{"title":"Multi-attribute decision-making based on rough set theory and modified PBMF-index function","authors":"Ting-Cheng Chang, K. Huang, Chuen-Jiuan Jane","doi":"10.1109/ANTHOLOGY.2013.6784966","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784966","url":null,"abstract":"A function is proposed for descritizing and classifying the uncertain data of multi-attribute decision-making (MADM) datasets using a hybrid scheme incorporating fuzzy set theory, Rough Set (RS) theory and a modified form of the PBMF index function. The proposed MADM index function is used to extend the applicability of the single-attribute decision-making (SADM) function. The validity of the proposed MADM index function is evaluated by comparing the descritizing results obtained for a simple hypothetical function with those obtained using a SADM function and the conventional PBMF function.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"354 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122800299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An active attack on chaotic based text zero-watermarking","authors":"Lu He, Xiaolin Gui","doi":"10.1109/ANTHOLOGY.2013.6784740","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784740","url":null,"abstract":"Without modified cover text, zero-watermarking technology makes steganalysis technology is completely ineffective. However, as far as the resilient of active attack, there's no deep study currently. In this paper, the text zero-watermarking algorithm based on chaotic map, which has a better robustness, is regarded as the attack target. By synonym substitution, two kinds of attack methods: Sync-attack and Birthday-attack has been determined. Then a text watermark algorithm for lexical active attack was proposed by combining the two methods. Experiments show that the algorithm can effectively destroy the zero-watermark without massive rewrite texts.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131422475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The application of the improved Ant Colony Algorithm in mine locomotive scheduling problem","authors":"Guo-ning Gan, Ting-lei Huang, Shuai Gao","doi":"10.1109/ANTHOLOGY.2013.6784852","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784852","url":null,"abstract":"Ant Colony Algorithm has some advantages in solving complex optimization problems, in particular discrete optimization problem. A mine locomotive scheduling algorithm based on the improved Ant Colony Algorithm for the mine locomotive scheduling problem has proposed in this paper. The method takes simulated annealing algorithm as a local search strategy of ant colony algorithm, aim at expanding the solution search space, avoiding falling into local optimum that improve convergence rate of the algorithm by dynamic pheromone evaporation factor. Simulation results show that the algorithm is more efficiency in locomotive scheduling than the basic ant colony algorithm.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131514322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel registration method based on triangular pattern marker","authors":"Jiamin Liu, Lexiang An, Yan Chang, Dan Yang","doi":"10.1109/ANTHOLOGY.2013.6784890","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784890","url":null,"abstract":"This paper presents a three-dimensional (3D) registration method based on a triangular pattern marker in augmented reality (AR). The triangular pattern on the marker in the captured video image is recognized via the edge detection. The triangle vertices which are used to calculate the homography matrix are extracted. The camera calibration for tracking accurate pose of the object is then implemented with the homography matrix that deduces into the camera extrinsic parameters. Through experimental testing with the method, the 3D virtual objects can be rendered accurately on top of the marker into the physical video image.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131552755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combinational circuit design using bees algorithm","authors":"Nahid Mollabakhshi, M. Eshghi","doi":"10.1109/ANTHOLOGY.2013.6784767","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784767","url":null,"abstract":"In this paper a novel method to designing combinational circuits using Bees Algorithm is presented. In automatic evolutionary design methods, the main problem is related to “combinatorial explosion” existing in those methods. Because evolutionary design methods are based on “generate and test” model, therefore with growing input numbers of digital circuits, the number of potential combinations which must be tested are growing exponentially. To solve this problem, it is important to elaborate efficient decomposition techniques of the designed circuits to some less complex sub-circuits, and then to design each of them independently. We present a new application of Bees Algorithm, and design and optimize combinational circuits. A computer simulation is developed to verify the performance of the proposed algorithm. We compared the circuits obtained by our proposed system to the circuits designed by experienced human designers. In comparison to human design, our automated designs had fewer gates.