As there is a rapid rampancy of malicious intrusion, people pay more attentions to the network security. This paper presents a new method based on Hilbert-Huang trans- form (HHT) to characterize intrusions that can de...
详细信息
As there is a rapid rampancy of malicious intrusion, people pay more attentions to the network security. This paper presents a new method based on Hilbert-Huang trans- form (HHT) to characterize intrusions that can detect many kinds of intrusion according to the number of packets. This paper demonstrates the usefulness of such a method to differentiate abnormal data from normal data. Experiments are performed using intrusion detection data sets and tested for validation. Some results are reported along with analysis and concluding remarks.
Two neural networks with the common input vector can finally synchronize their weight vectors by output- based mutual learning. It can be well utilized to negotiate secure information over a public channel. Designing ...
详细信息
Two neural networks with the common input vector can finally synchronize their weight vectors by output- based mutual learning. It can be well utilized to negotiate secure information over a public channel. Designing security protocols based on such synchronized neural network model is quite advantageous for its low-cost and high-performance. In this paper, we at first analyze and optimize the interacting network neurl, then present a cryptography-oriented secure parity model and implement the performance simulations. As an instance, a novel key agreement protocol design scenario is finally proposed.
Recommendation system is one of the most important technologies applied in e-commerce. Similarity measuring method is fundamental to collaborative filtering algorithm, and traditional methods are inefficient especiall...
详细信息
Recommendation system is one of the most important technologies applied in e-commerce. Similarity measuring method is fundamental to collaborative filtering algorithm, and traditional methods are inefficient especially when the user rating data are extremely sparse. Based on the outstanding characteristics of Cloud Model on the process of transforming a qualitative concept to a set of quantitative numerical values, a novel similarity measuring method, namely the likeness comparing method based on cloud model (LICM) is proposed in this paper. LICM compares the similarity of two users on knowledge level, which can overcome the drawback of attributes' strictly matching. This work analysis traditional methods throughly and puts forward a novel collaborative filtering algorithm, which is based on the LICM method. Experiments on typical data set show the excellent performance of the present collaborative filtering algorithm based on LICM, even with extremely sparsity of data.
With the increasing popularity of mobile positioning device and wireless communications, storage and query of dynamically changing information of moving objects in network has become feasible. It can be widely used in...
详细信息
With the increasing popularity of mobile positioning device and wireless communications, storage and query of dynamically changing information of moving objects in network has become feasible. It can be widely used in such applications as VNS, LBS, and ITS. However, due to their special spatiotemporal conditions, there is still a lack of efficient data-model to support storage and queries about trajectories. In view of this, we developed a new spatiotemporal model, named 2-Dimensional Spatio-Temporal data model for Moving Objects in Network (2DSTMON), to deal with network constrain trajectories. In the model, trajectories from (x, y, t) space were transformed to 2-D space;thus, they could be described as vector polyline, and stored in mature spatial database. That updating operations by motion vectors were employed made updating at low frequency and storing at a little capacity possible. Finally, we implemented the 2DSTMON model and then validated them through a series of experiments.
Disaster mitigation and relief (DMR) has been paid much more attention from national or local governments in China. Multi-source remotely sensed data with different spatial, spectral and temporal resolutions were wide...
详细信息
Disaster mitigation and relief (DMR) has been paid much more attention from national or local governments in China. Multi-source remotely sensed data with different spatial, spectral and temporal resolutions were widely applied in DMR (e.g. disaster warning, rapid response, loss evaluation and reconstruction, etc.), and have been a main data source in the database of DMR Although some famous remote sensing image database engines have the power to organize, store and manage massive image data, their searching efficiency in massive imagery is poor because of the fact that the temporal, spatial and spectral attributes were not taken account in their image database construction procedure. Especially for the preprocessed imagery used in DMR, the common image management software packages usually store and manage them as individual scene depending upon the catalog. It leads to a low efficiency for searching and accessing images. In this study, a novel fast integrated searching strategy (FISS) was proposed and a set of grid indexes were designed to project multi-dimensional image data with multi-temporal, multispectral and multispatial resolutions to the 2-D space. The required image data at different locations for any acquired dates, spectral and spatial resolutions could be rapidly searched by different dimensional indexes. In order to improve the speed and efficiency of data access, the preprocessed images were divided into tiles and compressed. FISS makes the system be interactive and more convenient to the users. It has been used in disaster mitigation and relief database of disaster reduction in China. In this paper, the proposed searching technique was compared with traditional ones, the results showed that FISS could accelerate searching speed, shorten disaster emergency response time.
We propose a predictive handoff mechanism which can predict the occurrence of link layer handoff precisely. It can be used as a trigger for Mobile IP to start network layer handoff ahead or pre-allocate resources. Usi...
详细信息
With the continuous developing of economy, the amount of cars in Beijing increase constantly. On the contrary, the increase of traffic information service, cannot satisfy the increasing trip require ments. As the dire...
详细信息
With the continuous developing of economy, the amount of cars in Beijing increase constantly. On the contrary, the increase of traffic information service, cannot satisfy the increasing trip require ments. As the direct subordinates of Beijing Municipal Committee of Communication, Beijing Communication Information Center has been applying itself to research how to integrate current isolated systems, and construct Beijing public traffic information services system, in order to serve travelers dynamic, synthetic and convenient traffic information. This paper mainly proposed system architectures from different point of view, and listed the software and hardware require ments of the system constructing.
The traditional map-matching algorithms are often ready for Vehicle Navigation Systems, which always request complicated computation model and need continuous and close GPS data whose interval is just about 1 second. ...
详细信息
The traditional map-matching algorithms are often ready for Vehicle Navigation Systems, which always request complicated computation model and need continuous and close GPS data whose interval is just about 1 second. When raising the accuracy, they lower the efficiency, and are not applicable to process the larger scale GPS data. This paper presents an efficient map-matching algorithm which is very applicable to the real-time traffic information system using large-scale Float Car Data (FCD). This approach designs a kind of data structure of road network and introduces the ideas of partitioning the road network into small grids and dividing the structure of the road network into two levels. It creates the index for the path with the small grid and the direction of line-segment in the road. Examples are provided on a large data set for the Beijing area. The paper demonstrates the efficiency of the algorithm in terms of accuracy and computational speed.
This paper analyzes the functions of two IP addresses of mobile node in routing, and proposes a mobile routing approach using ARP cheat. This approach doesn't need to make any changes to the routing configuration ...
详细信息
This paper analyzes the functions of two IP addresses of mobile node in routing, and proposes a mobile routing approach using ARP cheat. This approach doesn't need to make any changes to the routing configuration of mobile node, and it makes use of the ARP scheme to establish routing rapidly, so it reduces the interference of mobile routing establishment with the communication recovery. This paper also analyzes the realization and performance of this approach.
To reduce handoff latency in mobile IP, two link layer trigger methods are proposed. The link layer inspection method removes the latency of movement detection and the method of link layer handoff prediction can trigg...
详细信息
To reduce handoff latency in mobile IP, two link layer trigger methods are proposed. The link layer inspection method removes the latency of movement detection and the method of link layer handoff prediction can trigger network layer handoff before link layer handoff. These methods trigger network handoff only when it is decided the mobile node enters into new subnet through binding network information in link layer property of base station or acquiring information of current subnet and neighboring subnet from foreign agent, so these methods can avoid blind network handoff.
暂无评论