Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network I...Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network IDS, which is helpful to design an effective IDS. Besides, this paper suggests a scheme to represent the self profile of network. And an automated self profile extraction algorithm is provided to extract self profile from packets. The experimental results prove validity of the scheme and algorithm, which is the foundation of the immune model.展开更多
Propagation of electromagnetic waves in one-dimensional (1-D) stratifiedchiral structures is described by the 4X4 transfer-matrix method. The photonic bandgap (PBG)properties in 1-D periodical chiral media are investi...Propagation of electromagnetic waves in one-dimensional (1-D) stratifiedchiral structures is described by the 4X4 transfer-matrix method. The photonic bandgap (PBG)properties in 1-D periodical chiral media are investigated. The relation between PBGand chiralityadmittance has been analyzed. Under proper operating parameters, quite perfect multichannelfiltering properties can be obtained with the periodic structure. The photonic bandgap properties ofone-dimensional layered periodical structures that include of double negative (DNG) medium,so-called backward-wave (BW) medium are investigated. The simulation results show that the width ofthe PBG in the structure composed of chiral medium and BW medium is larger then that composed ofchiral medium and usual medium. Our analysis has shown that the usage of the negative material makesit possible to dramatically widen the band gap of one-dimensional photonic crystal.展开更多
Improving the Quality of Service (QoS) of Internet traffic is widely recognized as a critical issue for the next-generation networks. In this paper, we present a new algorithm for the active queue management, namely R...Improving the Quality of Service (QoS) of Internet traffic is widely recognized as a critical issue for the next-generation networks. In this paper, we present a new algorithm for the active queue management, namely RED-DTB. This buffer control technique is used to enforce approximate fairness among a large number of concurrent Internet flows. Like RED (Random Early Detection) algorithm, the RED-DTB mechanism can be deployed to actively respond to the gateway congestion, keep the gateway in a healthy state, and protect the fragile flows from being stolen bandwidth by greedy ones. The algorithm is based on the so-called Dual Token Bucket (DTB) pattern. That is, on the one hand, every flow is rate-limited by its own token bucket, to ensure that it can not consume more than its fair share of bandwidth; On the other hand, to make some compensations to less aggressive flows, such as connections with larger round trip time or smaller sending window, and to gain a relatively higher system utilization coefficient, all flows, depending on their individual behavior, may have a chance to fetch tokens from the public token bucket when they run out of their own share of tokens. The algorithm is analyzed and evaluated by simulations, and is proved to be effective in protecting the gateway buffer and controlling the fair allocation of bandwidth among flows.展开更多
We have realized a watermark embedding system based on audio perceptual masking and brought forward a watermark detection system using pre\|processing technology. We can detect watermark from watermarked audio without...We have realized a watermark embedding system based on audio perceptual masking and brought forward a watermark detection system using pre\|processing technology. We can detect watermark from watermarked audio without original audio by using this method. The results have indicated that this embedding and detecting method is robust, on the premise of not affecting the hearing quality, it can resist those attacks such as MPEG compressing, filtering and adding white noise.展开更多
基金the National Natural Science Foundation of China(69983005)and the Research Fund for the Doctoral Program of Higher Education(RFDP1999048602)
文摘Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network IDS, which is helpful to design an effective IDS. Besides, this paper suggests a scheme to represent the self profile of network. And an automated self profile extraction algorithm is provided to extract self profile from packets. The experimental results prove validity of the scheme and algorithm, which is the foundation of the immune model.
文摘Propagation of electromagnetic waves in one-dimensional (1-D) stratifiedchiral structures is described by the 4X4 transfer-matrix method. The photonic bandgap (PBG)properties in 1-D periodical chiral media are investigated. The relation between PBGand chiralityadmittance has been analyzed. Under proper operating parameters, quite perfect multichannelfiltering properties can be obtained with the periodic structure. The photonic bandgap properties ofone-dimensional layered periodical structures that include of double negative (DNG) medium,so-called backward-wave (BW) medium are investigated. The simulation results show that the width ofthe PBG in the structure composed of chiral medium and BW medium is larger then that composed ofchiral medium and usual medium. Our analysis has shown that the usage of the negative material makesit possible to dramatically widen the band gap of one-dimensional photonic crystal.
基金the National Natural Science Foundation of China(60132030)and the National Education Department Doctorial Foundation Project(RFDP1999048602)
文摘Improving the Quality of Service (QoS) of Internet traffic is widely recognized as a critical issue for the next-generation networks. In this paper, we present a new algorithm for the active queue management, namely RED-DTB. This buffer control technique is used to enforce approximate fairness among a large number of concurrent Internet flows. Like RED (Random Early Detection) algorithm, the RED-DTB mechanism can be deployed to actively respond to the gateway congestion, keep the gateway in a healthy state, and protect the fragile flows from being stolen bandwidth by greedy ones. The algorithm is based on the so-called Dual Token Bucket (DTB) pattern. That is, on the one hand, every flow is rate-limited by its own token bucket, to ensure that it can not consume more than its fair share of bandwidth; On the other hand, to make some compensations to less aggressive flows, such as connections with larger round trip time or smaller sending window, and to gain a relatively higher system utilization coefficient, all flows, depending on their individual behavior, may have a chance to fetch tokens from the public token bucket when they run out of their own share of tokens. The algorithm is analyzed and evaluated by simulations, and is proved to be effective in protecting the gateway buffer and controlling the fair allocation of bandwidth among flows.
文摘We have realized a watermark embedding system based on audio perceptual masking and brought forward a watermark detection system using pre\|processing technology. We can detect watermark from watermarked audio without original audio by using this method. The results have indicated that this embedding and detecting method is robust, on the premise of not affecting the hearing quality, it can resist those attacks such as MPEG compressing, filtering and adding white noise.