2009 IEEE International Conference on Network Infrastructure and Digital Content最新文献

筛选
英文 中文
An improved iris recognition system based on Gabor filters 基于Gabor滤波器的改进虹膜识别系统
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360867
Hui Zheng, Fei Su
{"title":"An improved iris recognition system based on Gabor filters","authors":"Hui Zheng, Fei Su","doi":"10.1109/ICNIDC.2009.5360867","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360867","url":null,"abstract":"An improved iris recognition system based on even symmetry Gabor wavelet is proposed in this paper. In iris image preprocess, an effective segmentation and eyelids occlusion detection approach are introduced. During recognition, only the imaginary part of complex 2-D Gabor filter is used in coding for shorter code length but without affecting the recognition performance. A simple effective filter parameters selection scheme is proposed at the same time. Experimental results on CASIA1.0 and ICE 2005 databases clearly demonstrate that our improved methods can achieve highly accurate iris recognition with a short code length.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125310337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dual-band automatic gain control algorithm for chirp spread spectrum over indoor fading channels 室内衰落信道中啁啾扩频的双频自动增益控制算法
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360914
Hui Liu, Yeong-Sam Kim, Seong-Hyun Jang, J. Chong
{"title":"Dual-band automatic gain control algorithm for chirp spread spectrum over indoor fading channels","authors":"Hui Liu, Yeong-Sam Kim, Seong-Hyun Jang, J. Chong","doi":"10.1109/ICNIDC.2009.5360914","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360914","url":null,"abstract":"In this paper, we propose a novel automatic gain control (AGC) algorithm as a solution to improve the signal reception performance based on the IEEE 802.15.4a chirp spread spectrum (CSS) over indoor fading channels. The CSS signals are composed of low-band and high-band signals whose frequency characteristics are different because of multipath fading in indoor environment. It is not appropriate to apply only one conventional AGC which regardless of the different bands, where the received signals are contaminated by quantization noise or clipped. The proposed AGC algorithm is based on two AGCs which are designed to be matched well with low-band and high-band signals separately.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126809617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Probability-based trust management model for distributed e-commerce 基于概率的分布式电子商务信任管理模型
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360968
Ping Dong, Hongchao Wang, Hongke Zhang
{"title":"Probability-based trust management model for distributed e-commerce","authors":"Ping Dong, Hongchao Wang, Hongke Zhang","doi":"10.1109/ICNIDC.2009.5360968","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360968","url":null,"abstract":"The trust issue in distributed e-commerce systems has attracted much research attention in recent years. Existing e-commerce systems have presented trust management models which provide reputation information to buyers. However, more comprehensive models should be proposed to more precisely predict the trust level of sellers on potential transactions, and to defeat several kinds of possible attacks. This paper makes an effort to design PTME, a probability-based trust management model for distributed e-commerce, which is an attack-resistant trust model for evaluating and propagating reputation in distributed e-commerce systems. In this paper we describe the possible attacks on existing systems. Our model is then proposed to overcome these attacks. We provide a probability-based framework and detail approaches for this model. The performance evaluation and security analysis of PTME are provided to show its effectiveness.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Chinese query expansion based on user log clustering 基于用户日志聚类的中文查询扩展
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360836
Shufang Jia, Lei Li
{"title":"Chinese query expansion based on user log clustering","authors":"Shufang Jia, Lei Li","doi":"10.1109/ICNIDC.2009.5360836","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360836","url":null,"abstract":"Most previous query expansion researches are based on pseudo relevant documents. In this study, we present a novel expansion method by clustering the real user log. Because not all of the clicked pages are suitable for query expansion, we de-noised the clicked results by reliability to enhance the performance. After HTML labels removing, the page body contents are clustered and the cluster centers cover various aspects of the original query. The terms used in log queries can provide a better choice of features, from the user's point of view, for summarizing the web pages that were clicked from these queries. Therefore, the associated queries, reverse queries, webpage title and keyword phrases are combined with the cluster centers to attain high-quality expansion terms for new queries. We also propose a new terminology extraction method through Baidu Baike. It can identify and extract the terminology phrase based on the manual edited dictionary online.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125725194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An identity authentication system based on mobile phone token 基于手机令牌的身份认证系统
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360974
Peng Kunyu, Jiande Zheng, Yang Jing
{"title":"An identity authentication system based on mobile phone token","authors":"Peng Kunyu, Jiande Zheng, Yang Jing","doi":"10.1109/ICNIDC.2009.5360974","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360974","url":null,"abstract":"Anthentication is a mechanism to establish proof of identities. Traditional password authentication could not provide enough security for the information system when it faces the most modern means of attack. The problem could be solved by taking token authentication, but as a new authentication system, it is difficult connecting with existed authentication systems, especially in the authorized access control system. In this paper, we propose a new token authentication scheme, which can closely integrate with the traditional authentication system to form a seamless interface and directly use the corresponding authorization and the access control service, and realize a prototype system finally. In our model of authentication, we transform the challenge-response token authentication to password authentication, which solves the secure problem of the password authentication; develope a mobile phone token software based on the lightweight crypt package from Bouncy Castle and the J2ME platform, which solves scheme's feasible problem; design a bluetooth communication model between the mobile phone token and the PC; complete the development of mobile phone token authentication prototype system finally.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126927948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The study on video information leakage of computer 计算机视频信息泄露的研究
