The satellite-based automatic identification system (AIS) receiver has to encounter the frequency offset caused by the Doppler effect and the oscillator instability. This paper proposes a non-coherent sequence detecti...The satellite-based automatic identification system (AIS) receiver has to encounter the frequency offset caused by the Doppler effect and the oscillator instability. This paper proposes a non-coherent sequence detection scheme for the satellite-based AIS signal transmitted over the white Gaussian noise channel. Based on the maximum likelihood estimation and a Viterbi decoder, the proposed scheme is capable of tolerating a frequency offset up to 5% of the symbol rate. The complexity of the proposed scheme is reduced by the state-complexity reduction, which is based on per-survivor processing. Simulation results prove that the proposed non-coherent sequence detection scheme has high robustness to frequency offset compared to the relative scheme when messages collision exists.展开更多
Aiming at the potential presence of mixing automatic identification system(AIS) signals,a new demodulation scheme was proposed for separating other interfering signals in satellite systems.The combined iterative cross...Aiming at the potential presence of mixing automatic identification system(AIS) signals,a new demodulation scheme was proposed for separating other interfering signals in satellite systems.The combined iterative cross-correlation demodulation scheme,referred to as CICCD,yielded a set of single short signals based on the prior information of AIS,after the frequency,code rate and modulation index were estimated.It demodulates the corresponding short codes according to the maximum peak of cross-correlation,which is simple and easy to implement.Numerical simulations show that the bit error rate of proposed algorithm improves by about 40% compared with existing ones,and about 3 dB beyond the standard AIS receiver.In addition,the proposed demodulation scheme shows the satisfying performance and engineering value in mixing AIS environment and can also perform well in low signal-to-noise conditions.展开更多
In this paper, the limitations of the single cube D-optimal design scheme is studied, and a double cube D-optimal design scheme is suggested in order to overcome the limitations. For a sort of incomplete cubic polynom...In this paper, the limitations of the single cube D-optimal design scheme is studied, and a double cube D-optimal design scheme is suggested in order to overcome the limitations. For a sort of incomplete cubic polynomials, the test design of the identification is developed with this new scheme, and the comparation with the single cube scheme is also given. This scheme is shown to be perfectly suitable for the optimal identification of the complete cubic polynomials.展开更多
In order to detect web shells that hackers inject into web servers by exploiting system vulnerabilities or web page open sources, a novel web shell detection system based on the scoring scheme is proposed, named Evil-...In order to detect web shells that hackers inject into web servers by exploiting system vulnerabilities or web page open sources, a novel web shell detection system based on the scoring scheme is proposed, named Evil-hunter. First, a large set of malicious function samples normally used in web shells are collected from various sources on the Internet and security forums. Secondly, according to the danger level and the frequency of using these malicious functions in the web shells as well as in legal web applications, an assigning score strategy for each malicious sample is devised. Then, the appropriate score threshold value for each sample is obtained from the results of a statistical analysis. Finally, based on the threshold value, a simple algorithm is presented to identify files that contain web shells in web applications. The experimental results show that compared with other approaches, Evil-hunter can identify web shells more efficiently and accurately.展开更多
The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many ...The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many organizations and standard bodies that provide specifications and frameworks for the IoT currently have their own identification mechanisms.Some existing industrial identification mechanisms can also be used in the IoT.There is no common Identification Scheme(IS)for the IoT as yet,because of the political and commercial differences amongst the standard bodies.The unavailability of a unified IS method makes the inter-working among IoT platforms challenging.This paper analyses and compares ISs used by several selected IoT platforms.This work will help in understanding the need for a common identification mechanism to provide inter-working among different IoT platforms.展开更多
