LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is...LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is subject to LDoS attacks as well. LDoS attacks can cause table reset, route flapping of BGP protocol. A deliberately constructed distributed low-rate DOS attacks can even generate surge of updates throughout the Internet. In this paper, we investigate the promotion of attack efficiency of this novel attack, and then propose an attack model to simulate the LDoS attack. Experiments prove that this attack model can exponentially lower the attack costs and improve the attack effect.展开更多
To solve the coverage and quality problems caused by cell outage in LTE networks, this paper proposes a distributed self-organizing networks management architecture and a distributed cell outage compensation managemen...To solve the coverage and quality problems caused by cell outage in LTE networks, this paper proposes a distributed self-organizing networks management architecture and a distributed cell outage compensation management mechanism. After detecting and analyzing the outage, a cell outage compensation algorithm based on reference signal power adjustment is proposed. The simulation results show that the proposed mechanism can mitigate the performance degradation significantly. Compared with other algorithms, the proposed scheme is more effective in compensating the coverage gap induced by cell outage展开更多
At present, new integrated navigation, which usesthe location function of reference gravity anomaly map to control the errors of the inertial navigation system (INS), has been developed in marine navigation. It is nam...At present, new integrated navigation, which usesthe location function of reference gravity anomaly map to control the errors of the inertial navigation system (INS), has been developed in marine navigation. It is named the gravity-aided INS. Both the INS and real-time computation of gravity anomalies need a 3-D marine normal gravity model. Conventionally, a reduction method applied in geophysical survey is directiy introduced to observed data processing. This reduction does not separate anomaly from normal gravity in the observed data, so errors cannot be avoided. The 3-D marine normal gravity model was derived from the J2 gravity model, and is suitable for the region whose depth is less than 1000 m.展开更多
Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines ...Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines coverage on specified values, and make variances of group distances among N-Window text lines become small. Inspired by the discovery, the research brings out a Support Vector Machine (SVM) based steganalysis algorithm. To avoid the disturbance of large difference among words length from same line, the research only reserves samples whose occurrence-frequencies are ± 10dB of the maximum frequency. The results show that the correct rate of the SVM classifier is higher than 90%.展开更多
A series of extraction equilibrium experiments for aminobenzoic acid with di(2-ethylhexyl)phosphoric acid (D2EHPA) dissolved in n-octane or 1-octanol was carried out. The effects of aminobenzoic acid concentration,D2E...A series of extraction equilibrium experiments for aminobenzoic acid with di(2-ethylhexyl)phosphoric acid (D2EHPA) dissolved in n-octane or 1-octanol was carried out. The effects of aminobenzoic acid concentration,D2EHPA concentration and pH on the distribution ratio were discussed in detail. The infrared spectra of the organic phase loaded with solute illustrated that pH had little effect on the structure of the complex formed. There proceed ion association and cation-exchange.reaction in the extraction. An expression of the equilibrium distribution was proposed.展开更多
In order to solve the problem that me traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware detection model (SP-MDM) based on artif...In order to solve the problem that me traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware detection model (SP-MDM) based on artificial immune system, in which static malware analysis and dynamic malware analysis techniques are combined, and antigens are generated by encoding the characteristics extracted from the malware. Based on negative selection algorithm, the mature detectors are generated. By introducing clonal selection algorithm, the detectors with higher affinity are selected to undergo a proliferation and somatic hyper-mutation process, so that more excellent detector offspring can be generated. Experimental result shows that the detection model has a higher detection rate for unknown smartphone malware, and better detection performance can be achieved by increasing the clone generation.展开更多
Although there have been existing competitions among web service (WS) providers, they still have opportunities to cooperate together for common profits. WS community as a mean to provide an ontological organizati...Although there have been existing competitions among web service (WS) providers, they still have opportunities to cooperate together for common profits. WS community as a mean to provide an ontological organization of WSs that share the same domain of interest has realized this kind of fancy in the sense that providers can work together to compete against others outside the community. Service selection in WS community is different from the traditional service selection, since WS community should take into account its own benefits. Therefore, we propose a hybrid approach to make service selection in WS community. The approach considers the profits of both WS community and the services within it. The experimental evaluation shows that the approach has a great advantage over other approach without consideration of community's benefits.展开更多
Failure of one or multiple critical nodes may partition wireless sensor networks into disjoint segments, and thus brings negative effect on the applications. We propose DCRS, a Distributed Connectivity Restoration Str...Failure of one or multiple critical nodes may partition wireless sensor networks into disjoint segments, and thus brings negative effect on the applications. We propose DCRS, a Distributed Connectivity Restoration Strategy to tolerate the failure of one critical node. Because of the energy restriction of sensor nodes, the energy overhead of the recovery process should be minimized to extend the lifetime of the network. To achieve it, we first design a novel algorithm to identify 2-critical nodes only relying on the positional information of 1-hop neighbors and some 2-hop neighbors, and then we present the criteria to select an appropriate backup for each critical node. Finally, we improve the cascaded node movement algorithm by determining whether a node can move to another non-adjacent node directly or not to reduce the number of nodes moved. The effectiveness of DCRS is validated through extensive simulation experiments.展开更多
