2010 Second International Conference on Computational Intelligence and Natural Computing最新文献

筛选
英文 中文
A seventh-order convergent Newton-type method for solving nonlinear equations 求解非线性方程的七阶收敛牛顿型方法
Yunhong Hu, Liang Fang
{"title":"A seventh-order convergent Newton-type method for solving nonlinear equations","authors":"Yunhong Hu, Liang Fang","doi":"10.1109/CINC.2010.5643798","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643798","url":null,"abstract":"In this paper, we present a seventh-order convergent Newton-type method for solving nonlinear equations which is free from second derivative. At each iteration it requires three evaluations of the given function and two evaluation of its first derivative. Therefore its efficiency index is equal to equation which is better than that of Newton's method √2. Several examples demonstrate that the algorithm is more efficient than classical Newton's method and other existing methods.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121005812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A study of feature determine-based compressed image retrieval 基于特征确定的压缩图像检索方法研究
Zikun Liu, Jianfeng Wang
{"title":"A study of feature determine-based compressed image retrieval","authors":"Zikun Liu, Jianfeng Wang","doi":"10.1109/CINC.2010.5643910","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643910","url":null,"abstract":"The distance measure for features is of critical importance for all kind of classification methods in image retrieval algorithm. In this paper, we propose to introduce the Mahalanobis distance and additional Whirling correlation test to formulate a combined content similarity detection with discrete walsh transform (DWT). We show that, with the same content based image retrieval algorithm, adding Mahalanobis distance to the existing operational process can improve the performance of content based image retrieval significantly. Finally, In a series of experiments we show the improved noise robustness of image retrieval by the proposed modifications in contrast to the traditional approach.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121121406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the digital coupon of mobile two-dimensional code based on RSA digital signature 基于RSA数字签名的移动二维码数字优惠券研究
H. Meng, Dejia Zhang
{"title":"Research on the digital coupon of mobile two-dimensional code based on RSA digital signature","authors":"H. Meng, Dejia Zhang","doi":"10.1109/CINC.2010.5643713","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643713","url":null,"abstract":"digital coupon is an application system which makes the coupon circulating on internet by the digital forms. The real commercial system hasn't presented yet in current domestic. The problem lies in the function realization of transferring, prevention of repeated consumption and non-repudiation. In this research, the author puts forward with a set of solutions for digital coupon system based on authentication technology of digital signature, and carried by mobile two-dimensional code by analyzing the relevant studies at home and aboard, and integrating the current popular encryption and transmission technology. The testing system resulted by this study is with innovation, good implementation efficiency and practicality. The obtained theory and experience can be a meaningful reference to other studies in relevant fields.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127329851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on active learning based computer viruses detection approaches 基于主动学习的计算机病毒检测方法研究
Ou Qingyu, Z. Dawei
{"title":"Research on active learning based computer viruses detection approaches","authors":"Ou Qingyu, Z. Dawei","doi":"10.1109/CINC.2010.5643779","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643779","url":null,"abstract":"As traditional computer viruses detection approaches update slowly and have poor ability in detecting unknown viruses, active learning is well-suited to many problems in viruses detect processing, where unlabeled data may be abundant but annotationis slow and expensive. This paper aim to shed light on the application of the active learning theory in computer viruses detection. Moreover, to improve the precision of the virus detection and the efficiency of the active learning process, query function based on the uncertainty based sampling is realized. Experiments' results show that the model has very good detection precision against unknown computer viruses and can greatly shorten the training time and reduce the requirements of the training data and improve the learning efficiency of the system.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124864800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy assessment method of professional skill based on feedback amendment 基于反馈修正的专业技能模糊评价方法
Xu Qinghua, Lili Tao, Sun Chuan, Ding Wanjing
{"title":"Fuzzy assessment method of professional skill based on feedback amendment","authors":"Xu Qinghua, Lili Tao, Sun Chuan, Ding Wanjing","doi":"10.1109/CINC.2010.5643715","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643715","url":null,"abstract":"According to the requirements and characteristics of operational skills, we need to build analysis of relations between assessment index and operational skills and use fuzzy comprehensive methods to evaluate in order to improve the scientific and reliability of mechanical operation skills assessment. For reducing the human subjective factors, we use AHP to determine the index weight. Using fuzzy set transformation principle, fuzzy assessment matrix is constructed. This paper also gives a method of professional skill fuzzy assessment based on feedback.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125299473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new evidence fusion approach for decision of proactive service 一种新的主动服务决策证据融合方法
De-gan Zhang, C. Li, Wei-Wei Li, Xu-yan Chen
