The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is difficult to promote the use of existing methods of DDoS attack source trace-back. Source IP address forgery is an important technology that DDoS attackers commonly use. Combined with the characteristics of the datagram and the traditional virtual circuit, orientable complete path (OCP) is put forward. OCP can be used to solve the problem of source IP address forgery, to track attack source,...
This paper presents a new method to select a segment-to-segment matching by analysing signature verification, accordingly curve segments used in signature verification and the regional feature contained in the curve segment are picked-up and the regional features are selected by ant colony optimization (ACO) algorithm and genetic algorithms(GAs). Namely, features selected are first encoded into chromosome,...
It has been widely recognized that the current Internet routing system is facing serious scaling problem. Several efforts argue that the routing scaling problem necessitates architectural changes. In this paper, we propose a scalable routing architecture for future Internet. Our proposal goes along the ideas of inter-domain/intra-domain routing separation and provider/customer networks separation,...
Frame rate up-conversion (FRUC) is effective to enhance video quality at LCD TV. In this paper, a new method based on matching classification and dominant objects tracking is proposed. Blocks to be interpolated are classified into 4 types: matched, unmatched, uncertain and unrelated according to the results of bilateral block matching. Dominant object tracking helps to refine the results. Then an...
To reduce the energy consumption and extend the network's survival time is the key research problem in the Wireless Sensor Network. Much research work has been done on the placement of nodes and routing protocol, eliminating data redundancy by density controlling and hierarchical clustering algorithm. In this paper, it is proposed that information fusion is an effective way to reduce the communication...
An optical buffering architecture based-on traffic load selection was put forward for optical packet switching networks in the paper. For improving the limited fiber delay lines utilization, the segment shared buffering mechanism be used to configure the output fiber delay lines and the output/feedback shared buffer module configuration using degenerate model. When the traffic load is larger than...
Speech recognition result is always evaluated by dynamic programming algorithm which can find the best match between recognized results and references. And the match unit could be word, syllable, phone and so on. However, in mandarin speech recognition, this traditional algorithm is not accurate because of the unique characteristics of Chinese word-formation. In order to improve evaluation performance...
In this paper, a new fast fault detection and localization mechanism based on network partition strategy is proposed for meshed Optical Burst Switching (OBS) networks based on monitoring-cycles (m-Cycle). The algorithm has been applied to four typical networks and compared to the other three algorithms in terms of the cost of monitors, fault localization degree and the average wavelength overhead...
In this paper, a hybrid block truncation coding (HBTC) is presented for color image compression. In the HBTC algorithm to improve the compression ratio of the basic BTC, only luminance bit-map is employed to represent the edge information of the coding block. Moreover, an efficient previous proposed algorithm, adaptive quantization coding (AQC), is used to compress the two representative levels further...
Web mining has become an important field of research. However, there is an important challenge to applying the technique to NLP applications. An integrated data mining system for NLP in Chinese commercial Web sites is presented in this paper. It presented the data mining process in detail. More importantly, it puts forward a new enhanced method to acquire user preferences. Web mining applied to NLP...
Based on the analysis of QQLive protocol, an active monitoring based QQLive real-time information acquisition system was presented by the in-depth study of characteristic message and characteristic payload in the communication process of QQLive. The system acquires the channel list and program information, at the same time monitors the viewing user information by forging the client to send message...
An improved iris recognition system based on even symmetry Gabor wavelet is proposed in this paper. In iris image preprocess, an effective segmentation and eyelids occlusion detection approach are introduced. During recognition, only the imaginary part of complex 2-D Gabor filter is used in coding for shorter code length but without affecting the recognition performance. A simple effective filter...
A critical and indispensable step of an automatic fingerprint identification system (AFIS) is fingerprint image thinning. many algorithms have been devised and applied trying to obtain one pixel wide and 8 neighbor connected thinning result. In this paper, a method of improving the thinning result through adding eliminate structure templates is proposed. The ZS algorithm is a parallel thinning algorithm...
Ad Hoc network, which is a peer-to-peer wireless network, plays a very important role in military and sensor networks. Although it has great potential usages, there is not much practical use of Ad Hoc network at present due to various problems in several aspects. A robust convenient mobile device is one of the problems. This paper implements an ad hoc network platform through constructing an embedded...
In this paper, a new approach of blind estimation of subcarrier number based on multiple signal classification (MUSIC) algorithm is proposed for MB-OFDM ultra-wide band (UWB) communications system. The proposed eigenvalue-construct method only using signal autocorrelation of orthogonal frequency-division multiplexing (OFDM) symbols estimates the number of subcarriers. The computer simulations show...
In this paper, a new outer loop power control algorithm based on continuous fuzzy control is proposed. The output value, controlled by the fuzzy rules and the two input values which are processed with fuzzy method, is adopted as the adjustment step-size of SIRtar in the inner loop power control. The algorithm can calculate the best adjustment step-size to overcome the robust phenomenon of traditional...
To overcome the limitation of TCP/IP protocol that multi-copys and context switch are needed in the network storage system which result in the poor performance of the system, a lightweight transport protocol named DOEP (disk over Ethernet protocol) is presented. DOEP drawing on the idea of zero-copy increases the throughput of the network storage system and reduces the system workload by reducing...
Image annotation plays a very important role in managing and retrieving abundant images over the Internet nowadays. In this paper, we try to propose a human-computer interactive framework for online image annotation which fully considers the human judgments and all online-users' feedback. First, an interactive image annotation interface is demonstrated. It is utilized to interact with online-users...
Based on the analysis of FTP process and investigation of user perceptions, a set of FTP service QoS parameters are proposed from the user's perspective. These parameters are defined in terms of delay, throughput and usability. Detailed definition of each parameter is presented and its effect on user perceptions is well described. In order to evaluate the effectiveness of these parameters, an active...
The new perfect complete generalized complementary orthogonal code group, which has perfect aperiodic auto-correlation function and cross-correlation function, is constructed. Two new methods, which are based on Schweitzer's concept and theory of overlap and reuse, are adopted to improve the code efficiency. There is no adjacent cell interference for the ideal auto-correlation function and cross-correlation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.