2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)最新文献

筛选
英文 中文
The research on error concealment technique for internet video streaming 网络视频流错误隐藏技术的研究
2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA) Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183999
Zhang Hongliang, Jiang Yuxiang
{"title":"The research on error concealment technique for internet video streaming","authors":"Zhang Hongliang, Jiang Yuxiang","doi":"10.1109/ICCIAUTOM.2011.6183999","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183999","url":null,"abstract":"In this paper, it has summarized the error concealment techniques, and then it analyzed and researched the main algorithms of error concealment techniques, compared and contrasted these algorithms. Moreover, it also has described, analyzed and demonstrated the principle of GMM-based error concealment techniques. Finally, it prospected the future techniques of the error concealment.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115367575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved algorithm of Apriori based on transaction compression 基于事务压缩的Apriori改进算法
2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA) Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183988
Tang Jun-fang
{"title":"An improved algorithm of Apriori based on transaction compression","authors":"Tang Jun-fang","doi":"10.1109/ICCIAUTOM.2011.6183988","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183988","url":null,"abstract":"In the data mining algorithm, Apriori algorithm is a classical algorithm of association rules. The paper proposed an improved algorithm based on classical Apriori algorithm analyzing. Through compressing transaction database, the improved algorithm record the same number of records by adding an attribute named count, and apply count to count the support of itemsets to increase efficiency and practical experience.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116668328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Automatic vulnerability mining with abstract interpretation and static taint trace 带有抽象解释和静态污点跟踪的自动漏洞挖掘
2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA) Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183972
Xiaocong Wang, Fei Yan, Fan He
{"title":"Automatic vulnerability mining with abstract interpretation and static taint trace","authors":"Xiaocong Wang, Fei Yan, Fan He","doi":"10.1109/ICCIAUTOM.2011.6183972","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183972","url":null,"abstract":"With the expansion of software scale, effective approaches for automatic vulnerability mining have been in badly needed. This paper presents a novel approach which can generate test cases of high pertinence and reachability. Unlike standard fuzzing techniques which explore the test space blindly, our approach utilizes abstract interpretation based on intervals to locate the Frail-Points of program which may cause buffer over-flow in some special conditions and the technique of static taint trace to build mappings between the Frail-Points and program inputs. Moreover, acquire path constraints of each Frail-Point through symbolic execution. Finally, combine information of mappings and path constraints to propose a policy for guiding test case generation.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116680356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of measurement and display terminal in the central heating room and research of the charging method by indoor temperature measured 集中供暖室内测量显示终端的设计及室内测温计费方法的研究
2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA) Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6184013
Zhang Wan-jiang, Yang Guang, Hou Jing
{"title":"Design of measurement and display terminal in the central heating room and research of the charging method by indoor temperature measured","authors":"Zhang Wan-jiang, Yang Guang, Hou Jing","doi":"10.1109/ICCIAUTOM.2011.6184013","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6184013","url":null,"abstract":"The paper explores a new method of the heating measurement and charging in the central heating system. The method is different from mechanical heat metering and ultrasonic heat metering existing now. However, by measuring the indoor temperature and recording the temperature periodically during the heating period, and upload the data which are measured and stored in the terminal to the PC for analyzing after the heating period. It can adjust the charging according to the actual indoor temperature which is recorded in the terminal. And regulate the quantity of heating in the next heating period according to the data. Finally not only can the system meet the requirements of the users in the heating period, but also achieve the building energy efficiency. Adhere to people-oriented principle. Make the service of heating become more and more humanized.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125145188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of bootloader for embedded system based on S3C44b0X 基于S3C44b0X的嵌入式系统引导程序的设计与实现
2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA) Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183984
Guo Ying, Yu Zongzuo
{"title":"Design and implementation of bootloader for embedded system based on S3C44b0X","authors":"Guo Ying, Yu Zongzuo","doi":"10.1109/ICCIAUTOM.2011.6183984","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183984","url":null,"abstract":"The bootloader process is introduced based on the S3C44B0X processor, after the embedded system has powered on. With the file operating function in the file system, the bootloader program for translatable initializing code with convenient UI for embedded system and the load code is designed. The experiment proves that the method is stable and efficient.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123601609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A corrective method for image completion based on SPBP and SP 基于SPBP和SP的图像补全校正方法
2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA) Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183925
Jingping Zhang, Yahong Han