The harmonic components of stator winding current in induction motor will change under the condition of stator inter-turn short circuit.According to these characteristics,in this paper,a novel technique based on morph...The harmonic components of stator winding current in induction motor will change under the condition of stator inter-turn short circuit.According to these characteristics,in this paper,a novel technique based on morphological maxlifting scheme is proposed for identification of induction motor stator inter-turn short circuit.A max-lifting scheme is applied to process stator winding currents to extract these characteristics.An indicator,r,is computed to identify the short circuit.The transient model of induction motor is employed to simulate oneturn to six-turn stator inter-turn short circuits in an induction motor.Extensive simulation work has been conducted under normal conditions,abnormal conditions(voltage imbalance and varying load),stator inter-turn short circuit conditions,and conditions of any combinations of the above.The results have shown that the scheme proposed in this paper has a high identification rate for induction motor stator inter-turn short circuit.展开更多
The research on the identification scheme is an important and active area in computer and communication security. A series of identification schemes were proposed to improve the efficiency and security of the protocol...The research on the identification scheme is an important and active area in computer and communication security. A series of identification schemes were proposed to improve the efficiency and security of the protocols by various methods. Based on the hardness assumption of the discrete logarithm problem in a gap Diffie-Hellman group and the difficulty of the collusion attack algorithm with k traitors, an efficient identification scheme is presented. Without random oracle models, the proposed scheme is then proved secure against impersonation and reset attacks in both concurrent and reset attack setting. Since the proposed scheme is simple, memory-saving, computation-efficient, and perfectly-secure, it is well suitable for use in smart cards.展开更多
In this paper,we investigate the defense problem against the joint attacks of denial-of-service attacks and data tampering attacks in the framework of system identification with binary-valued observations.By estimatin...In this paper,we investigate the defense problem against the joint attacks of denial-of-service attacks and data tampering attacks in the framework of system identification with binary-valued observations.By estimating the key parameters of the joint attack and compensating them in the identification algorithm,a compensation-oriented defense scheme is proposed.Then the identification algorithm of system parameter is designed and is further proved to be consistent.The asymptotic normality of the algorithm is obtained,and on this basis,we propose the optimal defense scheme.Furthermore,the implementation of the optimal defense scheme is discussed.Finally,a simulation example is presented to verify the effectiveness of the main results.展开更多
文摘The satellite-based automatic identification system (AIS) receiver has to encounter the frequency offset caused by the Doppler effect and the oscillator instability. This paper proposes a non-coherent sequence detection scheme for the satellite-based AIS signal transmitted over the white Gaussian noise channel. Based on the maximum likelihood estimation and a Viterbi decoder, the proposed scheme is capable of tolerating a frequency offset up to 5% of the symbol rate. The complexity of the proposed scheme is reduced by the state-complexity reduction, which is based on per-survivor processing. Simulation results prove that the proposed non-coherent sequence detection scheme has high robustness to frequency offset compared to the relative scheme when messages collision exists.
基金Project(9140C860304) supported by the National Defense Key Laboratory Foundation of China
文摘Aiming at the potential presence of mixing automatic identification system(AIS) signals,a new demodulation scheme was proposed for separating other interfering signals in satellite systems.The combined iterative cross-correlation demodulation scheme,referred to as CICCD,yielded a set of single short signals based on the prior information of AIS,after the frequency,code rate and modulation index were estimated.It demodulates the corresponding short codes according to the maximum peak of cross-correlation,which is simple and easy to implement.Numerical simulations show that the bit error rate of proposed algorithm improves by about 40% compared with existing ones,and about 3 dB beyond the standard AIS receiver.In addition,the proposed demodulation scheme shows the satisfying performance and engineering value in mixing AIS environment and can also perform well in low signal-to-noise conditions.
文摘In this paper, the limitations of the single cube D-optimal design scheme is studied, and a double cube D-optimal design scheme is suggested in order to overcome the limitations. For a sort of incomplete cubic polynomials, the test design of the identification is developed with this new scheme, and the comparation with the single cube scheme is also given. This scheme is shown to be perfectly suitable for the optimal identification of the complete cubic polynomials.
