The performance loss of an approximately 3 dB signal-to-noise ratio is always paid with conventional differential detection compared to the related coherent detection. A new detection scheme consisting of two steps is...The performance loss of an approximately 3 dB signal-to-noise ratio is always paid with conventional differential detection compared to the related coherent detection. A new detection scheme consisting of two steps is proposed for the differential unitary space-time modulation (DUSTM) system. In the first step, the data sequence is estimated by conventional unitary space-time demodulation (DUSTD) and differentially encoded again to produce an initial estimate of the transmitted symbol stream. In the second step, the initial estimate of the symbol stream is utilized to initialize an expectation maximization (EM)-based iterative detector. In each iteration, the most recent detected symbol stream is employed to estimate the channel, which is then used to implement coherent sequence detection to refine the symbol stream. Simulation results show that the proposed detection scheme performs much better than the conventional DUSTD after several iterations.展开更多
With remote sensing information products becoming increasingly varied and arguably improved, scientific applications of such products rely on their quality assessment. In an operational context such as the NASA (Natio...With remote sensing information products becoming increasingly varied and arguably improved, scientific applications of such products rely on their quality assessment. In an operational context such as the NASA (National Aeronautics and Space Administration) information production based on the MODIS (Moderate Resolution Imaging Spectroradiometer) instrument on board Earth Observing System (EOS) Terra and Aqua satellites, efficient ways of detecting product anomaly, i.e., to discriminate between product artifacts and real changes in Earth processes being monitored, are extremely important to assist and inform the user communities about potential unreliability in the products. A technique for anomaly detection, known as MAD (the median of absolute deviate from the median), in MODIS land products via time series analysis is described, which can handle intra- and in-ter-annual variation in the data by using MAD statistics of the original data and their first-order difference. This method is shown to be robust and work across major land products, including NDVI, active fire, snow cover, and surface reflectance, and its applicabil-ity to multi-disciplinary products is anticipated.展开更多
Ebola virus (EBOV) and Marburg virus (MARV) are causative agents of severe hemorrhagic fever with high mortality rates in humans and non-human primates and there is currently no licensed vaccine or therapeutics. T...Ebola virus (EBOV) and Marburg virus (MARV) are causative agents of severe hemorrhagic fever with high mortality rates in humans and non-human primates and there is currently no licensed vaccine or therapeutics. To date, there is no specific laboratory diagnostic test in China, while there is a national need to provide differential diagnosis during outbreaks and for instituting acceptable quarantine procedures. In this study, the TaqMan RT-PCR assays targeting the nucleoprotein genes of the Zaire Ebolavirus (ZEBOV) and MARV were developed and their sensitivities and specificities were investigated. Our results indicated that the assays were able to make reliable diagnosis over a wide range of virus copies from 103 to 109, corresponding to the threshold of a standard RNA transcript. The results showed that there were about 101 RNA copies per milliliter of virus culture supernatant, equivalent to 10,000 RNA molecules per infectious virion, suggesting the presence of many non-infectious particles. These data indicated that the TaqMan RT-PCR assays developed in this study will be suitable展开更多
FLUSH+RELOAD attack is recently proposed as a new type of Cache timing attacks.There are three essential factors in this attack,which are monitored instructions.threshold and waiting interval.However,existing literatu...FLUSH+RELOAD attack is recently proposed as a new type of Cache timing attacks.There are three essential factors in this attack,which are monitored instructions.threshold and waiting interval.However,existing literature seldom exploit how and why they could affect the system.This paper aims to study the impacts of these three parameters,and the method of how to choose optimal values.The complete rules for choosing the monitored instructions based on necessary and sufficient condition are proposed.How to select the optimal threshold based on Bayesian binary signal detection principal is also proposed.Meanwhile,the time sequence model of monitoring is constructed and the calculation of the optimal waiting interval is specified.Extensive experiments are conducted on RSA implemented with binary square-and-multiply algorithm.The results show that the average success rate of full RSA key recovery is89.67%.展开更多
The objective of conformance testing is to determine whether an implementation under test (IUT) conforms to its specification. In distributed test architecture where there are multiple remote testers, the objective ca...The objective of conformance testing is to determine whether an implementation under test (IUT) conforms to its specification. In distributed test architecture where there are multiple remote testers, the objective can be complicated by the fact that testers may encounter controllability and observability problems during the application of a test sequence. A certain amount of work has been done in the area of generating test sequence that is free from these problems. However, few researchers investigate them from the aspect of test execution. This work studies the test execution phase when test sequences are applied to the imple- mentation and it is pointed out that controllability and observability problems can be resolved if and only if the test system im- plements some timing constraints. When determining these constraints, the dynamic time information during test is taken into account, which reduces the test execution time and improves test efficiency further.展开更多
