In this paper, we show the possibility of predicting the anomalous packets' behaviors to the near active addresses from small observation address space (Darknet) in Internet. We have proposed the distributed coope...
详细信息
In this paper, we show the possibility of predicting the anomalous packets' behaviors to the near active addresses from small observation address space (Darknet) in Internet. We have proposed the distributed cooperative monitoring architecture (DCMA) which probes the anomalous packets that arrive at the distributed unused address segments and detects and defenses anomalous packets' behaviors to the near active addresses. To realize DCMA, it is necessary to investigate the time-series correlation between anomalous packets arriving at small observation address segments and those of near addresses. Thus, we calculated the correlation strength of anomalous packets that scan address segments from the pairs of the sub-observation address segments divided from the Darknet addresses. Furthermore, we observed the correlation strength when changing the sub-observation's size and investigated the size dependency of the correlation strength. As a result, we could indicate the possibility of predicting the anomalous packets' behaviors to the near address segments from small sub-observation addresses. We could also find that the base observation fixed to the specific sub-observation space contributes to the strong correlation coefficient. Therefore, these results imply that DCMA can predict the anomalous packets' behaviors to the near addresses using small observation space.
A dual-band printed diversity antenna for UMTS and 2.4/5.2-GHz WLAN operation is proposed. The antenna consists of two back-to-back F-shaped monopoles placed symmetrically with respect to a protruding T-shaped ground ...
详细信息
This paper proposes an innovative concept of community, called Mirror Reality, which is formed by the seamless interaction between users of physical space and virtual world. The Mirror Reality is relying on a portal t...
详细信息
This paper proposes an innovative concept of community, called Mirror Reality, which is formed by the seamless interaction between users of physical space and virtual world. The Mirror Reality is relying on a portal to achieve the data translation and communication between virtual and reality worlds. This study employs the Ontology technology to analyze unified representation of objects and events in both virtual world and physical space. Furthermore, the research issues of creating a Mirror Reality are also identified. The portal that is implemented from the analysis is called Portality to emphasize its role between virtuality and reality. In other words, Portality takes care all of the data conversion and processing to permit the interoperability between two totally different worlds. Finally, the prototype of Mirror Reality for the university campus with its Portality is illustrated at the end.
Computational intelligence generally comprises a rather large set of – in a wider sense – adaptive and human-like data analysis and modelling methods. Due to some superior features – such as generalisation, trainab...
详细信息
This paper deals with the technique to detect and analyse the change of the feature distribution of landuse pattern over a particular period of time. The changes of the landuse classes are calculated in terms of RGB v...
详细信息
This paper deals with the technique to detect and analyse the change of the feature distribution of landuse pattern over a particular period of time. The changes of the landuse classes are calculated in terms of RGB values between landuse/landcover images and output is generated with variation of colors. The technique provides the changes location wise i.e. if a particular location (point) of the output image or the input image is selected, the information of latitude, longitude and the type of change of that location is generated. The tool also calculates the total area for each class of the two input images and with this information provides the graphical representation of the class wise and overall changes. Session wise feature distribution line graph is also integrated. Observation of changes of landuse pattern will reflect the changes priodically(few years interval) over a perticular area. This technique will identify the changeprone locations depending upon the detection of variation of clustered pixel values among sessions of a location which leads to predict future distribution of landuse classes of a desired location.
Mobile Ad-hoc networks(MANET)s are self organizing networks which can form a communication network without any fixed infrastructure. The constant bit rate (CBR) traffic is very well known traffic model for mobile Ad-h...