基金The Science and Technology Support Program of Jiangsu Province(No.BE2011173)the Future Network Proactive Program of Jiangsu Province(No.BY2013095-5-03)the Program for Special Talent in Six Fields of Jiangsu Province(No.2011-DZ024)
文摘In order to detect web shells that hackers inject into web servers by exploiting system vulnerabilities or web page open sources, a novel web shell detection system based on the scoring scheme is proposed, named Evil-hunter. First, a large set of malicious function samples normally used in web shells are collected from various sources on the Internet and security forums. Secondly, according to the danger level and the frequency of using these malicious functions in the web shells as well as in legal web applications, an assigning score strategy for each malicious sample is devised. Then, the appropriate score threshold value for each sample is obtained from the results of a statistical analysis. Finally, based on the threshold value, a simple algorithm is presented to identify files that contain web shells in web applications. The experimental results show that compared with other approaches, Evil-hunter can identify web shells more efficiently and accurately.
基金This work is supported by the Institute for Information&communications Technology Promotion(IITP)grant funded by the Korean government Ministry of Science and ICT(MSIT)(No.B0184-15-1001,Federated Interoperable Semantic IoT Testbeds and Applications).
文摘The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many organizations and standard bodies that provide specifications and frameworks for the IoT currently have their own identification mechanisms.Some existing industrial identification mechanisms can also be used in the IoT.There is no common Identification Scheme(IS)for the IoT as yet,because of the political and commercial differences amongst the standard bodies.The unavailability of a unified IS method makes the inter-working among IoT platforms challenging.This paper analyses and compares ISs used by several selected IoT platforms.This work will help in understanding the need for a common identification mechanism to provide inter-working among different IoT platforms.
基金This work was supported by the Fundamental Research Funds for the Central Universities(2015ZZ019)Guangdong Innovative Research Team Program(No.201001N0104744201).
文摘The harmonic components of stator winding current in induction motor will change under the condition of stator inter-turn short circuit.According to these characteristics,in this paper,a novel technique based on morphological maxlifting scheme is proposed for identification of induction motor stator inter-turn short circuit.A max-lifting scheme is applied to process stator winding currents to extract these characteristics.An indicator,r,is computed to identify the short circuit.The transient model of induction motor is employed to simulate oneturn to six-turn stator inter-turn short circuits in an induction motor.Extensive simulation work has been conducted under normal conditions,abnormal conditions(voltage imbalance and varying load),stator inter-turn short circuit conditions,and conditions of any combinations of the above.The results have shown that the scheme proposed in this paper has a high identification rate for induction motor stator inter-turn short circuit.
基金supported by the National Natural Science Foundation of China (60803151)the Major Joint Research Foundation of NSFC and Guangdong Province (U0835004).
文摘The research on the identification scheme is an important and active area in computer and communication security. A series of identification schemes were proposed to improve the efficiency and security of the protocols by various methods. Based on the hardness assumption of the discrete logarithm problem in a gap Diffie-Hellman group and the difficulty of the collusion attack algorithm with k traitors, an efficient identification scheme is presented. Without random oracle models, the proposed scheme is then proved secure against impersonation and reset attacks in both concurrent and reset attack setting. Since the proposed scheme is simple, memory-saving, computation-efficient, and perfectly-secure, it is well suitable for use in smart cards.
文摘In this paper,we investigate the defense problem against the joint attacks of denial-of-service attacks and data tampering attacks in the framework of system identification with binary-valued observations.By estimating the key parameters of the joint attack and compensating them in the identification algorithm,a compensation-oriented defense scheme is proposed.Then the identification algorithm of system parameter is designed and is further proved to be consistent.The asymptotic normality of the algorithm is obtained,and on this basis,we propose the optimal defense scheme.Furthermore,the implementation of the optimal defense scheme is discussed.Finally,a simulation example is presented to verify the effectiveness of the main results.