Nanjing University of Science & Technology

Displaying 1-15 of 15 results

  • White Papers // Oct 2013

    Botnet Detection Based on Correlation of Malicious Behaviors

    Botnet has become the most serious security threats on the current Internet infrastructure. Botnets can not only be implemented by using existing well known bot tools, but can also be constructed from scratch and developed in own way, which makes the botnet detection a challenging problem. In this paper, the...

    Provided By Nanjing University of Science & Technology

  • White Papers // Apr 2013

    Network Coding for Energy-Efficient Distributed Storage System in Wireless Sensor Networks

    A network coding-based scheme is proposed to improve the energy efficiency of distributed storage systems in WSNs (Wireless Sensor Networks), which mainly focuses on two problems: firstly, consideration is given to effective distributed storage technology in WSNs; secondly, the authors address how to repair the data in failed storage nodes...

    Provided By Nanjing University of Science & Technology

  • White Papers // Apr 2013

    A Distributed and Energy-efficient Clustering Method for Hierarchical Wireless Sensor Networks

    In the hierarchical Wireless Sensor Network (WSN), cluster-based network architecture can enhance network self-control capability and resource efficiency, and prolong the whole network lifetime. Thus, clustering has also been a topic of interest in many different disciplines. Finding an energy-effective and efficient way to generate cluster is very important in...

    Provided By Nanjing University of Science & Technology

  • White Papers // Apr 2012

    A Novel Approach of KPCA and SVM for Intrusion Detection

    A novel hybrid approach of Kernel Principal Component Analysis (KPCA) and improved Support Vector Machine (SVM) using Genetic optimization Algorithm (GA) is proposed for intrusion detection. The original data is normalized preprocessing, KPCA is used as a preprocessor of SVM to extract the principal features of the normalized data, SVM...

    Provided By Nanjing University of Science & Technology

  • White Papers // Mar 2012

    A Network Covert Channel Based on Packet Classification

    A network covert channel violates security rules and leaks information imperceptibly. Many researchers have been studying how to construct it, and the basic methods involve exploiting packets head, packets sorting and packets timing, etc. To construct a more secret covert channel, this paper proposes a novel approach based on packet...

    Provided By Nanjing University of Science & Technology

  • White Papers // Jan 2012

    LMI-Based Fault Detection Fuzzy Observer Design with Multiple Performance Constraints for a Class of Non-Linear Systems: Comparative Study

    Over the last decades, many researchers have paid attention to the problem of observer-based Fault Detection and Diagnosis (FDD) for dynamic systems subjected to various possible faults. Most of the early studies are focused on linear systems. In more recent years, observer-based Fault Detection (FD) for nonlinear systems has received...

    Provided By Nanjing University of Science & Technology

  • White Papers // Dec 2011

    Automatic Classification Method for XML Documents

    With XML becomes a de-facto standard for exchanging and presenting information, efficient and accurate classification for the various XML documents has become a focus of data mining and search engine. Based on the theoretical analysis of Principal Component Analysis (PCA), a new automatic classification method which is based on representation...

    Provided By Nanjing University of Science & Technology

  • White Papers // Oct 2011

    Energy-Efficient Wireless Sensor Networks: A Novel Dynamic Clustered and Cross-Layer Cooperation Approach

    In Wireless Sensor Networks (WSNs), energy efficiency is a foremost challenge. This paper studies energy-efficiency from cross-layer design in clustered WSNs. The authors propose a dynamic clustering method that combines TDMA-based real clustering and CSMA-based virtual clustering. It achieves the whole network synchronization in a reasonable scale. This clustering mechanism...

    Provided By Nanjing University of Science & Technology

  • White Papers // Jul 2011

    The Application and Research of Classification of POCP SMS Based on Text Mining

    People's Opinion Collection and Processing system (POCP) is the electronic petition system with the function of website, hot line, E-mail and Short Message Service (SMS), which is developed for Fuzhou Municipal Committee in JiangXi province. With the increasing demands of government service quality, the number of opinions brought by the...

    Provided By Nanjing University of Science & Technology

  • White Papers // May 2011

    Discretized Gabor Statistical Models for Face Recognition

    Aiming to the use of texture information of Gabor filtered face images, the authors present a new method matching multi-channel Gabor marginal statistical models for face recognition. Given partitions on channel Gabor magnitude spaces, the ensemble of magnitude sets of Gaborfaces is modeled as a probabilistic realization of a set...

