{"title":"A seventh-order convergent Newton-type method for solving nonlinear equations","authors":"Yunhong Hu, Liang Fang","doi":"10.1109/CINC.2010.5643798","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643798","url":null,"abstract":"In this paper, we present a seventh-order convergent Newton-type method for solving nonlinear equations which is free from second derivative. At each iteration it requires three evaluations of the given function and two evaluation of its first derivative. Therefore its efficiency index is equal to equation which is better than that of Newton's method √2. Several examples demonstrate that the algorithm is more efficient than classical Newton's method and other existing methods.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"55 7-8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121005812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study of feature determine-based compressed image retrieval","authors":"Zikun Liu, Jianfeng Wang","doi":"10.1109/CINC.2010.5643910","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643910","url":null,"abstract":"The distance measure for features is of critical importance for all kind of classification methods in image retrieval algorithm. In this paper, we propose to introduce the Mahalanobis distance and additional Whirling correlation test to formulate a combined content similarity detection with discrete walsh transform (DWT). We show that, with the same content based image retrieval algorithm, adding Mahalanobis distance to the existing operational process can improve the performance of content based image retrieval significantly. Finally, In a series of experiments we show the improved noise robustness of image retrieval by the proposed modifications in contrast to the traditional approach.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121121406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the digital coupon of mobile two-dimensional code based on RSA digital signature","authors":"H. Meng, Dejia Zhang","doi":"10.1109/CINC.2010.5643713","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643713","url":null,"abstract":"digital coupon is an application system which makes the coupon circulating on internet by the digital forms. The real commercial system hasn't presented yet in current domestic. The problem lies in the function realization of transferring, prevention of repeated consumption and non-repudiation. In this research, the author puts forward with a set of solutions for digital coupon system based on authentication technology of digital signature, and carried by mobile two-dimensional code by analyzing the relevant studies at home and aboard, and integrating the current popular encryption and transmission technology. The testing system resulted by this study is with innovation, good implementation efficiency and practicality. The obtained theory and experience can be a meaningful reference to other studies in relevant fields.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127329851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on active learning based computer viruses detection approaches","authors":"Ou Qingyu, Z. Dawei","doi":"10.1109/CINC.2010.5643779","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643779","url":null,"abstract":"As traditional computer viruses detection approaches update slowly and have poor ability in detecting unknown viruses, active learning is well-suited to many problems in viruses detect processing, where unlabeled data may be abundant but annotationis slow and expensive. This paper aim to shed light on the application of the active learning theory in computer viruses detection. Moreover, to improve the precision of the virus detection and the efficiency of the active learning process, query function based on the uncertainty based sampling is realized. Experiments' results show that the model has very good detection precision against unknown computer viruses and can greatly shorten the training time and reduce the requirements of the training data and improve the learning efficiency of the system.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124864800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy assessment method of professional skill based on feedback amendment","authors":"Xu Qinghua, Lili Tao, Sun Chuan, Ding Wanjing","doi":"10.1109/CINC.2010.5643715","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643715","url":null,"abstract":"According to the requirements and characteristics of operational skills, we need to build analysis of relations between assessment index and operational skills and use fuzzy comprehensive methods to evaluate in order to improve the scientific and reliability of mechanical operation skills assessment. For reducing the human subjective factors, we use AHP to determine the index weight. Using fuzzy set transformation principle, fuzzy assessment matrix is constructed. This paper also gives a method of professional skill fuzzy assessment based on feedback.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125299473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new evidence fusion approach for decision of proactive service","authors":"De-gan Zhang, C. Li, Wei-Wei Li, Xu-yan Chen","doi":"10.1109/CINC.2010.5643802","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643802","url":null,"abstract":"Multi-source heterogeneous information fusion is an extremely challenging problem because of the complex and highly irregular nature of environment. We consider decision fusion problem in the presence of m-dependent evidences in this paper. A new evidence fusion approach for decision of proactive service has introduced, which is extending of Class D-S Evidence method. We applied this approach in our active space project for seamless nomadic service of pervasive computing paradigm, good results have been attained. The validity of approach of this paper has been tested.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122953065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interior-point method for second-order cone programming based on a simple kernel function","authors":"Li Dong, Jingyong Tang","doi":"10.1109/CINC.2010.5643888","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643888","url":null,"abstract":"Interior-point methods not only are the most effective methods in practice but also have polynomial-time complexity. In this paper we present a primal-dual interiorpoint algorithm for second-order cone programming problems based on a simple kernel function. We derive the iteration bounds O(nlogε/n over n) and O(√nlogε/n over n) for large- and small-update methods, respectively, which are as good as those in the linear programming.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117302040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the Organization Information Security Investment Decision-Making Based on the Limited Strategy Game Theory Perspective","authors":"Liu Zeshuang, Li Jing","doi":"10.1109/CINC.2010.5643873","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643873","url":null,"abstract":"Information security is currently a variety of institutions and organizations around the world one of the problems to be addressed letter. Only concerned with the past, information security and technology research is different from the issue of information security is actually including technology, management and legal, including systems engineering, in which investment in information security management issue is one of the important issues. Of information security investment has a unique dependence of the characteristics of the strategy, this strategy is the dependence of the basic features of game theory, so this strategy game with limited research organization of information security investment decision-making, provide a new approach to address the organization's information security investment decision-making problem.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129725538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-document Relationship Model for a same subject and its application in automatic summarization","authors":"Hao Bai, De-xiang Zhou","doi":"10.1109/CINC.2010.5643796","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643796","url":null,"abstract":"In this paper, we proposed Multi-document Relationship Model for a same subject and applicated it in automatic summarization. By using the relationship between text units in different level and information of time and sequence of event contained into document set, this model fuse many documents to extract summarization automatically under not reducing the information in original documents. This model simplied the triditional model presented by cross structure theory and simultaneously, replenish the evolution and distribution information of subject which lacked in information fusion. This paper gives some algorithm about construction of the model, information fusion for multi-document and summarization extraction and so on. Experiment results implied that the model proposed in this paper can solve the problem of summarization extraction for multi-document very well.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128478832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel generic framework of event detection in unmanned aerial videos","authors":"Yulong Tian, J. Lu, Yang Li, Jiabao Wang","doi":"10.1109/CINC.2010.5643819","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643819","url":null,"abstract":"The research on event detection in unmanned aerial videos has received a large attention in the recent years. Plenty of methods have been proposed in this area. However, there is no agreement on which methods fit well for the application in the unmanned aerial videos and which methods fit well for certain event detection. In this paper, we present a framework for event detection in unmanned aerial videos and proposed a series of events to be detected. We mainly divide these events into two categories according to whether the event subject can be well detected and tracked, and all of them are rule-based and model-based. The framework we proposed will adapt to the event detection task. In rule-based event detection, we will give some design methods by way of examples. And in model-based event detection, we will introduce some popular methods in this area and will give out evaluation methods.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128247755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}