{"title":"Research on Failure Prognostics Method of Electronic System Based on Improved Fruit Fly Algorithm and Grey Fast Relevance Vector Machine","authors":"Kun Wu, Jianshe Kang, Xu An Wang","doi":"10.1109/INCoS.2016.65","DOIUrl":"https://doi.org/10.1109/INCoS.2016.65","url":null,"abstract":"In order to solve the failure prognostics problem of electronic system, a method of fast relevance vector machine (FRVM) based on improved fruit fly optimization algorithm (FOA) is proposed. Grey data generation operation is introduced to process the original data and the output data for enhancing the regularity and reducing the randomness. Furthermore, the kernel function parameter of FRVM model is optimized based on the improved FOA which adds the annealing parameter to establish the prediction model. In addition, the performance of the proposed model is studied and evaluated by a radar transmitter fault prediction experiment in this paper. The results demonstrate that the presented method performs significantly better than the traditional methods in terms of global optimization, convergence speed, training time and prediction accuracy.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134560517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Hameed, N. Javaid, Saif ul Islam, G. Ahmed, U. Qasim, Z. Khan
{"title":"BEEC: Balanced Energy Efficient Circular Routing Protocol for Underwater Wireless Sensor Networks","authors":"A. Hameed, N. Javaid, Saif ul Islam, G. Ahmed, U. Qasim, Z. Khan","doi":"10.1109/INCoS.2016.93","DOIUrl":"https://doi.org/10.1109/INCoS.2016.93","url":null,"abstract":"Design of underwater wireless sensor networks (UWSNs) is difficult because of limited battery energy of sensor nodes. Low bandwidth and energy consumption are major problems that we face in UWSNs, due to dynamic behavior of water in underwater environment. In our scheme, circular field is divided into ten sub-regions and each region is divided into eight sectors. Two mobile sinks move to cover the maximum area of the network field. Mobile Sink1 (Ms1) covered the first five regions of the network and remaining covered by Mobile Sink2 (Ms2). Both mobile sinks move sector wise in clockwise direction. Due to the mobility of the sinks. We have verify the better performance through simulation results of Network lifetime, Stability and Instability period, Energy consumption and Throughput.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"86 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133007360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Identity-Based Proxy Signature Scheme from Lattices in the Standard Model","authors":"Wang Li","doi":"10.1109/INCoS.2016.17","DOIUrl":"https://doi.org/10.1109/INCoS.2016.17","url":null,"abstract":"Currently, most of the identity-based proxy signature schemes are based on large integer factorization and discrete logarithm which are insecure in quantum setting. To this problem, we propose a provably-secure identity-based proxy signature scheme over lattice, which uses preimage sampling technology and lattice basis delegation algorithm in fixed dimension. The proposed scheme was proved to satisfy strong unforgeability against selective identity attacks based on the hardness of the small integer solution (SIS) problem in the standard model. And compared with the existing identity-based proxy signature scheme from lattices, our scheme is more secure under the same efficiency.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116522122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Web Resources Protection Based on Digital Watermarking and Digital Signature","authors":"Chun He","doi":"10.1109/INCoS.2016.87","DOIUrl":"https://doi.org/10.1109/INCoS.2016.87","url":null,"abstract":"Web resources protection is one of the most difficult problems on network. Many solutions relevant have been put forward and some protecting systems have come out until now. However, almost all solutions are based on the method that compares with files' digital signature firstly and judges files have been tampered with or not secondly [1]. And all these solutions are useless for resolving misusing web resources. This paper puts forward a new solution that combines digital watermarking and digital signature to monitor and protect web resources, which can not only prevent to tamper with web resources but also can protect copyrights of important resources.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124753093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Solve Common Human Actions Recognition Use Cases with Gesture Description Language","authors":"T. Hachaj","doi":"10.1109/INCoS.2016.26","DOIUrl":"https://doi.org/10.1109/INCoS.2016.26","url":null,"abstract":"The main novelty of this paper is explanation of several common use cases that often appears in typical action recognition scenarios. The choice of those scenarios is based on my own practice in action recognition and they also show in my opinion the most effective way of using Gesture Description Language (GDL) for various tasks of action recognition. All resources that were used to prepare experiments described in this paper: motion capture data, GDL script codes and GDL Studio (an application for motion capture, editing and classification) are open sources. Due to this the whole solution might be easily applied to scientific experiments and industrial applications. This paper also explains the important issues of GDL theory and practice.