详细信息
Mobile Ad-hoc networks(MANET)s are self organizing networks which can form a communication network without any fixed infrastructure. The constant bit rate (CBR) traffic is very well known traffic model for mobile Ad-hoc network. CBR traffic generates data packets at a constant rate. This constant rate packet generational is good enough for text data packets. The multimedia applications generally generate packets which sometimes increase and might be sometimes followed by some idle period. CBR traffic model does not accommodate the specific features of multimedia data. The day by day increase of multimedia data prompts us to investigate some other traffic models which can accommodate the specific features of these data. One such traffic model is Exponential traffic model which is based on exponential distribution. The other model is Pareto traffic model based on Pareto distribution. In this article, we have tried to study the behavior of mobile Ad-hoc network routing protocols under Exponential and Pareto traffic sources for nodes moving with Reference Point Group Mobility model (RPGM). To the best of our knowledge, this is the first attempt to analyze the effect of traffic patterns with Reference Point Group Mobility (RPGM) model on mobile ad hoc network routing. We have chosen the Normalized routing load, Packet Delivery Fraction and throughput as our figures of merit to compare various protocols. We found high Normalized Routing Load for both Exponential and Pareto traffic compared to CBR traffic in both Dynamic Source Routing (DSR) and Ad hoc On-demand Distance Vector protocol. The Packet Delivery Fraction is comparable in all types of traffic patterns and routing protocols. Throughput is high for Ad hoc On-demand Distance Vector (AODV) routing protocol across all traffic models.
Many fatal accidents of safety critical reactive systems have occurred in unexpected situations which had not been considered during design and test phases of the systems. To prevent these accidents, reactive systems ...
详细信息
Many fatal accidents of safety critical reactive systems have occurred in unexpected situations which had not been considered during design and test phases of the systems. To prevent these accidents, reactive systems should be designed to respond appropriately to any requests of any timing from their environments. Verifying this property in specification phase reduces the development costs of safety critical reactive systems. This property of a specification is well known as realizability. If a specification was found not to be realizable, we have to determine the flaws in the unrealizable specification. Unrealizability of a specification arises from arbitrary requirements given by system designers. From a different point of view, it can be thought that the unrealizable specification implicitly imposes a precondition on the behavior of environment, which a system can not control. If it is possible to obtain the precondition in intuitively comprehensive forms, this makes it easy for system designers to understand the cause of flaws in specifications. In this paper, we propose methods for deriving constraints on the behavior of environments, which is implicitly imposed by unrealizable specifications. Instead of realizability, we use strong satisfiability which is a necessary condition for realizability, due to the fact that many practical unrealizable specifications are also strongly unsatisfiable, and strong satisfiability have the advantage of lower complexity for analysis against realizability. These methods derive constraints in propositional linear temporal logic from Büchi automata representing specifications. The expressions of derived constraints are limited to simple and intuitively comprehensive forms where only two temporal operators appear successively. We give proofs for three correctness properties of our methods, i.e. the termination property, the soundness property, and the weakest constraints derivability. We also discuss complexity of our methods. Fi
Grid computing is emerging as the foundation upon which virtual collaborations can be built among large organizations with the aim of integrating and sharing computer resources, and thus offering performance speed and...
详细信息
Raptor code, a member of the rateless fountain codes family, has been a preferred technology for the forward error correction (FEC) at the application layer. It is used by the 3 rd Generation Partnership Program (3GP...
详细信息
Raptor code, a member of the rateless fountain codes family, has been a preferred technology for the forward error correction (FEC) at the application layer. It is used by the 3 rd Generation Partnership Program (3GPP) Multimedia Broadcast/Multicast Service (MBMS) and Digital Video Broadcasting (DVB-H) standards for multimedia broadcast and content delivery. Currently, a next generation fountain code, called RaptorQ, is being proposed. It aims at reducing to a minimum the redundant FEC information, outperforming significantly Raptor code. The improved coding performance comes at the expense of increased encoding and decoding complexity. This paper compares the coding properties, the decoding performance and the energy efficiency of the two codes on embedded system. Furthermore, simulations are performed for a practical MBMS scenario. Finally, conclusions are drawn with respect to the applicability of the new code for realtime multimedia broadcasting and content delivery.
暂无评论