With the conditions of small data size and low Signal-to-Noise Ratio (SNR), the application of Higher Order Statistics (HOS) is restrained not only by its high estimation variance,but also by its low estimation precis...With the conditions of small data size and low Signal-to-Noise Ratio (SNR), the application of Higher Order Statistics (HOS) is restrained not only by its high estimation variance,but also by its low estimation precision. Therefore, a modified HOS based Time Delay Estimation (TDE) algorithm is proposed to overcome these problems. Comparing with the conventional TDE algorithms, the estimation variance is improved greatly. A typical simulation example is completed in order to test the performance of the algorithm proposed, which shows that the proposed algorithm has advantages over the traditional ones in both detection performance and computation efficiency.展开更多
Detecting traffic anomalies is essential for diagnosing attacks. HighSp eed Backbone Net works (HSBN) require Traffic Anomaly Detection Systems (TADS) which are accurate (high detec tion and low false positive ra...Detecting traffic anomalies is essential for diagnosing attacks. HighSp eed Backbone Net works (HSBN) require Traffic Anomaly Detection Systems (TADS) which are accurate (high detec tion and low false positive rates) and efficient. The proposed approach utilizes entropy as traffic distributions metric over some traffic dimensions. An efficient algorithm, having low computational and space complexity, is used to estimate entro py. Entropy values over all dimensions are展开更多
Towards the problems of existing detection methods,a novel real-time detection method(DMFIF) based on fractal and information fusion is proposed.It focuses on the intrinsic macroscopic characteristics of network,which...Towards the problems of existing detection methods,a novel real-time detection method(DMFIF) based on fractal and information fusion is proposed.It focuses on the intrinsic macroscopic characteristics of network,which reflect not the "unique" abnormalities of P2P botnets but the "common" abnormalities of them.It regards network traffic as the signal,and synthetically considers the macroscopic characteristics of network under different time scales with the fractal theory,including the self-similarity and the local singularity,which don't vary with the topology structures,the protocols and the attack types of P2P botnet.At first detect traffic abnormalities of the above characteristics with the nonparametric CUSUM algorithm,and achieve the final result by fusing the above detection results with the Dempster-Shafer evidence theory.Moreover,the side effect on detecting P2P botnet which web applications generated is considered.The experiments show that DMFIF can detect P2P botnet with a higher degree of precision.展开更多
This paper proposes a method which uses the extended edge analysis to supplement the inaccurate edge information for better vehicle detection during vehicle detection. The extended edge analysis method detects two ver...This paper proposes a method which uses the extended edge analysis to supplement the inaccurate edge information for better vehicle detection during vehicle detection. The extended edge analysis method detects two vertical edge items, which are the borderlines of both sides of the vehicle, by extending the horizontal edges inaccurately due to the illumination or noise existing on the image. The proposed method extracts the horizontal edges with the method of merging edges by using the horizontal edge information inside the Region of Interest (ROI), which is set up on the pre-processing step. The bottona line is determined by detecting the shadow regions of the vehicle from the extracted hoodzontal edge one. The general width of the vehicle detecting and the extended edge analyzing methods are carried out side by side on the bottom line of the vehicle to determine width of the vehicle. Finally, the finmal vehicle is detected through the verification step. On the road image with conaplicate background, the vehicle detecting method based on the extended edge analysis is more efficient than the existing vehicle detecting method which uses the edge information. The excellence of the proposed vehicle detecting method is confirmed by carrying out the vehicle detecting experiment on the complicate road image.展开更多
A decoding method complemented by Maximum Likelihood (ML) detection for V-BLAST (Verti- cal Bell Labs Layered Space-Time) system is presented. The ranked layers are divided into several groups. ML decoding is performe...A decoding method complemented by Maximum Likelihood (ML) detection for V-BLAST (Verti- cal Bell Labs Layered Space-Time) system is presented. The ranked layers are divided into several groups. ML decoding is performed jointly for the layers within the same group while the Decision Feedback Equalization (DFE) is performed for groups. Based on the assumption of QPSK modulation and the quasi-static flat fading channel, simulations are made to testify the performance of the proposed algorithm. The results show that the algorithm outperforms the original V-BLAST detection dramatically in Symbol Error Probability (SEP) per- formance. Specifically, Signal-to-Noise Ratio (SNR) improvement of 3.4dB is obtained for SEP of 10?2 (4×4 case), with a reasonable complexity maintained.展开更多
基金The National Natural Science Foundation of China(No60572072,60496311)the National High Technology Research and Development Program of China (863Program) (No2006AA01Z264)+1 种基金the National Basic Research Program of China (973Program) (No2007CB310603)the PhD Programs Foundation of Ministry of Educa-tion of China (No20060286016)
文摘The performance loss of an approximately 3 dB signal-to-noise ratio is always paid with conventional differential detection compared to the related coherent detection. A new detection scheme consisting of two steps is proposed for the differential unitary space-time modulation (DUSTM) system. In the first step, the data sequence is estimated by conventional unitary space-time demodulation (DUSTD) and differentially encoded again to produce an initial estimate of the transmitted symbol stream. In the second step, the initial estimate of the symbol stream is utilized to initialize an expectation maximization (EM)-based iterative detector. In each iteration, the most recent detected symbol stream is employed to estimate the channel, which is then used to implement coherent sequence detection to refine the symbol stream. Simulation results show that the proposed detection scheme performs much better than the conventional DUSTD after several iterations.
