摘要:
The traditional congestion control mechanism of transport control protocol (TCP) has been proved cannot satisfy the wireless scenario. The extensive research has been done to understand the drawback of TCP in wireless networks. In this paper, we proposed a new congestion control algorithms for mobile ad-hoc networks (MANET) at the TCP sender side which efficiently adapts to the maximum transmission rate of a mobile wireless link, the new algorithms follow the idea of FAST TCP which uses delay as congestion measure. However, FAST TCP has limitations when used over a dynamic mobile wireless link with a high frame error ratio (FER) and frequent delay changes due to the variable rate. The new algorithms overcome this shortcoming by improving the congestion signal choice. By using analysis, we proved that the new congestion control mechanism provides superior performance over mobile wireless network environments.
作者机构:
[Lu Ansheng] Wuhan Polytech Univ, Sch Math & Comp Sci, Wuhan, Peoples R China.
会议名称:
International Conference on Intelligence Science and Information Engineering (ISIE 2012)
会议时间:
AUG 25-26, 2012
会议地点:
Lushan, PEOPLES R CHINA
会议主办单位:
Wuhan Polytech Univ, Sch Math & Comp Sci, Wuhan, Peoples R China.
会议论文集名称:
Advances in Intelligent Systems Research
关键词:
Web log;data mining;Map Reduce;Hive
摘要:
Web log data mining, is the site of ac-cess information recorded and catego-rized, and on the basis of the statistical analysis, such as the website visit quan-tity growth trends, user access to the highest time slots, access to most of the webpage, residence time, users using a search engine, the main key words, these can be called site access to the data base analysis.
摘要:
An effective method was used to bond carbon nanotubes onto metal electrodes by induction heating process. A good contact between carbon nanotubes and metal electrodes was formed. The contact resistance can be reduced to approximate 95% after induction heating process. Because the induction heating process will selective occur on the structures with high relative permeability and low electrical resistivity, this method could be utilized to realize large scale localized bonding.
作者机构:
[Guo, Fenglin; Sun, Jiuju] Wuhan Polytech Univ, Coll Math & Comp Sci, Wuhan 430023, Peoples R China.
会议名称:
International Conference on Intelligence Science and Information Engineering (ISIE 2012)
会议时间:
AUG 25-26, 2012
会议地点:
Lushan, PEOPLES R CHINA
会议主办单位:
[Guo, Fenglin;Sun, Jiuju] Wuhan Polytech Univ, Coll Math & Comp Sci, Wuhan 430023, Peoples R China.
会议论文集名称:
Advances in Intelligent Systems Research
关键词:
Subpixel;Anti-aliasing;rasterization
摘要:
In currently widely used raster display system, the phenomenon of graphic display aliasing is common, such as non- horizontal and non-vertical line or polygon drawing. According to the linear aliasing producing principle, many scholars have proposed different anti-aliasing algorithms. During the algorithms there are many issues such as algorithm precision, memory spending, algorithm complexity and so on. We put forward an image sub pixel filling algorithm based on integral operations, not only the computing speed is fast, but also the anti-aliasing effect is quit good.
会议论文集名称:
2011 3rd International Conference on Computer Design and Applications(ICCDA 2011)
(2011年第三届计算机设计与应用国际会议)论文集
关键词:
high speed network;TCP;congestion control
摘要:
With the development of optical technology and high performance computing, more and more high-speed network has emerged to support massive scientific data transfer such as High Energy Physics computing. Therefore, it is very important to study the performance of transport control protocol over high speed networks. In this paper, we focus on how to measurement the performance of variant TCP over high speed network.
作者机构:
[Luo Tao-hua; Luo, TH] Wuhan Polytech Univ, Sch Math & Comp Sci, Wuhan 430023, Peoples R China.
会议名称:
International Conference on Intelligence Science and Information Engineering (ISIE 2012)
会议时间:
AUG 25-26, 2012
会议地点:
Lushan, PEOPLES R CHINA
会议主办单位:
Wuhan Polytech Univ, Sch Math & Comp Sci, Wuhan 430023, Peoples R China.
