{"title":"MOMS-HDEA: A Multi-Objective Multi-State Hybrid Differential Evolution Algorithm for System Reliability Optimization Design Problems","authors":"Zeng Hui, Zhu Jixiang, L. Yuanxiang, Yin Weiqin","doi":"10.1109/ICCCS.2009.47","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.47","url":null,"abstract":"A new custom evolutionary algorithm was developed and implemented to solve multiple objective multi-state reliability optimization design problems. This new algorithm uses the universal moment gene-rating function approach to evaluate the different re-liability or availability indices of the system which have various levels of performance ranging from per-fectly functioning to completely failed. And each com-ponent in sub-system has different performance levels, cost, weight, and reliability. Genetic algorithms are suited for solving reliability design problems because of their appropriate for high-dimension stochastic problems with many nonlinearities or discontinuities. The developed algorithm, MOMS-HDEA, combined the differential evolution algorithm with multi-parent crossover operator satisfying the ergodic and fast properties in searching simultaneously. Experiment also shows that the algorithm gets better Pareto-front solutions.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131384608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-photorealistic Rendering for 3D Mesh Models","authors":"Siyou Lin","doi":"10.1109/ICCCS.2009.42","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.42","url":null,"abstract":"Non-Photorealistic Rendering (NPR) for 3D mesh models has made considerable progress in recent years and it has become a hot topic in computer graphics and other related fields. This paper presents an overview of the key techniques in non-photorealistic rendering for 3D mesh models, such as line drawings based on geometric and visual features, the surface brightness and stylized shadow setting. We introduce popular methods dealing with these problems and point out the characteristics of these methods and their deficiencies. Discussion is given and future work is addressed at the end of the paper.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"84 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131790629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emergency Treatment for Civil Aviation Departure Information System","authors":"Yue Ren-tian, Zhao Yifei, Xie Yue, Song Weiwei","doi":"10.1109/ICCCS.2009.32","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.32","url":null,"abstract":"There are several sudden failures in Chinese civil aviation departure information system. Emergency treatment and rapid recovery for the system have important significance for efficient operation of civil aviation. Based on several pairs of fault analysis for the departure information system, the network devices and host system's security response disposal plan and the computer virus emergency response plan are proposed. The conclusions are drawn that the departure system security emergency management can reduce the losses and resume the system rapidly.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115347459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Anomaly Detection Algorithm","authors":"Kui Zhang","doi":"10.1109/ICCCS.2009.15","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.15","url":null,"abstract":"A novel anomaly detection algorithm is proposed and based on the danger model. The danger model is built on a sensitive tissue (ST) which consists of a population of sensitive cells (SCs) that are abstracted from computer system, and such cells are very sensitive to cellular damages. ST plays a role as an interface between problems and immune cells for danger recognition and estimation. This novel anomaly detection algorithm is different from the existing ones for the introduction to a novel component—sensitive tissue in the danger model.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125823161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research on the Analysis of Image Sequence Model","authors":"Zhang Tiejun, Z. Zhiwei","doi":"10.1109/ICCCS.2009.50","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.50","url":null,"abstract":"The analysis of image acquiesce model is brought forward to the automation examine system in the subject. The results show that thinking form the information science break a new ground for controlling and distinction of complicated system.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128703556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"About Hermitian Positive Definite Solutions of a Type of Nonlinear Matrix Equations","authors":"C. Tan","doi":"10.1109/ICCCS.2009.37","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.37","url":null,"abstract":"Let be an nonsingular matrix. In image processing, we must solve a system of linear equations[1], however, the solving of the System can be transformed to the solving of the equations . In this paper, we study the Hermitian positive definite solutions of the matrix equation . We give an equivalent equation of when the matrix equation has a Hermitian positive definite solution.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"5 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123899232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bridge for Connecting Two CPU Systems in a SoC","authors":"Liu Jia, Li Zheying, Li Jinping, Z. Yanping","doi":"10.1109/ICCCS.2009.21","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.21","url":null,"abstract":"The connection bridge is addressed for connecting different circuit part include two CPU system in a SoC. With the discussion about the performance of circuitry components, the circuitry components are classified into two types, one is called host transmission component, and the other is called slave transmission component. The classification is the fundamental for connection bridge design. By this classification, a connection bridge was designed in this paper. The connection bridge designed in the paper connect two CPU system and three others digital circuitry components together and make the CPU connected with three digital circuitry directly as a part of the CPU system. The architecture and logic function of the connection bridge is analyzed in detail and simulated. The simulation results demonstrate that the connection bridge can not only supply the connection of two CPU and three common components, include RAM, ADC and DAC, but also increased the running speed and system performance.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122196956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Delay Tolerant Vehicular Network in Intelligent Transportation System","authors":"Tianle Zhang, Chunlu Wang, Zongwei Luo","doi":"10.1109/ICCCS.2009.28","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.28","url":null,"abstract":"RFID enabled wireless sensor networks are attracting intensive interests of intelligent transportation applications. This paper proposes a dynamic infrastructure for vehicular communications built upon the RFID enabled delay tolerant wireless sensor networks named Mobile Relay Network (MRN) for the communication in the intelligent transportation system. A group-sequence based routing protocol is developed to support the MRN. Based on the MRN, the Ubiquitous Intelligence for Data Query (UIDQ) service platform is proposed to provide information access, relay, search and delivery among the drivers on the move. The computing results validate the UIDQ scheme.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient and Secure Protocol for Low-cost RFID Systems","authors":"Feng Zhao, Huiyun Li, Fengqi Yu","doi":"10.1109/ICCCS.2009.14","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.14","url":null,"abstract":"Radio frequency identification (RFID) technology is as an automated identification technology and has become pervasive in our lives. However, RFID systems are known vulnerable to counterfeiting and clandestine tracking. The traditional cryptographic operations are too costly to be used for low-cost RFID tag. In this paper, we present an efficient and secure protocol. Our protocol is secure against counterfeiting by means of a shared secret key between each tag and the backend database, and is secure against tracking through changing the tag’s response each time to queries. The protocol can also resist the desynchronization attack. This protocol only demands hardware support of a Pseudo-Random Number Generation (PRNG) and a Cyclic Redundancy Check (CRC) to achieve high security, which makes the protocol easy to implement.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116905464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Liying, T. Hongmei, Sun Zhijie, Zhang Cunshan, Zhao Hongdong
{"title":"Application of Improved Ant Colony Algorithm in Integrated Circuit Routing","authors":"H. Liying, T. Hongmei, Sun Zhijie, Zhang Cunshan, Zhao Hongdong","doi":"10.1109/ICCCS.2009.16","DOIUrl":"https://doi.org/10.1109/ICCCS.2009.16","url":null,"abstract":"As VLSI fabrication technology developing to VDSM and the magnitude increasing rapidly¿a more effective optimized algorithm is requited to realize circuit routing in the physical design. In this paper, through optimizing the basic ant colony algorithm based on ant colony system, a better solution is found. It can improve the problem of excessive search time using the basic ant colony to solve traveling salesman problem (TSP). The improved algorithm has fast convergence capability and strong optimization ability. Using the improved ant colony algorithm to solve the multiterminal net routing problem around the obstacles, a better total connection length is achieved. The experimental results show that the improved ant colony algorithm is an effective way to solve difficult NP wire problems.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"80 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120823873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}