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123871157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity Authentication System Based on Fingerprint Identification and Pulse Certification","authors":"Qian Xu, Jie Deng","doi":"10.1109/INCoS.2016.84","DOIUrl":"https://doi.org/10.1109/INCoS.2016.84","url":null,"abstract":"To better protect the security of the core site, such as precious material storage or the place to be visited by important figure, and to improve the efficiency of the security system of the core site, this paper proposes an identity authentication scheme based on fingerprint authentication and pulse. According to fingerprint and the dynamic password, and on the condition of the pulse for ensuring the fingerprint is effective and living fingerprint, the scheme uses the safe and effective elliptic curve encryption to encrypt the fingerprint and password for encrypted storage and transmission. The experimental results show that this scheme can effectively resist password attack, replaying attack and impersonation attack, and improve efficiency of the identity authentication, so it has great application prospect.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116118910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity Based Proxy Re-Encryption Scheme (IBPRE+) for Secure Cloud Data Sharing","authors":"Xu An Wang, F. Xhafa, Zhiheng Zheng, Jinting Nie","doi":"10.1109/INCoS.2016.83","DOIUrl":"https://doi.org/10.1109/INCoS.2016.83","url":null,"abstract":"In proxy re-encryption (PRE), a proxy with re-encryption keys can transfer aciphertext computed under Alice's public key into a new one, which can be decrypted by Bob only with his secret key. Recently, Wang et al. introduced the concept of PRE plus (PRE+) scheme, which can be seen as the dual of PRE, and is almost the same as PRE scheme except that the re-encryption keys are generated by the encrypter. Compared to PRE, PRE+ scheme can easily achieve two important properties: first, the message-level based fine-grained delegation and, second, the non-transferable property. In this paper, we extend the concept of PRE+ to the identity based setting. We propose a concrete IBPRE+ scheme based on 3-linear map and roughly discuss its properties. We also demonstrate potential application of this new primitive to secure cloud data sharing.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129650200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization Problems","authors":"Licheng Wang, Jing Li, Jianhua Yan, Zhiguo Qu","doi":"10.1109/INCoS.2016.12","DOIUrl":"https://doi.org/10.1109/INCoS.2016.12","url":null,"abstract":"Proxy re-encryption (PRE) enables a semi-trustedproxy to transfer Alice's secrets into Bob's secrets but withoutseeing the secrets. This functionality is very interesting formaking balance between the information confidentiality and the mutual accessibility in various scenarios such as public cloudstorage systems. During the past decades, many smart PREschemes were built based on intractability assumptions suchas integer factorization problems (IFP) and discrete logarithmproblems (DLP). However, Shor's efficient quantum algorithmsfor IFP and DLP manifests a threat towards the securitybaseline of these schemes. Enlightened by Gu et al.'s recent workon resisting known quantum attacks, we propose an efficientPRE scheme based on the intractability of the (semi) groupfactorization problems in this paper. The security of the proposedscheme is analyzed according to some conceivable attacks.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129737394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel QoS-Aware Load Balancing Mechanism in Cloud Environment","authors":"Feng Ye, Shengyan Wu, Qian Huang, Xu An Wang","doi":"10.1109/INCoS.2016.97","DOIUrl":"https://doi.org/10.1109/INCoS.2016.97","url":null,"abstract":"Efficient low-level resource provisioning and QoS guaranteed are key challenges for cloud computing. When using virtual machines cluster to tackle various tasks scheduling, the target is to assign the tasks to each of the available nodes evenly in in premise of ensuring QoS of services, and it also means that the cloud providers should consider to reduce the load of overload nodes, and improve resource utilization of under-loading nodes. There are some limitations when applying these classic scheduling algorithms to the cloud computing environment. In order to solve this problem, we propose a novel QoS-aware load balancing mechanism in cloud environment. The key of this mechanism includes QoS model, resource model, and task model. We conduct a CloudSim based experiment to evaluate our method using a realistic dataset, and the results show that the algorithm proposed effectively shortens the waiting time in comparison to RR algorithm and Max-Min algorithm.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127021595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Goal Programming Approach for Group Decision Making with Four Incomplete Preference Relations","authors":"Ben Cheng, Sha Hu, Jiang-Wei Wang, Yun-Yuan Dong","doi":"10.1109/INCoS.2016.48","DOIUrl":"https://doi.org/10.1109/INCoS.2016.48","url":null,"abstract":"This article presents a goal programming approach to solve group decision making problems where decision-makers' judgments are provided as multiple incomplete preference relations, including incomplete fuzzy preference relations, incomplete multiplicative preference relations, incomplete interval multiplicative preference relations and incomplete linguistic preference relations. The proposed approach consists three steps:(1) transform the incomplete linguistic preference relations into the format of incomplete fuzzy preference relations (2) aggregate four different formats incomplete preference relations using a linear goal programming model and obtain the collective ranking values of alternative by solving the model, (3) rank or select the alternative based on the obtained collective ranking values of alternatives. A capability gaps evaluation is used to demonstrate the applicability of approach.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128674417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}