{"title":"A corrective method for image completion based on SPBP and SP","authors":"Jingping Zhang, Yahong Han","doi":"10.1109/ICCIAUTOM.2011.6183925","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183925","url":null,"abstract":"In this paper a novel approach to image completion is introduced, which based on algorithm of Structure Priority Belief Propagation (SPBP) and Structure Propagation (SP). It is to use the user input line segment as auxiliary and use other one kind of distribution to source patches and destination patches. Namely in the auxiliary line source part which shows the belt-shaped discrete distribution, to destination patches which needs to complete, So each destination patch, which containing auxiliary line segment, is the similar overlap scheme for SPBP algorithm. The experimental results indicated that this optimized method surpasses the first two algorithms obviously in the image completion effect, and enhances the operation efficiency as well.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129794240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on data recovery based on virtual machine technology 基于虚拟机技术的数据恢复研究
2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA) Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183915
Liang Zhi-yong, Wang Yuan
{"title":"Research on data recovery based on virtual machine technology","authors":"Liang Zhi-yong, Wang Yuan","doi":"10.1109/ICCIAUTOM.2011.6183915","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183915","url":null,"abstract":"As the popularity of computer popularization, data becomes more and more important in the information age. However computer users often have to face to the reality that the data is lost and damaged. This article will be based on virtual machine technology, testing and analyzing which one is more suitable for the people to use the data recovery software.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128315426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of VSP technology in the C37-6 well drilling VSP技术在C37-6井钻井中的应用
2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA) Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183903
Min Xu, Rui Li, Jianku Sun, Kenan Liu, Hanyu Lu
{"title":"Application of VSP technology in the C37-6 well drilling","authors":"Min Xu, Rui Li, Jianku Sun, Kenan Liu, Hanyu Lu","doi":"10.1109/ICCIAUTOM.2011.6183903","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183903","url":null,"abstract":"With the seismic prospecting developing into the complex and difficulty area, it is highly requested for structure interpretation. Calibration of horizon by the normal AC log usually can't correspond with through-well seismic profile, especially in the complex aloft-steep structure whose transverse velocity changes greatly, it is very easy to cause underground structure distort. It can exactly calibrate horizon of complex aloft-steep structure, confirm structural feature and location of fault point by the multi-azimuth VSP technology. The article illustrate the significance of technology in the objective argumentation of complex structure loss well sidetrack drilling through analysis the successfully application of C37-6 well area in the LW buried structure in East SiChuan basin.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"77 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116359160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PCFuzzing: A penetration combinatorial fuzzing framework by simulating attack trace PCFuzzing:一种模拟攻击轨迹的渗透组合模糊测试框架
2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA) Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6184020
Jian Yang, Huanguo Zhang, Jianming Fu, Fan Yang
{"title":"PCFuzzing: A penetration combinatorial fuzzing framework by simulating attack trace","authors":"Jian Yang, Huanguo Zhang, Jianming Fu, Fan Yang","doi":"10.1109/ICCIAUTOM.2011.6184020","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6184020","url":null,"abstract":"In essence, fuzzing is a kind of penetration testing by injecting fault to simulate the attacks. However, current fuzzings do not simulate the attacks in a real sense. They pay more attention to the injection of malformed semi-valid data at a single input point. Nevertheless, an attack is usually a set of cooperative aggressive behaviors at multi input points. In this paper, we present PCFuzzing, a penetration combinatorial fuzzing framework for the software in host environment by simulating attack trace at multi input points. Based on the attack attributes plug-in gained by means of static analysis in advance, PCFuzzing uses dynamic taint tracing to automatically find the input vector that influence values used at key program attack points (points where the program may contain an error), uses symbolic execution and constraint solving to identify the constraint boundary of every input in input vector and constraint relationship of the inputs in input vector, uses combinatorial testing strategies to generate and combine the malformed test case vector, and then injects the combinatorial test case vector to find security vulnerabilities in programs according to the attack strategies in the attack attributes plug-in. Our experimental results indicate that our PCFuzzing can not only effectively expose errors located deep within large applications, but also can avoid the combination explosion to a certain extent because taint tracer in framework uses dynamic taint tracing to reduce the number of inputs involved in the combination and constraint collector in framework uses symbolic execution and constraint solving to narrow the value ranges of input data.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116517511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capacity evaluation for dynamic route based on maximum flow in network theory 网络理论中基于最大流量的动态路由容量评价
2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA) Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183932
Y. Guohui, Dai Fu-qing
{"title":"Capacity evaluation for dynamic route based on maximum flow in network theory","authors":"Y. Guohui, Dai Fu-qing","doi":"10.1109/ICCIAUTOM.2011.6183932","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183932","url":null,"abstract":"This paper has researched the capacity evaluation of dynamic route. In the evaluation process, take the original routes as a factor and establish the capacity evaluation model for dynamic route based on maximum flow in network theory. Finally, a example proves that the model is reasonable and availability. The research result shows that the capacity of dynamic route will be restricted by the original routes in the network, while we open a dynamic route in the original airspace.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124327438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信