2008 International Symposium on Computer Science and Computational Technology最新文献

筛选
英文 中文
Reconstructed System of CT Image Based on Contour Tracking 基于轮廓跟踪的CT图像重构系统
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.84
Xiaomin Cheng, Z. Cui
{"title":"Reconstructed System of CT Image Based on Contour Tracking","authors":"Xiaomin Cheng, Z. Cui","doi":"10.1109/ISCSCT.2008.84","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.84","url":null,"abstract":"In the paper, the key technologies of authorized software are introduced. Image preprocessing, the comparative experiment of edge filter, the edge detection, the edge track and extract, data compression and system calibration and so on. Finally, the result of reconstruction is shown.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124755326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crack Fault Diagnosis Based on MEP Based Neural Network 基于MEP的神经网络裂纹故障诊断
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.274
Mingjun Liu, Liming Xiu, Guangfeng Jia, Yuehui Chen
{"title":"Crack Fault Diagnosis Based on MEP Based Neural Network","authors":"Mingjun Liu, Liming Xiu, Guangfeng Jia, Yuehui Chen","doi":"10.1109/ISCSCT.2008.274","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.274","url":null,"abstract":"The Multi Expression Programming (MEP) and Neural Network (NN) is applied to the crack fault diagnosis of structure. The inherent frequency and the position of the crack obtained by ANSYS are used as parameters of the neural network. This approach employs MEP to evolve the architecture and the parameters encoded in the NN. This framework allows input variables selection, over-layer connections for the various nodes involved. It is showed that the proposed method is feasible to diagnose the crack fault of structure.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125280109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Hot Spots Caching Mechanism for Queries with Popular Distribution 流行分布查询的分布式热点缓存机制
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.110
Jianyong Chen, Haijian Long, Leijuan Liang
{"title":"Distributed Hot Spots Caching Mechanism for Queries with Popular Distribution","authors":"Jianyong Chen, Haijian Long, Leijuan Liang","doi":"10.1109/ISCSCT.2008.110","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.110","url":null,"abstract":"Peer-to-peer (P2P) systems have gained considerable attention in the past few years. Since the popularity distribution of queries follows a zipf-like distribution in a P2P network, the performance can get significant improvement if a simple and effective caching mechanism called hot spots caching mechanism (HSCM) is used, which stores the IP address and port number of the successor node of the key. Simulations also show that the HSCM is basically independent of particular P2P algorithms and can be easily combined with other improved methods to further improve the performance of P2P search capabilities.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125317658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Algorithm of Web Text Clustering Analysis Based on Fuzzy Set 基于模糊集的Web文本聚类分析算法
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.139
Yun Peng, S. Ding
{"title":"An Algorithm of Web Text Clustering Analysis Based on Fuzzy Set","authors":"Yun Peng, S. Ding","doi":"10.1109/ISCSCT.2008.139","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.139","url":null,"abstract":"There are a large quantity of non-certain and non-structure contents in the Web text at the present time. It is difficult to cluster the text by some normal classification methods. An algorithm of Web text clustering analysis based on fuzzy set is proposed in this paper, and the algorithm has been described in detail by example. The technique can improve the algorithm complexity of time and space, increase the robustness of the algorithm. To check the accuracy and efficiency of the algorithm, the comparative analysis of the sample and test data is provided in the end.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129968899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influencing Factors with Respect to Basic Essence in National Defence for Chinese University Students 我国大学生国防基本要素的影响因素
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.313
Yanlong Cheng, Ying Ge
{"title":"Influencing Factors with Respect to Basic Essence in National Defence for Chinese University Students","authors":"Yanlong Cheng, Ying Ge","doi":"10.1109/ISCSCT.2008.313","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.313","url":null,"abstract":"Based on rough set theory, this paper investigates basic essence in national defence for Chinese university students, and give influencing degrees of some influencing factors with respect to basic essence in national defence.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121862472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fast Mobile Target Tracking Based on Kalman Filter and MUSIC Algorithm 基于卡尔曼滤波和MUSIC算法的移动目标快速跟踪
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.35
Yan Guo, Zuping Qian, Zeqing Yao, Ning Li
{"title":"Fast Mobile Target Tracking Based on Kalman Filter and MUSIC Algorithm","authors":"Yan Guo, Zuping Qian, Zeqing Yao, Ning Li","doi":"10.1109/ISCSCT.2008.35","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.35","url":null,"abstract":"This paper presents a Kalman-filter-based method, to track the direction-of-arrival (DOA) of a moving target using antenna array in mobile communications. There are two major new features about the proposed scheme. Firstly, traditional Kalman filter needs measurement transformed. However, it is difficult and costly to be obtained. And our method could work without this message. Secondly, the traditional MUSIC algorithm would search the DOA of the targets through the whole plane, which is computational expensive. Our method would search the DOA of the targets only through some part of the whole plane. This leads to great savings in computational cost. Of the proposed algorithm, simulation results show that our method has similar accuracy to other method, but offers cheaper computational complexity.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis and Simulation Protocols Based on Slotted ALOHA for Plastic Optical Fiber Network 基于开槽ALOHA的塑料光纤网络分析与仿真协议