    Provided By Nanjing University of Science & Technology

  • White Papers // Apr 2011

    Design of Co-Simulation for Wireless Networked Control System With OPNET and Matlab

    Wireless Networked Control System (WNCS) is given profound attention because of dynamic, flexibility and inexpensiveness. However, it is difficult to use a single simulator to simulate a WNCS which is a hybrid system. A co-simulation framework based on OPNET, Matlab and C++ is presented to capture both the system dynamics...

    Provided By Nanjing University of Science & Technology

  • White Papers // Feb 2011

    Cross Layer Transmission for AOS Packet Service

    In this paper, the AOS packet service data transfers structure is presented first. Based on it, the effective throughput rate of AOS packet service is analyzed. Then, in order to improve the effective throughput rate, a scheme of AOS cross layer transmission system is presented. In the proposed scheme, based...

    Provided By Nanjing University of Science & Technology

  • White Papers // Dec 2010

    Normalized Direct Linear Discriminant Analysis With Its Application to Face Recognition

    The dimensionality of sample is often larger than the number of training samples for high-dimensional pattern recognition such as face recognition. Here, Linear Discriminant Analysis (LDA) cannot be performed directly because of the singularity of the within-class scatter matrix. This is so-called "Small Sample Size" (SSS) problem. PCA plus LDA...

    Provided By Nanjing University of Science & Technology

  • White Papers // Nov 2010

    Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression

    In this paper, a visible and removable watermarking scheme in JPEG compression is presented. In the scheme, a secure template is generated to modulate the embedding strength of watermark and host image, separately. The template generates different versions of watermarked images which can be seen visually the same, and the...

    Provided By Nanjing University of Science & Technology

  • White Papers // Jun 2010

    Based on Ant Colony Multicast Trees of Wireless Sensor Network Routing Research

    High efficient routing is an important issue in the limited energy resource wireless sensor networks. Based on the principle of ant colony algorithm this paper proposes a new ant colony algorithm based on multi-cast trees, and applies it to the solution of multi-sources network multi-cast routing. Ants moves constantly on...

    Provided By Nanjing University of Science & Technology

  • White Papers // Jul 2011

    The Application and Research of Classification of POCP SMS Based on Text Mining

    People's Opinion Collection and Processing system (POCP) is the electronic petition system with the function of website, hot line, E-mail and Short Message Service (SMS), which is developed for Fuzhou Municipal Committee in JiangXi province. With the increasing demands of government service quality, the number of opinions brought by the...

    Provided By Nanjing University of Science & Technology

  • White Papers // Dec 2011

    Automatic Classification Method for XML Documents

    With XML becomes a de-facto standard for exchanging and presenting information, efficient and accurate classification for the various XML documents has become a focus of data mining and search engine. Based on the theoretical analysis of Principal Component Analysis (PCA), a new automatic classification method which is based on representation...

    Provided By Nanjing University of Science & Technology

  • White Papers // Dec 2010

    Normalized Direct Linear Discriminant Analysis With Its Application to Face Recognition

    The dimensionality of sample is often larger than the number of training samples for high-dimensional pattern recognition such as face recognition. Here, Linear Discriminant Analysis (LDA) cannot be performed directly because of the singularity of the within-class scatter matrix. This is so-called "Small Sample Size" (SSS) problem. PCA plus LDA...

    Provided By Nanjing University of Science & Technology

  • White Papers // Nov 2010

    Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression

    In this paper, a visible and removable watermarking scheme in JPEG compression is presented. In the scheme, a secure template is generated to modulate the embedding strength of watermark and host image, separately. The template generates different versions of watermarked images which can be seen visually the same, and the...

    Provided By Nanjing University of Science & Technology

  • White Papers // Mar 2012

    A Network Covert Channel Based on Packet Classification

    A network covert channel violates security rules and leaks information imperceptibly. Many researchers have been studying how to construct it, and the basic methods involve exploiting packets head, packets sorting and packets timing, etc. To construct a more secret covert channel, this paper proposes a novel approach based on packet...

    Provided By Nanjing University of Science & Technology

  • White Papers // Oct 2013

    Botnet Detection Based on Correlation of Malicious Behaviors

    Botnet has become the most serious security threats on the current Internet infrastructure. Botnets can not only be implemented by using existing well known bot tools, but can also be constructed from scratch and developed in own way, which makes the botnet detection a challenging problem. In this paper, the...

