NCCT NCCT NCCT NCCT: IEEE Transaction Papers Abstract Enclosed
NCCT NCCT NCCT NCCT: IEEE Transaction Papers Abstract Enclosed
Index Terms Delay-tolerant networks, wireless contention, performance analysis, mobility-assisted routing.
Index Terms Location-based services, location privacy, social networks, hierarchical key distribution
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 19, NO. 7, JULY 2008
Index Terms Energy balance, energy efficiency, mobile ad hoc networks, network lifetime, overhearing, power saving mechanism
Index Terms Data summarization, measurement. information theory, network monitoring, traffic
Geographic ad hoc networks use position information for routing. They often utilize stateless greedy forwarding and require the use of recovery algorithms when the greedy approach fails. We propose a novel idea based on virtual repositioning of nodes that allows to increase the efficiency of greedy routing and significantly increase the success of the recovery algorithm based on local information alone. We explain the problem of predicting dead ends, which the greedy algorithm may reach and bypassing voids in the network, and introduce Node Elevation Ad hoc Routing (NEAR), a solution that incorporates both virtual positioning and routing algorithms that improve performance in ad hoc networks containing voids. We demonstrate by simulations the advantages of our algorithm over other geographic ad hoc routing solutions. Index Terms Ad hoc, routing, distributed, elevation, repositioning
IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 20, NO. 3, MARCH 2009 483
ADAPTIVE NEURAL NETWORK TRACKING CONTROL OF MIMO NONLINEAR SYSTEMS WITH UNKNOWN DEAD ZONES AND CONTROL DIRECTIONS
In this paper, adaptive neural network (NN) tracking control is investigated for a class of uncertain multiple-inputmultiple- output (MIMO) nonlinear systems in triangular control structure with unknown nonsymmetric dead zones and control directions. The design is based on the principle of sliding mode control and the use of Nussbaum-type functions in solving the problem of the completely unknown control directions. It is shown that the dead-zone output can be represented as a simple linear system with a static time-varying gain and bounded disturbance by introducing characteristic function. By utilizing the integral-type Lyapunov function and introducing an adaptive compensation term for the upper bound of the optimal approximation error and the dead-zone disturbance, the closed-loop control system is proved to be semiglobally uniformly ultimately bounded, with tracking errors converging to zero under the condition that the slopes of unknown dead zones are equal. Simulation results demonstrate the effectiveness of the approach.
Index Terms Adaptive control, dead zone, neural network (NN) control, Nussbaum function, sliding mode control.
Index Terms network capacity, multihop wireless networks, upper and lower bounds, linear programing
DYNAMIC AND AUTO RESPONSIVE SOLUTION FOR DISTRIBUTED DENIAL-OF-SERVICE ATTACKS DETECTION IN ISP NETWORK, 2009
Denial of service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet. Several schemes have been proposed on how to detect some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. This paper reports the design principles and evaluation results of our proposed framework that autonomously detects and accurately characterizes a wide range of flooding DDoS attacks in ISP network. Attacks are detected by the constant monitoring of propagation of abrupt traffic changes inside ISP network. For this, a newly designed flow-volume based approach (FVBA) is construct profile of the traffic normally seen in the network, and anomalies whenever traffic goes out of profile. Consideration of tolerance factors make proposed detection system scalable to the network conditions and attack loads in real time. used to identify varying varying
Six-sigma method is used to identify threshold values accurately for malicious flows characterization. FVBA has been extensively evaluated in a controlled test-bed environment. Detection thresholds and efficiency is justified using receiver operating characteristics (ROC) curve. For validation, KDD 99, a publicly available benchmark dataset is used. The results show that our proposed system gives a drastic improvement in terms of detection and false alarm rate.