基金Funded by the National 973 Program of China(No.2006CB701302).
文摘With remote sensing information products becoming increasingly varied and arguably improved, scientific applications of such products rely on their quality assessment. In an operational context such as the NASA (National Aeronautics and Space Administration) information production based on the MODIS (Moderate Resolution Imaging Spectroradiometer) instrument on board Earth Observing System (EOS) Terra and Aqua satellites, efficient ways of detecting product anomaly, i.e., to discriminate between product artifacts and real changes in Earth processes being monitored, are extremely important to assist and inform the user communities about potential unreliability in the products. A technique for anomaly detection, known as MAD (the median of absolute deviate from the median), in MODIS land products via time series analysis is described, which can handle intra- and in-ter-annual variation in the data by using MAD statistics of the original data and their first-order difference. This method is shown to be robust and work across major land products, including NDVI, active fire, snow cover, and surface reflectance, and its applicabil-ity to multi-disciplinary products is anticipated.
基金Supported by Important National Science&Technology Specific Projects(2009ZX10004-504,2009ZX09301-014)National Natural Science Foundation of China(81072675)
文摘Ebola virus (EBOV) and Marburg virus (MARV) are causative agents of severe hemorrhagic fever with high mortality rates in humans and non-human primates and there is currently no licensed vaccine or therapeutics. To date, there is no specific laboratory diagnostic test in China, while there is a national need to provide differential diagnosis during outbreaks and for instituting acceptable quarantine procedures. In this study, the TaqMan RT-PCR assays targeting the nucleoprotein genes of the Zaire Ebolavirus (ZEBOV) and MARV were developed and their sensitivities and specificities were investigated. Our results indicated that the assays were able to make reliable diagnosis over a wide range of virus copies from 103 to 109, corresponding to the threshold of a standard RNA transcript. The results showed that there were about 101 RNA copies per milliliter of virus culture supernatant, equivalent to 10,000 RNA molecules per infectious virion, suggesting the presence of many non-infectious particles. These data indicated that the TaqMan RT-PCR assays developed in this study will be suitable
基金supported by National Natural Science Foundation of China (No.61472357,No.61309021,No.61272491, No.61173191)the Major State Basic Research Development Program(973 Plan) of China under the grant 2013CB338004
文摘FLUSH+RELOAD attack is recently proposed as a new type of Cache timing attacks.There are three essential factors in this attack,which are monitored instructions.threshold and waiting interval.However,existing literature seldom exploit how and why they could affect the system.This paper aims to study the impacts of these three parameters,and the method of how to choose optimal values.The complete rules for choosing the monitored instructions based on necessary and sufficient condition are proposed.How to select the optimal threshold based on Bayesian binary signal detection principal is also proposed.Meanwhile,the time sequence model of monitoring is constructed and the calculation of the optimal waiting interval is specified.Extensive experiments are conducted on RSA implemented with binary square-and-multiply algorithm.The results show that the average success rate of full RSA key recovery is89.67%.