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.244
Ning Zhang, R. Liu
{"title":"Analysis and Simulation Protocols Based on Slotted ALOHA for Plastic Optical Fiber Network","authors":"Ning Zhang, R. Liu","doi":"10.1109/ISCSCT.2008.244","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.244","url":null,"abstract":"In this paper a novel multipriority reservation protocols for plastic optical fiber network is proposed. In conventional OCDMA system only allows finite units to transmit and access simultaneously according to the number of channels which be restricted by BER. To resolve this problem, a novel protocol based on slotted ALOHA is proposed in this paper. By using the reservation scheme and a distributed arbitration algorithm, channel collision and destination conflict can be avoided. The protocol can efficiently support the transmission of multimedia messages that require the different time-delay. The network throughput and average delay has been investigated by numerical analysis and simulation experiments. It is showed that the multipriority reservation protocol in this POF network is valid and efficient.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116486311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Inter-cluster Routing Algorithm of Clustering Data Collection Protocol in WSNs wsn中聚类数据采集协议的簇间路由算法
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.302
Xin-lian Zhou, Xu Jian-bo
{"title":"The Inter-cluster Routing Algorithm of Clustering Data Collection Protocol in WSNs","authors":"Xin-lian Zhou, Xu Jian-bo","doi":"10.1109/ISCSCT.2008.302","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.302","url":null,"abstract":"In wireless sensor networks, clustering is considered as an effective energy-saving routing technology. In this paper, we proposed an inter-cluster routing schedule for data collection to solve inter-cluster communication problems: make sure the dominating set C produced by clustering algorithm meets the connectivity and constructs a routing pool tree, which can be got by using jump to jump transmission. For the cluster heads, we use tree¿s parent method for data structure, that is, we proposed an inter-cluster routing pool tree based on reversed spread way, and proved that as long as the cluster head¿s wireless communications radius is three times to the original one, it will be able to guarantee connectivity between cluster heads.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116343155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applying Data Fusion in Collaborative Alerts Correlation 数据融合在协同警报关联中的应用
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.38
Xin Zhuang, Debao Xiao, Xuejiao Liu, Yugang Zhang
{"title":"Applying Data Fusion in Collaborative Alerts Correlation","authors":"Xin Zhuang, Debao Xiao, Xuejiao Liu, Yugang Zhang","doi":"10.1109/ISCSCT.2008.38","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.38","url":null,"abstract":"Due to various network intrusions, network security has always been a main concern of the network administrator. However, nowadays traditional security tools like IDSs, firewalls etc cannot play the roles of effective defense mechanisms. Instead, they only generate elementary alerts to form alert flooding and they often have high false alerts rates. Moreover due to their weak collaboration-awareness, they cannot detect large distributed attacks such as a DDoS attack. In this paper, we present an efficient and effective model for collaborative alerts analyzing. Our system enhances the alert verification using assets¿ contextual information. By applying alert fusion and using a precisely defined knowledge base in the correlation phase, it also provides a method to get general and synthetic alerts from the large volume of elementary alerts. Moreover, this system is able to reconstruct the attack scenarios for multi-step attacks. Experiments show the system can effectively distinguish false positives, detect and predicate large-scale attacks in their early stage.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126717424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Active Authorization Rules for Enforcing RBAC with Spatial Characteristics 用于执行具有空间特征的RBAC的主动授权规则
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.311
Zhu Tang, Shiguang Ju, Weihe Chen
{"title":"Active Authorization Rules for Enforcing RBAC with Spatial Characteristics","authors":"Zhu Tang, Shiguang Ju, Weihe Chen","doi":"10.1109/ISCSCT.2008.311","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.311","url":null,"abstract":"The integration of the spatial dimension into RBAC-based models has been the hot topic as a consequence of the growing relevance of geo-spatial information in advanced GIS and mobile applications. Dynamically monitoring the state changes of an underlying system, detecting and reacting to changes without delay are crucial for the success of any access control enforcement mechanism. Thus, current systems or models should provide a flexible mechanism for enforcing RBAC with spatial characteristics in a seamless way, and adapt to policy or role structure changes in enterprises, which are indispensable to make RBAC with spatial characteristics usable in diverse domains. In this paper we will show how On-If-Then-Else authorization rules (or enhanced ECA rules) are used for enforcing RBAC with spatial characteristics in a seamless way. Large enterprises have hundreds of roles, which requires thousands of rules for providing access control, and generating these rules manually is error-prone and a cognitive-burden for non-computer specialists. Thus, in this paper, we will discuss briefly how these authorization rules can be automatically generated from high level specifications of enterprise access control policies.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126725906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信