Malicious attackers intended to annihilate the availability of network server with threats such as Transmission Control Protocol (TCP) Synchronized (SYN) Flood. The attackers usually make the server exhausted and unav...
详细信息
Malicious attackers intended to annihilate the availability of network server with threats such as Transmission Control Protocol (TCP) Synchronized (SYN) Flood. The attackers usually make the server exhausted and unavailable in order to complete the TCP three-way handshake mechanism. Detecting TCP SYN Flood in the Hypertext Transfer Protocol (HTTP) is the main problem in this paper. Anomaly detection is used to detect TCP SYN flood attack focusing in payload and unusable area. The unusual three-way handshake mechanism is also being analyzed. The results show that the proposed detection method using the combination of packet filtering and traffic monitoring can detect TCP SYN Flood in the network.
Robust scheduling is an effective way to solve job-shop scheduling problem (JSP) under a dynamic and stochastic environment with uncertainties, which may lead to numerous schedule disruptions. Maintaining the optimiza...
详细信息
Recently in many industrial fields the exploitation of vision systems for quality control had a considerable increase, which is mainly due to the technological progress experienced by such systems, that, with respect ...
详细信息
Recently in many industrial fields the exploitation of vision systems for quality control had a considerable increase, which is mainly due to the technological progress experienced by such systems, that, with respect to the past, made their performance more appealing and more reliable while the associated costs are decreased. The advantages of these kind of systems in terms of savings in human resources and improved quality monitoring have become far more evident, by encouraging their adoption in a wide variety of production cycles. The present paper deals with the elaboration and information extraction from images, that represent portions of the surface of flat steel products, and describes an algorithm for defect detection and classification. The overall classification procedure is composed of a preliminary part that is mostly related to image processing and analysis, which aims at pointing out the defect (independently on the class it belongs to), as well as to the extraction of relevant features of the detected defect; the second part exploits a fuzzy inference system in order to analyze the type of defect and solves a classification problem that presently can be addressed only with the support of a human operator. Fuzzy inference systems are suitable to this application because they are able to mimic and reproduce the human reasoning.
Sensor nodes are tiny chips to collect data from real time *** sensor networks consist of hundreds or thousands of sensor *** processing is an important issue to perform the effective communication between base statio...
详细信息
ISBN:
(纸本)9781424467822
Sensor nodes are tiny chips to collect data from real time *** sensor networks consist of hundreds or thousands of sensor *** processing is an important issue to perform the effective communication between base station and sensor *** programs need to be run in the base *** this we need an effective compiler which can compile these *** paper shows the necessity of designing a compiler for WSN(Wireless Sensor Networks).An effective compiler design has been proposed for efficient query processing in WSN.
The worm experimental environment is the pivotal foundation for the worm research. Existing methods to build the environment can be classified into three categories: mathematical modeling, simulation and emulation. Ho...
详细信息
The worm experimental environment is the pivotal foundation for the worm research. Existing methods to build the environment can be classified into three categories: mathematical modeling, simulation and emulation. However, almost all of the existing methods inherently face a rigid fidelity-scalability tradeoff problem. Aming at this issue, this paper proposes a novel virtual-reality hybrid worm emulation model, which integrated the packet-level simulation and network emulation method to build worm experimental environment, for analyzing the behavior of worm propagation with respect to the changes of the network and worm characteristics. With the experiments, we analyze the impacts, induced by the network and worm characteristics on the worm propagation. The results indicate that our experimental environment can provide great support for the worm research.
In our previous works, we defined a novel routing metric for organization-aware multihop wireless networks. We demonstrated that our proposed routing protocol with this new metric provides the much needed survivabilit...
详细信息
In our previous works, we defined a novel routing metric for organization-aware multihop wireless networks. We demonstrated that our proposed routing protocol with this new metric provides the much needed survivability and efficiency in battlefield environments when keeping the cross-organization data transfer at a low level. In this paper, we take one step further and propose ORION, a framework for quality-of-service (QoS) routing in organization-aware wireless networks. Here, we formulate routing as a constrained optimization problem with a new routing metric to address QoS and security/policy requirements of traffic flows as well as node-specific needs, while taking the organizational constraints into account. Since the problem is not solvable in polynomial time, a near optimal solution procedure based on Lagrangian decomposition and subgradient method is proposed and studied to solve the constrained optimization problem, and such a solution renders itself to distributed implementations. Simulation results show that the proposed method provides high QoS while keeping the cross-organization data transfer at a specified level satisfying strict organizational security constraints.
In this paper, effective Machine-to-Machine (M2M) gateway selection algorithms for geographical region-based query are considered. Four feasible algorithms which can be used to select the M2M gateway list are proposed...
详细信息
In this paper, effective Machine-to-Machine (M2M) gateway selection algorithms for geographical region-based query are considered. Four feasible algorithms which can be used to select the M2M gateway list are proposed. The performance evaluation results of proposed algorithms are also provided.
This paper proposes a measurement method of human position based on sensor network First, we explain informationally structured space, robot partners, and sensor networks developed in this study. Next, we discuss the ...
详细信息
This paper proposes a measurement method of human position based on sensor network First, we explain informationally structured space, robot partners, and sensor networks developed in this study. Next, we discuss the applicability of the sensor network and robot partners for human interaction. Next, we apply a steady-state genetic algorithm using template matching to extract a person in 3D distance image based on differential extraction. Finally, we discuss the effectiveness of the proposed methods through several experimental results.
Utilizing the sleep switch transistor technique and dual threshold voltage technique, a source following evaluation gate (SEFG) based domino circuit is presented in this paper for simultaneously suppressing the leakag...
详细信息
ISBN:
(纸本)9781424457977
Utilizing the sleep switch transistor technique and dual threshold voltage technique, a source following evaluation gate (SEFG) based domino circuit is presented in this paper for simultaneously suppressing the leakage current and enhancing noise immunity. Simulation results show that the leakage current of the proposed design can be reduced by 43%, 62%, and 67% while improving 19.7%, 3.4%, and 12.5% noise margin as compared to standard low threshold voltage circuit, standard dual threshold voltage circuit, and SEFG structure, respectively. Also, the inputs and clock signals combination static state dependent leakage current characteristic is analyzed and the minimum leakage states of different domino AND gates are obtained.
In this study, we developed a waterproof cardiography/accelerogram device for human health and activity monitoring. The sensor system consists of a cardiograhy sensor, a tri-axial accelerometer, sensor interface, micr...
详细信息
In this study, we developed a waterproof cardiography/accelerogram device for human health and activity monitoring. The sensor system consists of a cardiograhy sensor, a tri-axial accelerometer, sensor interface, microcontroller and a RF module. It was coated with Poly dimethyl siloxane ( PDMS ) to achieve a waterproof and patch-type device. The RF module with low power consumption was utilized to transfer the cardiography/accelerogram data from the device to the base station. Static postures and long-term human activity were estimated from the data of cardiography sensor, triaxial accelerometer and other integrated sensors. The details of the system configuration and some measurement examples for human health monitoring are described in this paper.
暂无评论