会议论文集名称:
Advances in Intelligent Systems Research
关键词:
H.264;the energy relation of DCT block;motion vectors;FCM
摘要:
According to the new H.264 coding standard, a new twofold authentication watermarking scheme based on energy relationship of block DCT coefficients and motion vector was proposed, which was embedded into the motion vector with AC coefficients of the middle frequency in the DCT by using the energy relationship between video frames' block DCT coefficients and the full frame DCT coefficients, and without increasing the complexity of H.264 coding. In order to more exactly reflect the H.264 video content, the macroblock and the horizontal component of motion vector to achieve the gold of hiding the secret and verifying information in the video. Experimental results show that the method is robust to small noise and H.264 recompression, and can detect malicious video semantic content tamper such as code-switching and recompression that may be accepted by a common global authentication way.
摘要:
Experimental teaching is a crucial part of Higher Education.Driven by reasonable experiment teaching goal and combined with the proper guidance of teachers,we can improve students’ experimental initia
作者机构:
[Liu Changhua; Ren Xiuqing] Wuhan Polytech Univ, Sch Math & Comp, Wuhan 430023, Peoples R China.
会议名称:
7th International Conference on System of Systems Engineering (SoSE)
会议时间:
JUL 16-19, 2012
会议地点:
Genoa, ITALY
会议主办单位:
[Liu Changhua;Ren Xiuqing] Wuhan Polytech Univ, Sch Math & Comp, Wuhan 430023, Peoples R China.
关键词:
Stream Control Transmission Protocol (SCTP);Transmission Control Protocol(TCP);Throughput;NS2
摘要:
Following the TCP and UDP, stream control transmission protocol (SCTP) has become a new transmission layer protocol. This protocol is a connection-oriented reliable transmission protocol, with the features of multiple hosts, multiple streams, and so on. Because of its excellent properties, SCTP is also widely used in IP network to transmit signal. Based on the SCTP protocol, this paper proposes a new calculation model for throughput, and then uses network Simulation tool NS2 to improve the calculation model, confirming that this model can effectively calculate the throughput of the SCTP protocol.
作者机构:
[Lu Deng-bo; Lu, DB] Wuhan Polytech Univ, Sch Math & Comp Sci, Wuhan 430023, Peoples R China.
会议名称:
International Conference on Intelligence Science and Information Engineering (ISIE 2012)
会议时间:
AUG 25-26, 2012
会议地点:
Lushan, PEOPLES R CHINA
会议主办单位:
Wuhan Polytech Univ, Sch Math & Comp Sci, Wuhan 430023, Peoples R China.
会议论文集名称:
Advances in Intelligent Systems Research
关键词:
Search;Binary search;Search length
摘要:
A modified binary search algorithm is described in this paper. When the ordered list is long and the item to be accessed is near the prior one. The new algorithm with very little cost gives much less path length than the old one under the worst condition and the average condition.
会议论文集名称:
2011 3rd International Conference on Computer Design and Applications(ICCDA 2011)
(2011年第三届计算机设计与应用国际会议)论文集
关键词:
multimedia;web service;cellular technology
摘要:
IP Multimedia Subsystem (IMS), is considered the "next big thing" in the telecommunications industry. This is the third Generation Partnership Project (3GPP) standardization of next generation network (NGN) architecture integration, such as your long term existence of 3G mobile phones and portable digital devices IP mobile network services. In this paper, we introduce a novel SOA Parlay of the Web services model, based on IMS.
摘要:
A new parameter estimation-pattern search algorithm based on maximum likelihood estimation is used to estimate the parameters of generalized hyperbolic distribution, normal inverse Gaussian distribution and hyperbolic distribution, which are used to fit the log-return of Shanghai composite index. The goodness of fit is tested based on Anderson & Darling distance and FOF distance who pay more attention to tail distances of some distribution. Monte Carlo simulation are used to determin the critical values of Anderson & Darling distance and FOF distance of different distributions. Value at risk (VaR) and conditional value at risk (CVaR) are estimated for the fitted generalized hyperbolic distribution, normal inverse Gaussian distribution and hyperbolic distributio. The results show that generalized hyperbolic distribution family is more suitable for risk measure such as VaR and CVaR than normal distribution.
