{"title":"The research on error concealment technique for internet video streaming","authors":"Zhang Hongliang, Jiang Yuxiang","doi":"10.1109/ICCIAUTOM.2011.6183999","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183999","url":null,"abstract":"In this paper, it has summarized the error concealment techniques, and then it analyzed and researched the main algorithms of error concealment techniques, compared and contrasted these algorithms. Moreover, it also has described, analyzed and demonstrated the principle of GMM-based error concealment techniques. Finally, it prospected the future techniques of the error concealment.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115367575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved algorithm of Apriori based on transaction compression","authors":"Tang Jun-fang","doi":"10.1109/ICCIAUTOM.2011.6183988","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183988","url":null,"abstract":"In the data mining algorithm, Apriori algorithm is a classical algorithm of association rules. The paper proposed an improved algorithm based on classical Apriori algorithm analyzing. Through compressing transaction database, the improved algorithm record the same number of records by adding an attribute named count, and apply count to count the support of itemsets to increase efficiency and practical experience.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116668328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic vulnerability mining with abstract interpretation and static taint trace","authors":"Xiaocong Wang, Fei Yan, Fan He","doi":"10.1109/ICCIAUTOM.2011.6183972","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183972","url":null,"abstract":"With the expansion of software scale, effective approaches for automatic vulnerability mining have been in badly needed. This paper presents a novel approach which can generate test cases of high pertinence and reachability. Unlike standard fuzzing techniques which explore the test space blindly, our approach utilizes abstract interpretation based on intervals to locate the Frail-Points of program which may cause buffer over-flow in some special conditions and the technique of static taint trace to build mappings between the Frail-Points and program inputs. Moreover, acquire path constraints of each Frail-Point through symbolic execution. Finally, combine information of mappings and path constraints to propose a policy for guiding test case generation.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116680356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of measurement and display terminal in the central heating room and research of the charging method by indoor temperature measured","authors":"Zhang Wan-jiang, Yang Guang, Hou Jing","doi":"10.1109/ICCIAUTOM.2011.6184013","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6184013","url":null,"abstract":"The paper explores a new method of the heating measurement and charging in the central heating system. The method is different from mechanical heat metering and ultrasonic heat metering existing now. However, by measuring the indoor temperature and recording the temperature periodically during the heating period, and upload the data which are measured and stored in the terminal to the PC for analyzing after the heating period. It can adjust the charging according to the actual indoor temperature which is recorded in the terminal. And regulate the quantity of heating in the next heating period according to the data. Finally not only can the system meet the requirements of the users in the heating period, but also achieve the building energy efficiency. Adhere to people-oriented principle. Make the service of heating become more and more humanized.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125145188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of bootloader for embedded system based on S3C44b0X","authors":"Guo Ying, Yu Zongzuo","doi":"10.1109/ICCIAUTOM.2011.6183984","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183984","url":null,"abstract":"The bootloader process is introduced based on the S3C44B0X processor, after the embedded system has powered on. With the file operating function in the file system, the bootloader program for translatable initializing code with convenient UI for embedded system and the load code is designed. The experiment proves that the method is stable and efficient.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123601609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A corrective method for image completion based on SPBP and SP","authors":"Jingping Zhang, Yahong Han","doi":"10.1109/ICCIAUTOM.2011.6183925","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183925","url":null,"abstract":"In this paper a novel approach to image completion is introduced, which based on algorithm of Structure Priority Belief Propagation (SPBP) and Structure Propagation (SP). It is to use the user input line segment as auxiliary and use other one kind of distribution to source patches and destination patches. Namely in the auxiliary line source part which shows the belt-shaped discrete distribution, to destination patches which needs to complete, So each destination patch, which containing auxiliary line segment, is the similar overlap scheme for SPBP algorithm. The experimental results indicated that this optimized method surpasses the first two algorithms obviously in the image completion effect, and enhances the operation efficiency as well.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129794240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on data recovery based on virtual machine technology","authors":"Liang Zhi-yong, Wang Yuan","doi":"10.1109/ICCIAUTOM.2011.6183915","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183915","url":null,"abstract":"As the popularity of computer popularization, data becomes more and more important in the information age. However computer users often have to face to the reality that the data is lost and damaged. This article will be based on virtual machine technology, testing and analyzing which one is more suitable for the people to use the data recovery software.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128315426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of VSP technology in the C37-6 well drilling","authors":"Min Xu, Rui Li, Jianku Sun, Kenan Liu, Hanyu Lu","doi":"10.1109/ICCIAUTOM.2011.6183903","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183903","url":null,"abstract":"With the seismic prospecting developing into the complex and difficulty area, it is highly requested for structure interpretation. Calibration of horizon by the normal AC log usually can't correspond with through-well seismic profile, especially in the complex aloft-steep structure whose transverse velocity changes greatly, it is very easy to cause underground structure distort. It can exactly calibrate horizon of complex aloft-steep structure, confirm structural feature and location of fault point by the multi-azimuth VSP technology. The article illustrate the significance of technology in the objective argumentation of complex structure loss well sidetrack drilling through analysis the successfully application of C37-6 well area in the LW buried structure in East SiChuan basin.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"77 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116359160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PCFuzzing: A penetration combinatorial fuzzing framework by simulating attack trace","authors":"Jian Yang, Huanguo Zhang, Jianming Fu, Fan Yang","doi":"10.1109/ICCIAUTOM.2011.6184020","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6184020","url":null,"abstract":"In essence, fuzzing is a kind of penetration testing by injecting fault to simulate the attacks. However, current fuzzings do not simulate the attacks in a real sense. They pay more attention to the injection of malformed semi-valid data at a single input point. Nevertheless, an attack is usually a set of cooperative aggressive behaviors at multi input points. In this paper, we present PCFuzzing, a penetration combinatorial fuzzing framework for the software in host environment by simulating attack trace at multi input points. Based on the attack attributes plug-in gained by means of static analysis in advance, PCFuzzing uses dynamic taint tracing to automatically find the input vector that influence values used at key program attack points (points where the program may contain an error), uses symbolic execution and constraint solving to identify the constraint boundary of every input in input vector and constraint relationship of the inputs in input vector, uses combinatorial testing strategies to generate and combine the malformed test case vector, and then injects the combinatorial test case vector to find security vulnerabilities in programs according to the attack strategies in the attack attributes plug-in. Our experimental results indicate that our PCFuzzing can not only effectively expose errors located deep within large applications, but also can avoid the combination explosion to a certain extent because taint tracer in framework uses dynamic taint tracing to reduce the number of inputs involved in the combination and constraint collector in framework uses symbolic execution and constraint solving to narrow the value ranges of input data.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116517511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity evaluation for dynamic route based on maximum flow in network theory","authors":"Y. Guohui, Dai Fu-qing","doi":"10.1109/ICCIAUTOM.2011.6183932","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183932","url":null,"abstract":"This paper has researched the capacity evaluation of dynamic route. In the evaluation process, take the original routes as a factor and establish the capacity evaluation model for dynamic route based on maximum flow in network theory. Finally, a example proves that the model is reasonable and availability. The research result shows that the capacity of dynamic route will be restricted by the original routes in the network, while we open a dynamic route in the original airspace.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124327438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}