Index Terms Distributed Denial of Service Attacks, False Positives, False Negatives, ISP Network, Network Security
EFFICIENT MULTI-PARTY DIGITAL SIGNATURE USING ADAPTIVE SECRET SHARING FOR LOW-POWER DEVICES IN WIRELESS NETWORKS
In this paper, we propose an efficient multi-party signature scheme for wireless networks where a given number of signees can jointly sign a document, and it can be verified by any entity who possesses the certified group public key. Our scheme is based on an efficient threshold key generation scheme, which is able to defend against both static and adaptive adversaries. Specifically, our key generation method employs the bit commitment technique to achieve efficiency in key generation and share refreshing; our share refreshing method provides proactive protection to longlasting secret and allows a new signee to join a signing group. We demonstrate that previous known approaches are not efficient in wireless networks, and the proposed multi-party signature scheme is flexible, efficient, and achieves strong security for low-power devices in wireless networks.
Index Terms Multi-party signature, cryptosystems. distributed key generation, elliptic curve
GUARANTEED DELIVERY FOR GEOGRAPHICAL ANYCASTING IN WIRELESS MULTI-SINK SENSOR AND SENSOR-ACTOR NETWORKS
In the anycasting problem, a sensor wants to report event information to one of sinks or actors. We describe the first localized anycasting algorithms that guarantee delivery for connected multi-sink sensor-actor networks. Let S(x) be the closest actor/sink to sensor x, and |xS(x)| be distance between them. In greedy phase, a node s forwards the packet to its neighbor v that minimizes the ratio of cost cost(|sv|) of sending packet to v (here we specifically apply hop-count and power consumption metrics) over the reduction in distance (|sS(s)||vS(v)|) to the closest actor/sink. A variant is to forward to the first neighbor on the shortest weighted path toward v. If none of neighbors reduces that distance then recovery mode is invoked. It is done by face traversal toward the nearest connected actor/sink, where edges are replaced by paths optimizing given cost. A hop count based and two variants of localized power aware anycasting algorithms are described. We prove guaranteed delivery property analytically and experimentally
Index Terms Deconvolution, MRFM imaging, sparse representation, Bayesian inference, MCMC methods
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 31, NO. 2, FEBRUARY 2009
HIGH PERFORMANCE COOPERATIVE TRANSMISSION PROTOCOLS BASED ON MULTIUSER DETECTION AND NETWORK CODING
Cooperative transmission is an emerging communication technique that takes advantage of the broadcast nature of wireless channels. However, due to low spectral efficiency and the requirement of orthogonal channels, its potential for use in future wireless networks is limited. In this paper, by making use of multiuser detection (MUD) and network coding, cooperative transmission protocols with high spectral efficiency, diversity order, and coding gain are developed. Compared with the traditional cooperative transmission protocols with singleuser detection, in which the diversity gain is only for one source user, the proposed MUD cooperative transmission protocols have the merit that the improvement of one users link can also benefit the other users. In addition, using MUD at the relay provides an environment in which network coding can be employed. The coding gain and high diversity order can be obtained by fully utilizing the link between the relay and the destination. From the analysis and simulation results, it is seen that the proposed protocols achieve higher diversity gain, better asymptotic efficiency, and lower bit error rate, compared to traditional MUD schemes and to existing cooperative transmission protocols. From the simulation results, the performance of the proposed scheme is near optimal as the performance gap is 0.12dB for average bit error rate (BER) 10 6 and 1.04dB for average BER 10 3, compared to two performance upper bounds.
NOVEL PACKET-LEVEL RESOURCE ALLOCATION WITH EFFECTIVE QOS PROVISIONING FOR WIRELESS MESH NETWORKS
Joint power-subcarrier-time resource allocation is imperative for wireless mesh networks due to the necessity of packet scheduling for quality-ofservice (QoS) provisioning, multi-channel communications, and opportunistic power allocation. In this work, we propose an efficient intra-cluster packet-level resource allocation approach. Our approach takes power allocation, subcarrier allocation, packet scheduling, and QoS support into account. The proposed approach combines the merits of a Karush-Kuhn-Tucker (KKT)driven approach and a genetic algorithm (GA)-based approach. It is shown to achieve a desired balance between time complexity and system performance. Bounds for the throughputs obtained by real-time and non-real-time traffic are also derived analytically.