    Provided By Nanjing University of Science & Technology

  • White Papers // Apr 2012

    A Novel Approach of KPCA and SVM for Intrusion Detection

    A novel hybrid approach of Kernel Principal Component Analysis (KPCA) and improved Support Vector Machine (SVM) using Genetic optimization Algorithm (GA) is proposed for intrusion detection. The original data is normalized preprocessing, KPCA is used as a preprocessor of SVM to extract the principal features of the normalized data, SVM...

    Provided By Nanjing University of Science & Technology

  • White Papers // Jan 2012

    LMI-Based Fault Detection Fuzzy Observer Design with Multiple Performance Constraints for a Class of Non-Linear Systems: Comparative Study

    Over the last decades, many researchers have paid attention to the problem of observer-based Fault Detection and Diagnosis (FDD) for dynamic systems subjected to various possible faults. Most of the early studies are focused on linear systems. In more recent years, observer-based Fault Detection (FD) for nonlinear systems has received...

    Provided By Nanjing University of Science & Technology

  • White Papers // Apr 2013

    Network Coding for Energy-Efficient Distributed Storage System in Wireless Sensor Networks

    A network coding-based scheme is proposed to improve the energy efficiency of distributed storage systems in WSNs (Wireless Sensor Networks), which mainly focuses on two problems: firstly, consideration is given to effective distributed storage technology in WSNs; secondly, the authors address how to repair the data in failed storage nodes...

    Provided By Nanjing University of Science & Technology

  • White Papers // Apr 2013

    A Distributed and Energy-efficient Clustering Method for Hierarchical Wireless Sensor Networks

    In the hierarchical Wireless Sensor Network (WSN), cluster-based network architecture can enhance network self-control capability and resource efficiency, and prolong the whole network lifetime. Thus, clustering has also been a topic of interest in many different disciplines. Finding an energy-effective and efficient way to generate cluster is very important in...

    Provided By Nanjing University of Science & Technology

  • White Papers // Feb 2011

    Cross Layer Transmission for AOS Packet Service

    In this paper, the AOS packet service data transfers structure is presented first. Based on it, the effective throughput rate of AOS packet service is analyzed. Then, in order to improve the effective throughput rate, a scheme of AOS cross layer transmission system is presented. In the proposed scheme, based...

    Provided By Nanjing University of Science & Technology

  • White Papers // Oct 2011

    Energy-Efficient Wireless Sensor Networks: A Novel Dynamic Clustered and Cross-Layer Cooperation Approach

    In Wireless Sensor Networks (WSNs), energy efficiency is a foremost challenge. This paper studies energy-efficiency from cross-layer design in clustered WSNs. The authors propose a dynamic clustering method that combines TDMA-based real clustering and CSMA-based virtual clustering. It achieves the whole network synchronization in a reasonable scale. This clustering mechanism...

    Provided By Nanjing University of Science & Technology

  • White Papers // Jun 2010

    Based on Ant Colony Multicast Trees of Wireless Sensor Network Routing Research

    High efficient routing is an important issue in the limited energy resource wireless sensor networks. Based on the principle of ant colony algorithm this paper proposes a new ant colony algorithm based on multi-cast trees, and applies it to the solution of multi-sources network multi-cast routing. Ants moves constantly on...

    Provided By Nanjing University of Science & Technology

  • White Papers // Apr 2011

    Design of Co-Simulation for Wireless Networked Control System With OPNET and Matlab

    Wireless Networked Control System (WNCS) is given profound attention because of dynamic, flexibility and inexpensiveness. However, it is difficult to use a single simulator to simulate a WNCS which is a hybrid system. A co-simulation framework based on OPNET, Matlab and C++ is presented to capture both the system dynamics...

    Provided By Nanjing University of Science & Technology

  • White Papers // May 2011

    Discretized Gabor Statistical Models for Face Recognition

    Aiming to the use of texture information of Gabor filtered face images, the authors present a new method matching multi-channel Gabor marginal statistical models for face recognition. Given partitions on channel Gabor magnitude spaces, the ensemble of magnitude sets of Gaborfaces is modeled as a probabilistic realization of a set...

    Provided By Nanjing University of Science & Technology