In this paper, we show the possibility of predicting the anomalous packets' behaviors to the near active addresses from small observation address space (Darknet) in Internet. We have proposed the distributed coope...
详细信息
In this paper, we show the possibility of predicting the anomalous packets' behaviors to the near active addresses from small observation address space (Darknet) in Internet. We have proposed the distributed cooperative monitoring architecture (DCMA) which probes the anomalous packets that arrive at the distributed unused address segments and detects and defenses anomalous packets' behaviors to the near active addresses. To realize DCMA, it is necessary to investigate the time-series correlation between anomalous packets arriving at small observation address segments and those of near addresses. Thus, we calculated the correlation strength of anomalous packets that scan address segments from the pairs of the sub-observation address segments divided from the Darknet addresses. Furthermore, we observed the correlation strength when changing the sub-observation's size and investigated the size dependency of the correlation strength. As a result, we could indicate the possibility of predicting the anomalous packets' behaviors to the near address segments from small sub-observation addresses. We could also find that the base observation fixed to the specific sub-observation space contributes to the strong correlation coefficient. Therefore, these results imply that DCMA can predict the anomalous packets' behaviors to the near addresses using small observation space.
The MADNESS project aims at the definition of innovative system-level design methodologies for embedded MP-SoCs, extending the classic concept of design space exploration in multi-application domains to cope with high...
详细信息
Fractures of bone are a common affliction in orthopedic wards at any given time. Trained radiologists generally identify abnormal pathologies including fractures with a relatively high level of accuracy. However studi...
详细信息
Fractures of bone are a common affliction in orthopedic wards at any given time. Trained radiologists generally identify abnormal pathologies including fractures with a relatively high level of accuracy. However studies examining reader accuracy have shown that in some cases the miss rate can be as high when reading x-rays containing multiple abnormalities. Accurate diagnosis of fractures is vital to the effective management of patient injuries. As a result, detection of long-bone fractures is an important orthopedics and radiologic problem, and it is proposed that a novel computer aided detection system could help lowering the miss rate. This paper examines the development of such a system, for the detection of long-bone fractures. This project fully employed MATLAB 7.8.0 (.r2009a) as the programming tool for loading image, image processing and user interface development. Results obtained demonstrate the performance of the femur?s long bone fracture detection system with some limitations.
DDC (Digital Down Converter), as a key part of digital receivers, aims to get low-speed digital baseband signals by extracting and filtering the digital signals transformed by high-speed ADC (Analog Digital Conversion...
详细信息
DDC (Digital Down Converter), as a key part of digital receivers, aims to get low-speed digital baseband signals by extracting and filtering the digital signals transformed by high-speed ADC (Analog Digital Conversion). This paper employs the multi-rate process technique to design the DDC, i.e. firstly conducting data CIC (Cascade Integrator Comb) extraction, then HBF (Half-Band Filtering) and at last low pass filtering. CIC, which doesn't need multiplication, can realize high speed filtering and the HBF has high operation efficiency and good realtime performance. FPGA realization is taken into full consideration during the project design of the top. In the end, this paper adopts the Simulink instrument in MATLAB and combines Altera's signal processing toolbox-DSPBuilder to implement the design scheme by the FPGA. It focuses on the description of FPGA implementation of the digitally controlled oscillator, CIC filter, half-band extracting filter and the low pass filter.
Biped walking by using all joint movements and DOFs in both directions (sagittal plane and coronal plane) is one of the most complicated research topics in robotics. In this paper, angular trajectories of a stable bip...
详细信息
At present, the online network reprogramming faces two challenges: 1) How to save the energy consumed during the code dissemination;and 2) How to enhance the security of online network reprogramming. In this paper, we...
详细信息
At present, the online network reprogramming faces two challenges: 1) How to save the energy consumed during the code dissemination;and 2) How to enhance the security of online network reprogramming. In this paper, we modify the work flow of online reprogramming system and separates an alone reprogramming component from the whole program image which need not be transmitted in order to reduce the energy consumption. According to the security vulnerabilities in the image management aspects of code dissemination, acipher puzzle-based image management algorithm is proposed. According to the based-request attacks, several counter measures are introduced in our online reprogramming system, such as secure broadcast authentication based on cluster keys and the request count technique. By integrating several key techniques, our online reprogramming system can securely and energy-efficiently disseminate the new program image into the whole WSNs.
Communities in social networks emerge from interactions among individuals and can be analyzed through a combination of clustering and graph layout algorithms. These approaches result in 2D or 3D visualizations of clus...
详细信息
In this paper, the authors targeted multiple access protocols to analyze the problem of collision and collision avoidance in RFID systems. By considering user terminals as tags and access point as reader, the authors ...
详细信息
In this paper, the authors targeted multiple access protocols to analyze the problem of collision and collision avoidance in RFID systems. By considering user terminals as tags and access point as reader, the authors efficiently modelled the wireless communication channel by considering the capture effect. Otherwise, if the capture effect is not considered, the system is modelled under wired communication.
We introduce some modifications to the widely deployed Kerberos authentication protocol. The principle's secret-key will be independent of the user password to overcome the weak passwords chosen by the network pri...
详细信息
We introduce some modifications to the widely deployed Kerberos authentication protocol. The principle's secret-key will be independent of the user password to overcome the weak passwords chosen by the network principal that are susceptible to password guessing attacks, the main drawback of the Kerberos protocol. Instead, the Kerberos Distribution Center saves a profile for every instance in its realm to generate the principle's secret-key by hashing the profile, and encrypting the output digest. Besides, the lifetime of the secret-key is controlled using the sys-tem clock. Triple-Des is used for encryption, SHA-256 for hashing, and Blum Blum Shub for random number gen-eration.
暂无评论