{"title":"Application of secure multi-party computation in linear programming","authors":"Fu Zu-feng, Wang Hai-ying, Wu Yong-wu","doi":"10.1109/ITAIC.2014.7065043","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065043","url":null,"abstract":"The existing solution to the privacy preserving linear programming, can leak the user's private data when the data is much less. In this paper, the secure multiparty computation is generalized to the problem of privacy-preserving linear programming, and we present a computing protocol of privacy-preserving linear programming. The protocol is applied to consider the problem of linear programming with less and vertically distributed data, not only the maximum value of the original linear programming can be calculated in the case having optimal solution, but also the private data of all participants can be protected in the calculation.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115908854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radiation fog detection and warning system of highway based on wireless sensor networks","authors":"Lunbo Li, Haofeng Zhang, Chunxia Zhao, X. Ding","doi":"10.1109/ITAIC.2014.7065024","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065024","url":null,"abstract":"Highway safety is a major concern to the public and to transportation professionals, so the number of crashes caused by poor visibility due to fog form an alarming statistic. Based on a technique using wireless sensor networks (WSNs), this paper presents a flexible framework for radiation fog detection and warning system. This framework serves as a basis for future research in designing and implementing radiation fog detection and warning applications. A two-layer network architecture is established for weather conditions information acquisition in the context of a WSN environment. Experiments have shown good performance of the proposed warning system based on WSNs.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124273536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhance enterprise Android application security with cloud computing and big data analytics","authors":"Hongye Zhong, Jitian Xiao, Xiangxin Zheng","doi":"10.1109/ITAIC.2014.7065042","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065042","url":null,"abstract":"In modern enterprises, conventional Android application assessment approaches have many limitations, one of which is the isolation of different assessment systems that hinders the efficiency and capacity of the assessing processes. The objective of this research is to develop a framework that promotes the use of cloud computing and Big Data Analytics on building the assessment system. Cloud-based design allows the system to achieve computing capacity in a lower cost, so that it can apply mixed utilization of various assessment techniques to generate more diversified and objective testing results. Centralized information repository on the cloud enables Big Data Analytics to be performed on the extensive testing results to achieve enhanced insight of the application security status. BDA techniques such as clustering and visualization provides better comprehension on the underlying security issues and prediction on how to improve the enterprise information systems. To aggrandize the availability of the analytic results, SOA should be adopted in the system design, so that the data can be provided as extendable services for other systems. Finally, an experimental system is designed based on the proposed framework as an illustration on the framework implementation.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114798533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved hybrid ant colony algorithm and its application in solving TSP","authors":"He Min, Pang Dazhi, Yang Song","doi":"10.1109/ITAIC.2014.7065084","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065084","url":null,"abstract":"Ant colony algorithm is a simulated evolutionary algorithm with the characteristics of positive feedback and distributed computation. It simulate the process of ants foraging to search the optimal solution. But the algorithm fall into local optimum easily and the convergence speed is very slow. After analyzing the disadvantages of ant colony algorithm, we put forward an improved hybrid ant colony algorithm. For each generation of ant colony perform crossover and mutation operations, and accept new individuals with a specified probability according to the Metropolis criterion of simulation annealing algorithm. Through series of simulation experiments' results, it can be found that the proposed algorithm is good at stability and optimization capacity.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116906304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Index optimization replication algorithm by using the soft subspace clustering method","authors":"R. Tang, Panfeng Li","doi":"10.1109/ITAIC.2014.7065082","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065082","url":null,"abstract":"This paper proposes a new index optimization replication algorithm framework. First of all, by using independent component analysis technology to build time series feature subspace, we can convert the observation data, which is high dimensional dynamic time series, into static data. Then, use soft subspace clustering method to achieve fuzzy feature weighted clustering. Finally, minimize tracking error and determine the weights of component stocks in the index tracking portfolio. This way, we complete index optimization of replication. The replication method proposed in this paper proves to be effective by positive analysis of China's CSI 300 index optimization replication.