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131564717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel fault-tolerance design model for automatic synthesis of circuit robust to unknown fault","authors":"Huan Chang, Jingsong He","doi":"10.1109/ANTHOLOGY.2013.6784722","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784722","url":null,"abstract":"Analog circuits are indispensable in many electronic system design, as fundament. Considering accuracy and stability of circuit, fault-tolerance design is of great significance. For the lack of automatic design of fault-tolerant analog circuit robust to unknown fault, this paper presents a fault-tolerance design process with two steps: standard design and fault-tolerant design. A novel fault-tolerance design model and three fault-models are proposed. An Ultra-Wideband Highpass Filter satisfying RF design specification is designed as a case study. Experimental results shows that, the tolerant-circuit performs relatively robust compared with Butterworth highpass filter and standard-design circuit. The two-steps fault-tolerance design process is successfully used to design fault-tolerant analog circuit robust unknown fault.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131097415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wastewater treatment prediction based on immune optimization multi-output least squares support vector regression machine","authors":"Ye Hongtao, Luo Fei, Xu Yuge, Tan Guangxing","doi":"10.1109/ANTHOLOGY.2013.6784868","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784868","url":null,"abstract":"In order to improve effluent water quality prediction precision of wastewater treatment system, the main factors which have influence on the effluent quality are analyzed. Wastewater treatment system is a multi-input multi-output system. But the traditional support vector regression machine (SVRM) algorithms are only used for single-output systems. If several SVRM models are constructed for multi-input multi-output systems, it will increase the complexity of the algorithm and the precision is poor for the correlation of output variables. In order to solve prediction problem of multi-output system, a method of multi-output least squares support vector regression machine (LS-SVRM) based on immune optimization is proposed in this study. The multi-output LS-SVRM is used to predict effluent quality, using the immune algorithm to optimize the parameters of the multi-output LS-SVRM. Simulation shows that the proposed method has a better prediction precision for wastewater treatment system.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126997757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A performance evaluation of RTOS for TOPPERS/ASP kernel","authors":"W. Ren, Dingxin He, Jin Zhao","doi":"10.1109/ANTHOLOGY.2013.6784891","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784891","url":null,"abstract":"TOPPERS Project is to develop a series of open source real time operating systems(RTOS) and other software stacks for embedded systems, also is one of the latest developments of ITRON specification, which is de-facto standard real time kernel specification in Japan. TOPPERS/ASP kernel is the core and foundation of TOPPERS Project, also is an exploration and protype of next generation RTOS. This paper makes a performance evaluation between TOPPERS/ASP kernel and other three well-known RTOSs, RTEMS, FreeRTOS, and μC/OS-II. By comparison in performance, the validity in design and features of TOPPERS/ASP kernel can be testified and presented.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115170947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel method of true color image edge detection based on wavelet multi-scale","authors":"Feng Xiao, Mingquan Zhou, Guohua Geng","doi":"10.1109/ANTHOLOGY.2013.6784889","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784889","url":null,"abstract":"To make up the defect of conventional image edge detection methods which don't make full use of color image information, this paper puts forward a color image edge extraction algorithm based on wavelet multi-scale, where the image edges are extracted via the following two steps: firstly polishing the three components R, G, B by wavelet multi-scale features template; then preceding vector extended gradient after the polishing. Experimental results show the algorithm can effectively extract the true color image edge.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132776489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel identity based undeniable signature scheme","authors":"Shuang Li, Chen Wang, Maozhi Xu, Deyou Xie","doi":"10.1109/ANTHOLOGY.2013.6784885","DOIUrl":"https://doi.org/10.1109/ANTHOLOGY.2013.6784885","url":null,"abstract":"In this paper, we give a first example of identity based undeniable signature from NTRU lattice. We extend to the identity based setting the security model for the notions of invisibility and anonymity given by Galbraith and Mao in 2003 and we prove that our scheme is existentially unforgeable under the assumption in the random oracle model. We also prove that it has the unfogreability and anonymity property under our scheme.","PeriodicalId":203169,"journal":{"name":"IEEE Conference Anthology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133717596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}