Spatiotemporal chaos of a two-dimensional one-way coupled map lattice is used for chaotic cryptography.The chaotic outputs of many space units are used for encryption simultaneously. This system shows satisfactory cr...Spatiotemporal chaos of a two-dimensional one-way coupled map lattice is used for chaotic cryptography.The chaotic outputs of many space units are used for encryption simultaneously. This system shows satisfactory cryp-tographie properties of high security, fast encryption (decryption) speed, and robustness against noise disturbances in communication channel. The overall features of this spatiotemporal-chaos-based cryptosystem are better than chaotic cryptosystems known so far, and also than currently used conventional cryptosystems, such as the Advanced Encryption Standard (AES).展开更多
To manage Automatically Switched Optical Network (ASON), management requirements were analyzed first, including heterogeneous networks management, control plane components and new kind of connection management. Manage...To manage Automatically Switched Optical Network (ASON), management requirements were analyzed first, including heterogeneous networks management, control plane components and new kind of connection management. Management information classes were
Abstracted based on these requirements. A two-layer management architecture was designed, in which Inter-domain Network Management System (INMS) provided an integrated view and Network Management System (NMS) focused on management of certain network domain. An implementation of ASON management system was described in details, whose interfaces were based on CORBA and GUI based on Java. At last, a test platform which demonstrated multi-domain, connection and control plane management was shown.展开更多
All watermarks are shared into shadow images using VCS(Visual Cryptography Scheme). Only one specific shadow (as a new watermark) is embedded into the host signal and the other ones are distributed to every user in ea...All watermarks are shared into shadow images using VCS(Visual Cryptography Scheme). Only one specific shadow (as a new watermark) is embedded into the host signal and the other ones are distributed to every user in each group as a key. In the watermarking extraction procedure, users in different group can obtain different watermark by combining their shadows with the extracted one from the watermarked signal. Analysis and experimental results show that the new watermarking method is novel, secure and robust.展开更多
For α ∈ (0, ∞), let Hα∞ (or Hα,0∞) denote the collection of all functions f which are analytic on the unit disc D and satisfy |f(z)|(1-|z|2)α = O(1) (or |f(z)|(1 - |z|2)α = o(1) as |z| → 1). Hα∞(or Hα,0∞...For α ∈ (0, ∞), let Hα∞ (or Hα,0∞) denote the collection of all functions f which are analytic on the unit disc D and satisfy |f(z)|(1-|z|2)α = O(1) (or |f(z)|(1 - |z|2)α = o(1) as |z| → 1). Hα∞(or Hα,0∞) is called a Bers-type space (or a little Bers-type space).In this paper, we give some basic properties of Hα∞. C, the composition operator associated with a symbol function which is an analytic self map of D, is difined by Cf = f o . We characterize the boundedness and compactness of C which sends one Bers-type space to another function space.展开更多
WSN has been developing from traditional environment monitoring applications to the ubiquitous information services such as the Congestion-oriented Intelligent Transportation System (ColTS). However, the mobility of...WSN has been developing from traditional environment monitoring applications to the ubiquitous information services such as the Congestion-oriented Intelligent Transportation System (ColTS). However, the mobility of nodes makes data dissemination a hard nut to crack. In this paper, we propose MSDD, a multiple mobile sinks data dissemination mechanism for solving the dissemination problem. The main ideas of MSDD are constructing a two-tier grid structure by a designated sink, exploiting a hierarchical monitoring mechanism, and employing a global agent to track the sink locations in order to make the emergencies reported to the sinks immediately, In addition, MSDD supports the query-driven data dissemination. Being compared with TTDD, MSDD is theoretically proved to have less communication overhead. We also validate MSDD outperforms TTDD in reliability and the emergency delivery latency bv simulations.展开更多
It is a challenge to select an optimal set of devices to accomplish a graph-based ubiquitous service and execute it continuously under the circumstances of dynamic environments and limited device capability. We elabor...It is a challenge to select an optimal set of devices to accomplish a graph-based ubiquitous service and execute it continuously under the circumstances of dynamic environments and limited device capability. We elaborate a Synergy- aware Selection Mechanism (SSM) considering synergetic among devices. In the SSM, we design a distributed algorithm to integrate the devices and a dynamic updating weight method. The simulation results show that SSM can make devices composed together to ensure the continuity and smoothness of service展开更多
Bastd on the relationship between nonlinearity and resiliency of amulti-output function, we present a method for constructing noninterseeling linear codes frompacking design. Through these linear codes, we obtain n-va...Bastd on the relationship between nonlinearity and resiliency of amulti-output function, we present a method for constructing noninterseeling linear codes frompacking design. Through these linear codes, we obtain n-variable, m-output, t-resilient functionswith very high nonlinearity. Their nonlinearities are currently the best results for most of cases.展开更多
文摘LDoS (Low-rate Denial of Service) attack, exploiting the flaws in the congestion avoidance mechanism of TCP protocol,is periodic, stealthy, and with high efficiency. Since BGP uses TCP as a transport protocol, it is subject to LDoS attacks as well. LDoS attacks can cause table reset, route flapping of BGP protocol. A deliberately constructed distributed low-rate DOS attacks can even generate surge of updates throughout the Internet. In this paper, we investigate the promotion of attack efficiency of this novel attack, and then propose an attack model to simulate the LDoS attack. Experiments prove that this attack model can exponentially lower the attack costs and improve the attack effect.