Index TermsGenetic algorithm (GA), Karush-Kuhn-Tucker (KKT), quality-ofservice (QoS) provisioning, resource allocation, wireless mesh network (WMN).
MULTI-SERVICE LOAD SHARING FOR RESOURCE MANAGEMENT IN THE CELLULAR/WLAN INTEGRATED NETWORK
With the interworking between a cellular network and wireless local area networks (WLANs), an essential aspect of resource management is taking advantage of the overlay network structure to efficiently share the multiservice traffic load between the interworked systems. In this study, we propose a new load sharing scheme for voice and elastic data services in a cellular/WLAN integrated network. Admission control and dynamic vertical handoff are applied to pool the free bandwidths of the two systems to effectively serve elastic data traffic and improve the multiplexing gain. To further combat the cell bandwidth limitation, data calls in the cell are served under an efficient service discipline, referred to as shortest remaining processing time (SRPT) [1]. The SRPT can well exploit the heavy-tailedness of data call size to improve the resource utilization. An accurate analytical model is developed to determine an appropriate size threshold so that data calls are properly distributed to the integrated cell and WLAN, taking into account the load conditions and traffic characteristics. It is observed from extensive simulation and numerical analysis that the new scheme significantly improves the overall system performance.
Index Terms Cellular/WLAN interworking, resource management, quality of service, load sharing, vertical handoff, admission control.
Index Terms P2P overlay, super node, information exchange, topology matching, freeridding
Index Terms Broadcast advantage, distributed algorithms, dynamic control, mobility, queueing analysis, scheduling
Index Terms Energy balance, energy efficiency, mobile ad hoc networks, network lifetime, overhearing, power saving mechanism.
ADAPTIVE FUZZY FILTERING FOR ARTIFACT REDUCTION IN COMPRESSED IMAGES AND VIDEOS
A fuzzy filter adaptive to both samples activity and the relative position between samples is proposed to reduce the artifacts in compressed multidimensional signals. For JPEG images, the fuzzy spatial filter is based on the directional characteristics of ringing artifacts along the strong edges. For compressed video sequences, the motion compensated spatiotemporal filter (MCSTF) is applied to intraframe and interframe pixels to deal with both spatial and temporal artifacts. A new metric which considers the tracking characteristic of human eyes is proposed to evaluate the flickering artifacts. Simulations on compressed images and videos show improvement in artifact reduction of the proposed adaptive fuzzy filter over other conventional spatial or temporal filtering approaches. Index Terms Artifact reduction, flickering metric, compensated spatio-temporal filter. fuzzy filter, motion
Key words Broadcasting Algorithm, Collision, Delay latency. IP Address, Mobile Ad Hoc Networks,
AN XML-BASED ADL FRAMEWORK FOR AUTOMATIC GENERATION OF MULTITHREADED COMPUTER ARCHITECTURE SIMULATORS
Computer architecture simulation has always played a pivotal role in continuous innovation of computers. However, constructing or modifying a high quality simulator is time consuming and error-prone. Thus, often Architecture Description Languages (ADLs) are used to provide an abstraction layer for describing the computer architecture and automatically generating corresponding simulators. Along the line of such research, we present a novel XML-based ADL, its compiler, and a generation methodology to automatically generate multithreaded simulators for computer architecture. We utilize the industry-standard extensible markup language XML to describe the functionality and architecture of a modeled processor. Our ADL framework allows users to easily and quickly modify the structure, register set, and execution of a modeled processor. To prove its validity, we have generated several multithreaded simulators with different configurations based on the MIPS five-stage processor, and successfully tested with two programs.
Keywords Erlang, refactoring, Wrangler, duplicated code, program analysis, program transformation.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING VOL. 21, NO. 1, JANUARY 2009
Index Terms Semantic Web, knowledge retrieval, search process, query formulation.