摘要:
The basic and improved algorithms of PSO focus on how to effectively search the optimal solution in the solution space using one of the particle swarm. However, the particles are always chasing the global optimal point and such points currently found on their way of search, rapidly leading their speed down to zero and hence being restrained in the local minimum. Consequently, the convergence or early maturity of particles exists. The improved PSO is based on the enlightenment of BP neural network while the improvement is similar to smooth the weight through low-pass filter. The test of classical functions show that the PSO provides a promotion in the convergence precision and calculation velocity to a certain extent.
作者机构:
[Sun, Ping] Wuhan Polytech Univ, Sch Math & Comp Sci, Wuhan, Peoples R China.
会议名称:
International Conference on Intelligence Science and Information Engineering (ISIE 2012)
会议时间:
AUG 25-26, 2012
会议地点:
Lushan, PEOPLES R CHINA
会议主办单位:
Wuhan Polytech Univ, Sch Math & Comp Sci, Wuhan, Peoples R China.
会议论文集名称:
Advances in Intelligent Systems Research
关键词:
high speed network;TCP;congestion control
摘要:
With the development of optical technology and high performance computing, more and more high-speed network has emerged to support massive scientific data transfer such as High Energy Physics computing. Therefore, it is very important to study the performance of transport control protocol over high speed networks. In this paper, we focus on how to measurement the performance of variant TCP over high speed network.
摘要:
A multi-policy supporting method for system security is proposed. We import state control policy, and manage behavior control policy instead of policies about access control models. Furthermore, the decision rules about single policy and multi-policies are discussed. At last, a sample about the method is provided, which proves that the method is correct.
摘要:
Limited diffracting waves which have great application potential for field focus depth enlargement in acoustic imaging systems. The calculation of limited diffracting waves acoustic fields is most often based on the spatial impulse response approach as suggested by field is found from a convolution between the acceleration of Tupholme and Stepanishen. This paper shows the limited diffracting waves acoustic based on annular planar transducers, it can be found from the crossings between the boundary of the aperture and a spherical wave emitted from the field point onto the plane of the emitting aperture. Summing the angles of the arcs within the aperture readily yields the spatial impulse response for a point in space. The approach not only make it easy to calculate of limited diffracting waves acoustic fields but also improve the accuracy of simulation results of acoustic fields.
关键词:
World Wide Web;Geographical Information Systems;three-tier mode;Component Object Model;three-tier browser-server architecture
摘要:
We designed an Efficient World Wide Web Geographical Information Systems (WebGis). We firstly presented a novel three-tier mode of WebGis. Then, we designed an efficient Gis server. Finally, we designed in detail the function of each module.
作者机构:
[Liu, Bing; Liu, B] Wuhan Polytech Univ, Coll Math & Comp, Wuhan, Peoples R China.
会议名称:
International Conference on Intelligence Science and Information Engineering (ISIE 2012)
会议时间:
AUG 25-26, 2012
会议地点:
Lushan, PEOPLES R CHINA
会议主办单位:
Wuhan Polytech Univ, Coll Math & Comp, Wuhan, Peoples R China.
会议论文集名称:
Advances in Intelligent Systems Research
关键词:
network;protocol analysis;security
摘要:
Network sniffing and intrude detection are very important method for network security, and the packet sniffer and capture is key issue to the basic technology of network intrusion. Whether monitoring network to identify performance issues, debugging an application, or have found an application on network that cannot be recognized, capture is an important technology. Some protocols are easy to identify and understand, even when used on non-standard ports. Others need more investigation to understand what they are doing and what information they are exchanging. In this paper, we will study the techniques for performing detailed analysis of the protocols.