文摘To solve the coverage and quality problems caused by cell outage in LTE networks, this paper proposes a distributed self-organizing networks management architecture and a distributed cell outage compensation management mechanism. After detecting and analyzing the outage, a cell outage compensation algorithm based on reference signal power adjustment is proposed. The simulation results show that the proposed mechanism can mitigate the performance degradation significantly. Compared with other algorithms, the proposed scheme is more effective in compensating the coverage gap induced by cell outage
文摘At present, new integrated navigation, which usesthe location function of reference gravity anomaly map to control the errors of the inertial navigation system (INS), has been developed in marine navigation. It is named the gravity-aided INS. Both the INS and real-time computation of gravity anomalies need a 3-D marine normal gravity model. Conventionally, a reduction method applied in geophysical survey is directiy introduced to observed data processing. This reduction does not separate anomaly from normal gravity in the observed data, so errors cannot be avoided. The 3-D marine normal gravity model was derived from the J2 gravity model, and is suitable for the region whose depth is less than 1000 m.
基金the National Natural Science Foundation of China under Grant No.61170269,No.61170272,No.61202082,No.61003285,and the Fundamental Research Funds for the Central Universities under Grant No.BUPT2013RC0308,No.BUPT2013RC0311
文摘Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines coverage on specified values, and make variances of group distances among N-Window text lines become small. Inspired by the discovery, the research brings out a Support Vector Machine (SVM) based steganalysis algorithm. To avoid the disturbance of large difference among words length from same line, the research only reserves samples whose occurrence-frequencies are ± 10dB of the maximum frequency. The results show that the correct rate of the SVM classifier is higher than 90%.
文摘A series of extraction equilibrium experiments for aminobenzoic acid with di(2-ethylhexyl)phosphoric acid (D2EHPA) dissolved in n-octane or 1-octanol was carried out. The effects of aminobenzoic acid concentration,D2EHPA concentration and pH on the distribution ratio were discussed in detail. The infrared spectra of the organic phase loaded with solute illustrated that pH had little effect on the structure of the complex formed. There proceed ion association and cation-exchange.reaction in the extraction. An expression of the equilibrium distribution was proposed.
基金This work was supported in part by National Natural Science Foundation of China under Grants No.61101108,National S&T Major Program under Grants No.2011ZX03002-005-01
文摘In order to solve the problem that me traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware detection model (SP-MDM) based on artificial immune system, in which static malware analysis and dynamic malware analysis techniques are combined, and antigens are generated by encoding the characteristics extracted from the malware. Based on negative selection algorithm, the mature detectors are generated. By introducing clonal selection algorithm, the detectors with higher affinity are selected to undergo a proliferation and somatic hyper-mutation process, so that more excellent detector offspring can be generated. Experimental result shows that the detection model has a higher detection rate for unknown smartphone malware, and better detection performance can be achieved by increasing the clone generation.
文摘Although there have been existing competitions among web service (WS) providers, they still have opportunities to cooperate together for common profits. WS community as a mean to provide an ontological organization of WSs that share the same domain of interest has realized this kind of fancy in the sense that providers can work together to compete against others outside the community. Service selection in WS community is different from the traditional service selection, since WS community should take into account its own benefits. Therefore, we propose a hybrid approach to make service selection in WS community. The approach considers the profits of both WS community and the services within it. The experimental evaluation shows that the approach has a great advantage over other approach without consideration of community's benefits.