DYNAMICS OF MULTIPLE-SELLER AND MULTIPLEBUYER SPECTRUM TRADING IN COGNITIVE RADIO NETWORKS: A GAME-THEORETIC MODELING APPROACH
We consider the problem of spectrum trading with multiple licensed users (i.e., primary users) selling spectrum opportunities to multiple unlicensed users (i.e., secondary users). The secondary users can adapt the spectrum buying behavior (i.e., evolve) by observing the variations in price and quality of spectrum offered by the different primary users or primary service providers. The primary users or primary service providers can adjust their behavior in selling the spectrum opportunities to secondary users to achieve the highest utility. In this paper, we model the evolution and the dynamic behavior of secondary users using the theory of evolutionary game. An algorithm for the implementation of the evolution process of a secondary user is also presented. To model the competition among the primary users, a noncooperative game is formulated where the Nash equilibrium is considered as the solution (in terms of size of offered spectrum to the secondary users and spectrum price). For a primary user, an iterative algorithm for strategy adaptation to achieve the solution is presented. The proposed game-theoretic framework for modeling the interactions among multiple primary users (or service providers) and multiple secondary users is used to investigate network dynamics under different system parameter settings and under system perturbation.
Index Terms Cognitive radio, dynamic spectrum sharing, spectrum trading, Nash equilibrium, evolutionary equilibrium, replicator dynamics.
TEXTURE IMAGE SEGMENTATION USING SPECTRAL HISTOGRAM AND SKELETON EXTRACTING, FEB. 2009
This paper presents a texture image segmentation algorithm using spectral histogram and skeleton extracting. No need of selecting seed pixels or specifying or deciding the number of regions is its remarkable characteristic. Based on a local spatial/frequency representation, spectral histogram consists of marginal distributions of responses of a bank of filters and encodes implicitly the local structure of images through the filtering stage and the global appearance through the histogram stage. The similarity between two spectral histograms is measured using chi2-statistic. According to the similarity among spectral histograms, the initial binary segmentation image can be obtained. Adopting skeleton extracting algorithm based on mathematical morphology, the final segmentation result can be obtained. Experiments on Brodatz textures give satisfactory results.
AGENT MINING: THE SYNERGY OF AGENTS AND DATA MINING," IEEE INTELLIGENT SYSTEMS, 2009
Autonomous agents and multiagent systems (or agents) and data mining and knowledge discovery (or data mining) are two of the most active areas in information technology. Ongoing research has revealed a number of intrinsic challenges and problems facing each area, which can't be addressed solely within the confines of the respective discipline. A profound insight of bringing these two communities together has unveiled a tremendous potential for new opportunities and wider applications through the synergy of agents and data mining. With increasing interest in this synergy, agent mining is emerging as a new research field studying the interaction and integration of agents and data mining. In this paper, we give an overall perspective of the driving forces, theoretical underpinnings, main research issues, and application domains of this field, while addressing the state-of-the-art of agent mining research and development. Our review is divided into three key research topics: agent-driven data mining, data mining-driven agents, and joint issues in the synergy of agents and data mining. This new and promising field exhibits a great potential for groundbreaking work from foundational, technological and practical perspectives
Index Terms: artificial intelligence, autonomous agents, multi-agent systems, knowledge discovery, data mining
With the tremendous growth of information available to end users through the Web, search engines come to play ever a more critical role. Nevertheless, because of their general purpose approach, it is always less uncommon that obtained result sets provide a burden of useless pages. Next generation Web architecture, represented by Semantic Web, provides the layered architecture possibly allowing to overcome this limitation. Several search engines have been proposed, which allow to increase information retrieval accuracy by exploiting a key content of Semantic Web resources, that is relations. However, in order to rank results, most of the existing solutions need to work on the whole annotated knowledge base. In this paper we propose a relation-based page rank algorithm to be used in conjunction with Semantic Web search engines that simply relies on information which could be extracted from user query and annotated resource. Relevance is measured as the probability that retrieved resource actually contains those relations whose existence was assumed by the user at the time of query definition Index Terms: Intelligent Web Services and Semantic Web, Knowledge retrieval, Search process, Query formulation
Since cameras blur the incoming light during measurement, different images of the same surface do not contain the same information about that surface. Thus, in general, corresponding points in multiple views of a scene have different image intensities. While multiple-view geometry constrains the locations of corresponding points, it does not give relationships between the signals at corresponding locations. This paper offers an elementary treatment of these relationships. We first develop the notion of "idealrdquo and "realrdquo images, corresponding to, respectively, the raw incoming light and the measured signal. This framework separates the filtering and geometric aspects of imaging. We then consider how to synthesize one view of a surface from another; if the transformation between the two views is affine, it emerges that this is possible if and only if the singular values of the affine matrix are positive. Next, we consider how to combine the information in several views of a surface into a single output image. By developing a new tool called "frequency segmentation," we show how this can be done despite not knowing the blurring kernel.
