The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distributed information flow control has several advantages over centralized information flow control for securing composite services in service oriented environments. In this paper, an approach of distributed information flow control which utilizes security labels to convey control information is considered. At first, security labels are formally defined to describe the control information of information...
Although the existing P2P trust models can provide effective resistance to the false recommendation of a single node attack, they general lack effective means of identification and prevention mechanisms to the node collusion attack. In this paper we present the conspiracy group detection model based on behaviour similarity. Both the malicious node detection success rate and normal node false detection...
Many anonymization methods have been used in data publishing and data mining. In the meantime, they reduce the utility of the dataset. So it is important to consider the trade-off between privacy and utility. Quantifying the trade-off between usefulness and privacy of dataset has been the subject of much research in recent years. In this paper, we provide the concepts of privacy loss and utility loss...
We propose a definition of the class of all fairness properties of concurrent systems. In this work, we introduce to the fair transition system, and then discuss the relation among safety property, liveness property and fairness property in the temporal logic of actions. On the way, we give a recent overview work on fairness in reactive and concurrent systems, and innovatively prove the relation among...
Aim at the energy limited for wireless sensor network, a clustering algorithm with isolated nodes based on the DEEC algorithm is proposed. In this algorithm, the cluster heads are still selected using DEEC, but the mechanism of the nodes joining a cluster is improved. Firstly, the distances of the nodes to the all cluster heads and to the sink are calculated separately. According to the shortest distance...
An interleaver improves the performance of communication system in severe electro-magnetic environment. However, it brings about long time delay. A convolutional interleaver reduces much more time delay than those other conventional ones. In this paper, we give a novel structure of convolutional interleaver which introduces less delay. Simulational results show that the new convolutional interleaver...
In this paper, we present a novel algorithm to accurately estimate time-variant noises without signal activity detection for acoustic signal enhancement. This is the first algorithm that does not require nor assume noise-only at the beginnings of recordings. This is the first algorithm that can directly estimate noises during the signal activity periods instead of by smoothing noises from neighbouring...
Cascading failure in a network refers to a situation when the failure of a node causes the failure of its neighbouring nodes, which in turn leads to the failure of other nodes in the network. Cascading failure happens in many real world networks e.g., power grid, packet routing networks.
Synchrophasor systems will play a significant role in next generation Smart Grid monitoring, protection and control. However, these systems also introduce a multitude of potential vulnerabilities and cyber threats from malicious attackers or disgruntled employees, which may cause erroneous situational awareness or severe damage. This paper proposes a Synchrophasor Specific Intrusion Detection System...
In this paper, we describe a lightweight solution for protecting real-time collaborative editing systems against Byzantine faults. We observe that a centralized coordination algorithm not only reduces the complexity of the editing system, it makes easier to harden the system with Byzantine fault tolerance. We perform a comprehensive analysis of the potential threats towards collaborative editing systems...
In this paper we consider a joint algorithm which combines relay selection with power allocation for two-way Decode-and-Forward (DF) relay channels. The selected relay use network coding to assist transceivers exchanging information. Power allocation at each node under the total transmit power constraint are proposed for better BER performance. A closed-form expression of the end-to-end BER is derived...
Network virtualization has been pushed forward as an important potential solution to the gradual ossification problem faced by the existing Internet, allowing multiple heterogeneous network architectures to cohabit on a shared physical network. Efficient allocating the sacred physical resources among multiple virtual networks requests is a major challenge. Current resource allocation studies mainly...
There will be massive M2M terminals to transmit data via LTE uplink in the future. M2M will inevitably influence the QoS of H2H. However, the existing LTE uplink scheduling algorithms can't be applied to M2M services. It is necessary and urgent to optimize the LTE uplink scheduling algorithms. In this paper, we propose a LTE uplink scheduling algorithm named M2MA-SA under massive M2M and H2H arrivals...
Let u be the smallest degree node in a hypercube network with some faulty edges. Suppose that the number of fault-free edges incident with u is not more than that of the others, and denote this number by k . In this article, we mainly concentrate on the conditional hypercube and folded hypercube. In view of this purpose, we prove that there exist k disjoint paths between the smallest degree node and...
Traditional network coding can reduce forwarding times of data packets, but brings larger delay and network congestions. In this paper, we propose a Partial Network Coding based Real-time Multicast (PNCRM) scheme for supporting real-time multicast services in Mobile Ad-hoc Networks (MANETs). PNCRM combines the partial network coding with the establishment of mesh together. It can not only reduce the...
In this paper, detection and estimation of weak signal are presented on the basis of Least-Squares Support Vector Machine (LS-SVM), which is combined with generalized embedding window. Firstly, the embedded dimension and time delay of Lorenz system are determined by improved correlation function method, with which phase space is reconstructed. Then error forecasting model is estimated by LS-SVM with...
In this paper, we develop a Maximum-A-Posterior wavelet-based particle filter (MAP-WPF) and apply it to estimating the states and parameters of the chaotic systems with uncertain parameters and unknown parameters. To implement the proposed method, the covariance of the observation sequence is estimated using the wavelet transform, and the proper weights of particles are obtained accordingly. In addition,...
The Improved Forward Backward Method and Symmetric Successive over Relaxation (SSOR) method are proposed to compute electromagnetic (EM) scattering from 1-D dielectric rough surfaces. In addition the Spectral Acceleration (SA) technique is applied to reduce the computational complexity of each matrix-vector product from O(N2) to O(N). The proposed methods are referred as IFBM-SA and SSOR-SA. They...
This paper proposes a novel approach to overcome the bottleneck in financial data mining. We construct a composite kernel machine (CKM) on the kernel local fisher discriminant space (KLFDS) to solve three problems in high-dimensional data mining: the curse of dimensionality, data complexity and nonlinearity. CKM exploits multiple data sources with strong capability to identify the relevant ones and...
Since the 3-dimension (3D) beamforming technology and the Active Antenna System (AAS) have been extensively employed in Long Term Evolution-Advanced (LTE-A) systems, a cell can be divided into several sectors both horizontally and vertically to improve the performances of the systems. An issue of joint downtilts adjustment and power allocation of two vertical beams is addressed in this paper. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.