文摘Failure of one or multiple critical nodes may partition wireless sensor networks into disjoint segments, and thus brings negative effect on the applications. We propose DCRS, a Distributed Connectivity Restoration Strategy to tolerate the failure of one critical node. Because of the energy restriction of sensor nodes, the energy overhead of the recovery process should be minimized to extend the lifetime of the network. To achieve it, we first design a novel algorithm to identify 2-critical nodes only relying on the positional information of 1-hop neighbors and some 2-hop neighbors, and then we present the criteria to select an appropriate backup for each critical node. Finally, we improve the cascaded node movement algorithm by determining whether a node can move to another non-adjacent node directly or not to reduce the number of nodes moved. The effectiveness of DCRS is validated through extensive simulation experiments.
文摘Spatiotemporal chaos of a two-dimensional one-way coupled map lattice is used for chaotic cryptography.The chaotic outputs of many space units are used for encryption simultaneously. This system shows satisfactory cryp-tographie properties of high security, fast encryption (decryption) speed, and robustness against noise disturbances in communication channel. The overall features of this spatiotemporal-chaos-based cryptosystem are better than chaotic cryptosystems known so far, and also than currently used conventional cryptosystems, such as the Advanced Encryption Standard (AES).
文摘To manage Automatically Switched Optical Network (ASON), management requirements were analyzed first, including heterogeneous networks management, control plane components and new kind of connection management. Management information classes were
Abstracted based on these requirements. A two-layer management architecture was designed, in which Inter-domain Network Management System (INMS) provided an integrated view and Network Management System (NMS) focused on management of certain network domain. An implementation of ASON management system was described in details, whose interfaces were based on CORBA and GUI based on Java. At last, a test platform which demonstrated multi-domain, connection and control plane management was shown.
基金Supported by the National Natural Science Foundation of China (No.90204017, 60373059)National 973 Project (G1999035805) ISN Open Foundation
文摘All watermarks are shared into shadow images using VCS(Visual Cryptography Scheme). Only one specific shadow (as a new watermark) is embedded into the host signal and the other ones are distributed to every user in each group as a key. In the watermarking extraction procedure, users in different group can obtain different watermark by combining their shadows with the extracted one from the watermarked signal. Analysis and experimental results show that the new watermarking method is novel, secure and robust.
文摘For α ∈ (0, ∞), let Hα∞ (or Hα,0∞) denote the collection of all functions f which are analytic on the unit disc D and satisfy |f(z)|(1-|z|2)α = O(1) (or |f(z)|(1 - |z|2)α = o(1) as |z| → 1). Hα∞(or Hα,0∞) is called a Bers-type space (or a little Bers-type space).In this paper, we give some basic properties of Hα∞. C, the composition operator associated with a symbol function which is an analytic self map of D, is difined by Cf = f o . We characterize the boundedness and compactness of C which sends one Bers-type space to another function space.
基金This work was supported in part by China National Natural Science Foundation under Grant 61271185,and the Fundamental Research Funds for the Central Universities
文摘WSN has been developing from traditional environment monitoring applications to the ubiquitous information services such as the Congestion-oriented Intelligent Transportation System (ColTS). However, the mobility of nodes makes data dissemination a hard nut to crack. In this paper, we propose MSDD, a multiple mobile sinks data dissemination mechanism for solving the dissemination problem. The main ideas of MSDD are constructing a two-tier grid structure by a designated sink, exploiting a hierarchical monitoring mechanism, and employing a global agent to track the sink locations in order to make the emergencies reported to the sinks immediately, In addition, MSDD supports the query-driven data dissemination. Being compared with TTDD, MSDD is theoretically proved to have less communication overhead. We also validate MSDD outperforms TTDD in reliability and the emergency delivery latency bv simulations.
文摘It is a challenge to select an optimal set of devices to accomplish a graph-based ubiquitous service and execute it continuously under the circumstances of dynamic environments and limited device capability. We elaborate a Synergy- aware Selection Mechanism (SSM) considering synergetic among devices. In the SSM, we design a distributed algorithm to integrate the devices and a dynamic updating weight method. The simulation results show that SSM can make devices composed together to ensure the continuity and smoothness of service
文摘Bastd on the relationship between nonlinearity and resiliency of amulti-output function, we present a method for constructing noninterseeling linear codes frompacking design. Through these linear codes, we obtain n-variable, m-output, t-resilient functionswith very high nonlinearity. Their nonlinearities are currently the best results for most of cases.