In modern supply chains, stakeholders with varying degrees of autonomy and intelligence compete against each other in a constant effort to establish beneficiary contracts and maximize their own revenue. In such competitive environments, entitiessoftware agents being a typical programming paradigminteract in a dynamic and versatile manner, so each action can cause ripple reactions and affect the overall result. In this article, the authors argue that the utilization of data mining primitives could prove beneficial in order to analyze the supplychain model and identify pivotal factors. They elaborate on the benefits of data mining analysis on a wellestablished agent supply-chain management network, both at a macro and micro level. They also analyze the results and discuss specific design choices in the context of agent performance improvement. Index Terms: intelligent agents, auctions, bidding data mining, supply chain management,
FUZZY CONTROL MODEL OPTIMIZATION FOR BEHAVIOR-CONSISTENT TRAFFIC ROUTING UNDER INFORMATION PROVISION
IEEE Transactions on 2009
This paper presents an H-infinity filtering approach to optimize a fuzzy control model used to determine behavior-consistent (BC) informationbased control strategies to improve the performance of congested dynamic traffic networks. By adjusting the associated membership function parameters to better respond to nonlinearities and modeling errors, the approach is able to enhance the computational performance of the fuzzy control model. Computational efficiency is an important aspect in this problem context, because the information strategies are required in subreal time to be real-time deployable. Experiments are performed to evaluate the effectiveness of the approach. The results indicate that the optimized fuzzy control model contributes in determining the BC information-based control strategies in significantly less computational time than when the default controller is used. Hence, the proposed H-infinity approach contributes to the development of an efficient and robust information-based control approach.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS VOL. 18, NO. 7, JULY 2007
Index Terms Secure Sockets Layer, cluster, Web servers, application server layer, load distribution, user-level communication.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING VOL. 19, NO. 7, JULY 2007
Index Terms Approximation methods, computer networks, distributed databases, distributed database query processing, distributed estimation, database systems, distributed systems.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS VOL. 18, NO. 6, JUNE 2007
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 16, NO. 9, SEPTEMBER 2004
Index Terms Workflow mining, workflow management, data mining, Petri nets
DISTRIBUTED DATA MINING IN CREDIT CARD FRAUD DETECTION CREDIT CARD TRANSACTIONS CONTINUE
To grow in number, taking an ever-larger share of the US payment system and leading to a higher rate of stolen account numbers and subsequent losses by banks. Improved fraud detection thus has become essential to maintain the viability of the US payment system. Banks have used early fraud warning systems for some years. Largescale data-mining techniques can improve on the state of the art in commercial practice. Scalable techniques to analyze massive amounts of transaction data that efficiently compute fraud detectors in a timely manner is an important problem, especially for e-commerce. Besides scalability and efficiency, the fraud-detection task exhibits technical problems that include skewed distributions of training data and nonuniform cost per error, both of which have not been widely studied in the knowledge-discovery and datamining community. In this article, we survey and evaluate a number of techniques that address these three main issues concurrently. Our proposed methods of combining multiple learned fraud detectors under a cost model are general and demonstrably useful; our empirical results demonstrate that we can significantly reduce loss due to fraud through distributed data mining of fraud models.