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117282882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UE-based mobile web optimization","authors":"Suiyu Zhang, Cheng Yang, Mingyue Yu","doi":"10.1109/ITAIC.2014.7064995","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7064995","url":null,"abstract":"With the development of mobile telecommunication network and the intelligent terminal technology, the mobile terminal has become one of the most important agency to access the Internet information. Since a large share of content on the Internet is designed targeting the PC users, moreover, newly customized networks for mobile terminal are showing a lack of consideration on the aspects such as velocity, capability, adaptation and etc. When users are using the mobile terminal to access the Internet resources, they are facing the problems such as latency, low-response and nonfluency. Based on UE(user experience), we propose an improved model of loading and display through experiments, taking the loading rate and respondence into account.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116039342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A dynamic building method of mobile agent migrating path based on Q-learning","authors":"Yuan-cai Cheng, Xiao-Lin Wang","doi":"10.1109/ITAIC.2014.7065049","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065049","url":null,"abstract":"Mobile agent is viewed as the proxy of a social member. It is able to carry tasks on the behalf of user and to migrate among hosts in a network and use local service to complete its tasks. The migrating path of mobile agent is a sequence of hosts that the agent migrates along in order to achieve the tasks it carries in network environment. The problem of migrating path planning with multi-objective is a tougher issue. This paper presents a dynamic building method of migrating path based on Q-learning algorithm in large-scale and dynamic open network which is modeled as social acquaintance network. The experimental results show that mobile agent is able to dynamically construct an efficient migrating path by utilizing the Q-learning algorithm step by step.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127216830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation and optimization of manufacturing process for aircraft harness","authors":"Pei Gao, Jingqian Wen, Yaoguang Hu","doi":"10.1109/ITAIC.2014.7065111","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065111","url":null,"abstract":"The harness manufacturing is mainly performed by handwork which has become the bottleneck of aircraft development. In order to improve the production efficiency, the characteristics of aircraft harness manufacture were summarized by analyzing the harness production processes. The model of production processes was put forward based on network graph to calculate the standard cycle time. And the actual production cycle was estimated by considering the effects of some uncertain factors. Finally, an optimized scheme, which aiming at promoting the balance of production line, was proposed by improving lineation process and adjusting operating positions. The simulation result in eM-Plant showed that the improvement can effectively shorten the harness production cycle time.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127492613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liu Bin, Xue-li Zhou, Hui-guo Zhang, Yong-jin Zhao
{"title":"Modeling and performance simulation for wireless transmission channels in the confined space","authors":"Liu Bin, Xue-li Zhou, Hui-guo Zhang, Yong-jin Zhao","doi":"10.1109/ITAIC.2014.7065097","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065097","url":null,"abstract":"In this paper, we select wireless transmission channel in mine as a typical representative of confined space. Considering the characteristics of wave transmission in the mine tunnel and the law the reflected wave followed in rectangular tunnel, we set up a new channel model which matches the characteristics of mine wireless transmission. This paper uses SystemView software to simulate and analyze the attenuation of signal in channel. Experiment shows that the new channel model of confined space proposed in this paper can be used as guidance for the design of the digital wireless communication systems of mine tunnel.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"69 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130062490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A SRAM design based on tetrad and hierarchical dynamic decoding technology","authors":"Li Xuan","doi":"10.1109/ITAIC.2014.7065018","DOIUrl":"https://doi.org/10.1109/ITAIC.2014.7065018","url":null,"abstract":"Static random access memory (SRAM) is a type of static access memory which employs latching circuitry to store data. It can save the data without refreshing logic circuit. In order to obtain a high speed and low power consumption SRAM, the layout of the memory array is critical. A new SRAM structure is analyzed and proposed in this paper. The proposed design uses tetrad technology and hierarchical dynamic decoding technology. The whole capacity of the proposed SRAM is 64*256 bits, and distributed in the four corners of the chip. Decoding circuit is symmetrical, and divided into the low 32-bit and high 32-bit. Compared to the traditional decoding circuit, it has faster speed, more compact structure, and smaller size.","PeriodicalId":111584,"journal":{"name":"2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125596144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}