{"title":"A new evidence fusion approach for decision of proactive service","authors":"De-gan Zhang, C. Li, Wei-Wei Li, Xu-yan Chen","doi":"10.1109/CINC.2010.5643802","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643802","url":null,"abstract":"Multi-source heterogeneous information fusion is an extremely challenging problem because of the complex and highly irregular nature of environment. We consider decision fusion problem in the presence of m-dependent evidences in this paper. A new evidence fusion approach for decision of proactive service has introduced, which is extending of Class D-S Evidence method. We applied this approach in our active space project for seamless nomadic service of pervasive computing paradigm, good results have been attained. The validity of approach of this paper has been tested.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122953065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interior-point method for second-order cone programming based on a simple kernel function 基于简单核函数的二阶锥规划的内点法
Li Dong, Jingyong Tang
{"title":"Interior-point method for second-order cone programming based on a simple kernel function","authors":"Li Dong, Jingyong Tang","doi":"10.1109/CINC.2010.5643888","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643888","url":null,"abstract":"Interior-point methods not only are the most effective methods in practice but also have polynomial-time complexity. In this paper we present a primal-dual interiorpoint algorithm for second-order cone programming problems based on a simple kernel function. We derive the iteration bounds O(nlogε/n over n) and O(√nlogε/n over n) for large- and small-update methods, respectively, which are as good as those in the linear programming.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117302040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study on the Organization Information Security Investment Decision-Making Based on the Limited Strategy Game Theory Perspective 基于有限策略博弈论视角的组织信息安全投资决策研究
Liu Zeshuang, Li Jing
{"title":"Study on the Organization Information Security Investment Decision-Making Based on the Limited Strategy Game Theory Perspective","authors":"Liu Zeshuang, Li Jing","doi":"10.1109/CINC.2010.5643873","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643873","url":null,"abstract":"Information security is currently a variety of institutions and organizations around the world one of the problems to be addressed letter. Only concerned with the past, information security and technology research is different from the issue of information security is actually including technology, management and legal, including systems engineering, in which investment in information security management issue is one of the important issues. Of information security investment has a unique dependence of the characteristics of the strategy, this strategy is the dependence of the basic features of game theory, so this strategy game with limited research organization of information security investment decision-making, provide a new approach to address the organization's information security investment decision-making problem.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129725538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-document Relationship Model for a same subject and its application in automatic summarization 同一主题的多文档关系模型及其在自动摘要中的应用
Hao Bai, De-xiang Zhou
{"title":"Multi-document Relationship Model for a same subject and its application in automatic summarization","authors":"Hao Bai, De-xiang Zhou","doi":"10.1109/CINC.2010.5643796","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643796","url":null,"abstract":"In this paper, we proposed Multi-document Relationship Model for a same subject and applicated it in automatic summarization. By using the relationship between text units in different level and information of time and sequence of event contained into document set, this model fuse many documents to extract summarization automatically under not reducing the information in original documents. This model simplied the triditional model presented by cross structure theory and simultaneously, replenish the evolution and distribution information of subject which lacked in information fusion. This paper gives some algorithm about construction of the model, information fusion for multi-document and summarization extraction and so on. Experiment results implied that the model proposed in this paper can solve the problem of summarization extraction for multi-document very well.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128478832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel generic framework of event detection in unmanned aerial videos 一种新的无人机视频事件检测通用框架
Yulong Tian, J. Lu, Yang Li, Jiabao Wang
{"title":"A novel generic framework of event detection in unmanned aerial videos","authors":"Yulong Tian, J. Lu, Yang Li, Jiabao Wang","doi":"10.1109/CINC.2010.5643819","DOIUrl":"https://doi.org/10.1109/CINC.2010.5643819","url":null,"abstract":"The research on event detection in unmanned aerial videos has received a large attention in the recent years. Plenty of methods have been proposed in this area. However, there is no agreement on which methods fit well for the application in the unmanned aerial videos and which methods fit well for certain event detection. In this paper, we present a framework for event detection in unmanned aerial videos and proposed a series of events to be detected. We mainly divide these events into two categories according to whether the event subject can be well detected and tracked, and all of them are rule-based and model-based. The framework we proposed will adapt to the event detection task. In rule-based event detection, we will give some design methods by way of examples. And in model-based event detection, we will introduce some popular methods in this area and will give out evaluation methods.","PeriodicalId":227004,"journal":{"name":"2010 Second International Conference on Computational Intelligence and Natural Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128247755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信