文摘The objective of conformance testing is to determine whether an implementation under test (IUT) conforms to its specification. In distributed test architecture where there are multiple remote testers, the objective can be complicated by the fact that testers may encounter controllability and observability problems during the application of a test sequence. A certain amount of work has been done in the area of generating test sequence that is free from these problems. However, few researchers investigate them from the aspect of test execution. This work studies the test execution phase when test sequences are applied to the imple- mentation and it is pointed out that controllability and observability problems can be resolved if and only if the test system im- plements some timing constraints. When determining these constraints, the dynamic time information during test is taken into account, which reduces the test execution time and improves test efficiency further.
基金Supported by the National Natural Science Foundation of China(No.60072027)
文摘With the conditions of small data size and low Signal-to-Noise Ratio (SNR), the application of Higher Order Statistics (HOS) is restrained not only by its high estimation variance,but also by its low estimation precision. Therefore, a modified HOS based Time Delay Estimation (TDE) algorithm is proposed to overcome these problems. Comparing with the conventional TDE algorithms, the estimation variance is improved greatly. A typical simulation example is completed in order to test the performance of the algorithm proposed, which shows that the proposed algorithm has advantages over the traditional ones in both detection performance and computation efficiency.
基金supported by the National High-Tech Research and Development Plan of China under Grant No.2011AA010702
文摘Detecting traffic anomalies is essential for diagnosing attacks. HighSp eed Backbone Net works (HSBN) require Traffic Anomaly Detection Systems (TADS) which are accurate (high detec tion and low false positive rates) and efficient. The proposed approach utilizes entropy as traffic distributions metric over some traffic dimensions. An efficient algorithm, having low computational and space complexity, is used to estimate entro py. Entropy values over all dimensions are
基金supported by National High Technical Research and Development Program of China(863 Program)under Grant No.2011AA7031024GNational Natural Science Foundation of China under Grant No.90204014
文摘Towards the problems of existing detection methods,a novel real-time detection method(DMFIF) based on fractal and information fusion is proposed.It focuses on the intrinsic macroscopic characteristics of network,which reflect not the "unique" abnormalities of P2P botnets but the "common" abnormalities of them.It regards network traffic as the signal,and synthetically considers the macroscopic characteristics of network under different time scales with the fractal theory,including the self-similarity and the local singularity,which don't vary with the topology structures,the protocols and the attack types of P2P botnet.At first detect traffic abnormalities of the above characteristics with the nonparametric CUSUM algorithm,and achieve the final result by fusing the above detection results with the Dempster-Shafer evidence theory.Moreover,the side effect on detecting P2P botnet which web applications generated is considered.The experiments show that DMFIF can detect P2P botnet with a higher degree of precision.
基金supported bythe MKE(The Ministry of Knowledge Economy,Korea),the ITRC(Information Technology ResearchCenter)support program(NIPA-2010-(C1090-1021-0010)),the Brain Korea 21 Project in 2010
文摘This paper proposes a method which uses the extended edge analysis to supplement the inaccurate edge information for better vehicle detection during vehicle detection. The extended edge analysis method detects two vertical edge items, which are the borderlines of both sides of the vehicle, by extending the horizontal edges inaccurately due to the illumination or noise existing on the image. The proposed method extracts the horizontal edges with the method of merging edges by using the horizontal edge information inside the Region of Interest (ROI), which is set up on the pre-processing step. The bottona line is determined by detecting the shadow regions of the vehicle from the extracted hoodzontal edge one. The general width of the vehicle detecting and the extended edge analyzing methods are carried out side by side on the bottom line of the vehicle to determine width of the vehicle. Finally, the finmal vehicle is detected through the verification step. On the road image with conaplicate background, the vehicle detecting method based on the extended edge analysis is more efficient than the existing vehicle detecting method which uses the edge information. The excellence of the proposed vehicle detecting method is confirmed by carrying out the vehicle detecting experiment on the complicate road image.
基金Supported by the National Natural Science Foundation of China (No.60172029).
文摘A decoding method complemented by Maximum Likelihood (ML) detection for V-BLAST (Verti- cal Bell Labs Layered Space-Time) system is presented. The ranked layers are divided into several groups. ML decoding is performed jointly for the layers within the same group while the Decision Feedback Equalization (DFE) is performed for groups. Based on the assumption of QPSK modulation and the quasi-static flat fading channel, simulations are made to testify the performance of the proposed algorithm. The results show that the algorithm outperforms the original V-BLAST detection dramatically in Symbol Error Probability (SEP) per- formance. Specifically, Signal-to-Noise Ratio (SNR) improvement of 3.4dB is obtained for SEP of 10?2 (4×4 case), with a reasonable complexity maintained.