption grows. Compared to CPU and memory, NIC has low dynamic power consumption. 3) Large I/O sizes are much more power efficient than small I/O sizes. 4) While integrating a 10GbE NIC slightly increases CPU power consumption, it not only reduces system idle power dissipation due to elimination of PCI-E interface in NICs, but also achieves dynamic power savings due to better processing efficienc
For large-scale wireless sensor networks (WSNs), cluster-based architecture is desirable. Conventional short range sensor radio, however, is often inefficient for the inter-cluster communication due to the large dista...
详细信息
ISBN:
(纸本)9781424451753;9781424451760
For large-scale wireless sensor networks (WSNs), cluster-based architecture is desirable. Conventional short range sensor radio, however, is often inefficient for the inter-cluster communication due to the large distance between cluster heads. One solution is to use a longer range radio for inter-cluster head communication. In this paper, we consider a dual-radio cluster head with IEEE 802.15.4 and IEEE 802.11b. A key issue is that 802.15.4 and 802.11b use the same frequency band at 2.4 GHz, so that they can potentially interfere with each other. We analyze this interference behavior via testbed experiments. Our results indicate that with a simple relaying mechanism, interference was quite high even when orthogonal channels are used for two radios. This strongly suggests the need of smarter relaying mechanisms.
A bandwidth enhancement method is presented for silicon-on-insulator waveguidebased wavelength conversion using nondegenerate four-wave mixing. The conversion bandwidth is broadened by 28% in a 300 × 500 nm2 wave...
详细信息
Nodes in a cognitive radio mesh network may select from a set of available channels to use provided they do not interfere with primary users. This ability can improve overall network performance but introduces the que...
详细信息
Nodes in a cognitive radio mesh network may select from a set of available channels to use provided they do not interfere with primary users. This ability can improve overall network performance but introduces the question of how best to use these channels. This paper addresses the following specific problem: given a routing path P, choose which channels each link in P should use and their transmission schedule so as to maximize the end-to-end data flow rate (throughput) supported by the entire path. This problem is relevant to applications such as streaming video or data where a connection may be long lasting and require a high constant throughput. The problem is hard to due the presence of both intraflow and inter-flow interference. We have developed a new constant-factor approximation algorithm for this problem. If certain natural conditions on the path are met, the performance guarantee is ¼ of optimal. It has been shown by simulation results that the end-to-end throughput given by the proposed algorithm is often within 90% or better of optimal.
暂无评论