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360845
Jinhong Fan, Li He
{"title":"The study on video information leakage of computer","authors":"Jinhong Fan, Li He","doi":"10.1109/ICNIDC.2009.5360845","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360845","url":null,"abstract":"The computer may cause information leakage when working. It has become an extremely urgent question studied now. The electromagnetic leakage principle of the computer video signal was analyzed in this paper because the video cable that connects a host to a monitor is thought as a main electromagnetic radiation part on the base of the working principle of a VDU. The information leakage approach, the red and black signals and the character analysis are presented. The paper studies the electromagnetic radiation of the red signals transmitting through the video cable and analyzes their waveform characteristic. Thus the radiation characteristic of the video signal is mastered, which can provide a theoretical basis for the recovery of the video information, protection method and technique measure.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121937142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The methods of personal features selection using ACOGA and geometric extrema characteristics for Chinese online signature verification 基于ACOGA和几何极值特征的中文在线签名个人特征选择方法
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360930
Guozhong Cheng, Feng Wei
{"title":"The methods of personal features selection using ACOGA and geometric extrema characteristics for Chinese online signature verification","authors":"Guozhong Cheng, Feng Wei","doi":"10.1109/ICNIDC.2009.5360930","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360930","url":null,"abstract":"This paper presents a new method to select a segment-to-segment matching by analysing signature verification, accordingly curve segments used in signature verification and the regional feature contained in the curve segment are picked-up and the regional features are selected by ant colony optimization (ACO) algorithm and genetic algorithms(GAs). Namely, features selected are first encoded into chromosome, and descendible types are founded by ACOGA improved locally. The essential advantages of ACO including cooperativity, obustness, positive feedback and distributed nature were discuss and also the disadvantages of low convergence speed while the high adaptability of GAs were discussed too. Meanwhile, cross operation and mutation of genetic algorithms were introduced into the ACO. A new crossover method is also proposed to determine the number of curve segments. The experiment shows that the algorithms proposed can accurately find optimal features for signature verification and bring the lower FRR and FAR, thereby the veracity in online signature verification is enhanced.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116543745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Data Flow Graph-based software watermarking 基于动态数据流图的软件水印
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360804
Bo Feng, Miao Zhang, Guoai Xu, Xinxin Niu, Zhengming Hu
{"title":"Dynamic Data Flow Graph-based software watermarking","authors":"Bo Feng, Miao Zhang, Guoai Xu, Xinxin Niu, Zhengming Hu","doi":"10.1109/ICNIDC.2009.5360804","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360804","url":null,"abstract":"In this paper we indicate the concept of Dynamic Data Flow Graph based on the dynamic data dependency during execution of software. On this basis, we propose a dynamic software watermarking algorithm, which embeds watermarking information into DDFG of software, and discuss the implementation of embedding and extracting watermark. Finally we analyze the performance of this algorithm.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123372272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A survey of user generated service 用户生成服务的调查
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360953
Zhenzhen Zhao, N. Laga, N. Crespi
{"title":"A survey of user generated service","authors":"Zhenzhen Zhao, N. Laga, N. Crespi","doi":"10.1109/ICNIDC.2009.5360953","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360953","url":null,"abstract":"The success of the user generated content raises the new idea of enabling end-users to create their own services. User generated service will become the next big user-driven hype in the technology arena. This paper presents an overall view of the user generated service, from both technical and business perspective. We clarify the concept of user generated service, analysis the challenges, and illustrate the current platforms/tools in the classification of tech-inclined users and non-tech users. The underlying key technologies, incoming trends, as well as the future research topics, are also detailed.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133915238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The parallel algorithm of Clique and it's application on Data Mining Grid system Clique并行算法及其在数据挖掘网格系统中的应用
2009 IEEE International Conference on Network Infrastructure and Digital Content Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5361004
Ping Chen, Zhen Liu, Xiuquan Qiao, Xiaoping Tian
{"title":"The parallel algorithm of Clique and it's application on Data Mining Grid system","authors":"Ping Chen, Zhen Liu, Xiuquan Qiao, Xiaoping Tian","doi":"10.1109/ICNIDC.2009.5361004","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5361004","url":null,"abstract":"Computing of some parameters using great amount of data is a great challenge in data mining fields so far. DMG (Data Mining Grid) is designed to solve the computing problem. The design of the workflow service in DMG and the distributed data mining algorithm, are investigated. A sample application in telecom field Customer Value Analysis is and illustrated. In the sample application, Clique, which is computed by parallel algorithm on data mining grid system, is an important measure in Telecom Social Network, which benefits to enhance the precise of context-based prediction of the customer value in telecom social network and work out information in expected duration. Telecom operators can take measures to gain more profit.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信