{"title":"Flow Based Botnet Detection","authors":"Hsiao-Chung Lin, Chia-Mei Chen, Jui-Yu Tzeng","doi":"10.1109/ICICIC.2009.214","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.214","url":null,"abstract":"Botnet is a collection of computer hosts exploited by malicious software that is remotely controlled through a command and control channel. More new types of attacks invented based on Botnets. Because of usage of legitimate IRC (Internet Relay Chat) servers to command and control the bots, it is hard to detect and remove Botnets. Flow information may keep the fingerprint of bots and can be used to identify IRC-based Botnets. The proposed method applies flow correlation for grouping the same activities of the same IRC-based bots. After flow correlation, the normal IRC and abnormal IRC traces are identified by scoring technique.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116361744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling and Simulation of Shape Memory Alloys Micro-Actuator","authors":"Hong Liang, Chunnian Zeng, C. Giraud-Audine","doi":"10.1109/ICICIC.2009.266","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.266","url":null,"abstract":"In recent years, the Preisach model has emerged to capture the complex hysteresis behavior of many smart material, such as piezoceramics, shape memory alloys (SMA) and so forth. This paper addressed modeling and simulation of the micro-actuator SMA wires. We introduce the numerical implementation of the preisach model, which avoids the double integration and using experimental data directly. For the explore of the model, the novel concept of input memory matrix MUt and output memory matrix MFt is introduced in the paper. These concept is useful not only for the numerical implementation of the Preisach model but also for its theoretical investigation as well. A experimental configuration has been constructed to obtain the data we need for the modeling. A good quantitative match is observed between model output and experimental data. Some theoretical explore of the Preisach model can be applied to a wide class of smart material actuators.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123474100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing and Realizing of Database System of Chinese Medicine Ancient Literature","authors":"Yao Liu, Xuefei Chen, Yang Zhou, Zhenguo Wang","doi":"10.1109/ICICIC.2009.171","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.171","url":null,"abstract":"According to bibliography, this article classifies literatures with different structures and different style. It breaks through the traditional concept of field name and substitutes it with a kind of range to realize synchronous search and show of data with several kinds of formats successfully for the convenience of literature's management and use, which supplies a new thought and facilities the designer and the user. The built database of Chinese medicine ancient literature has such functions as editing, classifying, depositing, full-text search, post-controlled search and semantic search.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122015494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AHU Control Strategies in the VAV System","authors":"Yuying Sun, Zhonglei Zheng, Xun Hou, Peizhe Tian","doi":"10.1109/ICICIC.2009.72","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.72","url":null,"abstract":"This paper mainly introduces Air Handling Unit control in the Variable Air Volume air condition system. Combined with engineering experiences, it introduces some experiences of supply air temperature control of AHU, and makes a comparison with the constant static pressure control strategy, the optimized static pressure control strategy, and the total air volume control strategy, to give some recommendations for the VAV system control.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124037640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly Program Behavior Detection Based on Neural Network","authors":"Dingyi Fang, Xiaojiang Chen, Zhangyong Tang, Feng Chen","doi":"10.1109/ICICIC.2009.106","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.106","url":null,"abstract":"Neural network can be used in anomaly detection. In order to improve the traditional IDS (intrusion detection system) performance, we often had to change the network structure and detection algorithm. And because intrusion techniques are most variable and unpredictable, we cannot always use the fixed detection techniques to catch exactly all possible intrusions. It is therefore important to investigate novel detection methods and IDS models. In this paper, a model of intrusion detection system based on BP neural network is proposed through analyzing features of program behavior. Some details and issues on the design and implementation of the model are discussed and experiments are also given.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124718243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Introduction and Future Visions of E-Learning at Chienkuo Technology University","authors":"Chun-Hua Chen, Min-Hsin Chen","doi":"10.1109/ICICIC.2009.358","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.358","url":null,"abstract":"The eLearning technology is developing rapidly, therefore the overall studying environment is also changed in a quick way. Through the establishment of Learning System Management (LSM), learner can study through internet everywhere and every time to reduce the problem of having no time to come to school physically. This really bring the nowadays media technology into full play. Beginning from the fall semester of 2003 we began eLearning study for students in ChienKuo Technology University (CTU). From the semester of fall of 2005 to the semester of spring of 2009, ChienKuo Technology University total got continued 3 years of academic support of Teaching Excellent Plan of Ministry of Education (MOE). Total support amount reached NT$165,000,000. We used part of these supports to extend eLearning equipments and finished 2 eLearning digitized courses of general education center and 7 of college of business. Moreover, we are getting to coordinate with other country's college to perform eLearning to advance the practice of eLearning in CTU.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125049216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining Multiple Periodic Time Series for Detecting Unusual Sub-Sequences","authors":"J. Ameen, R. Basha","doi":"10.1109/ICICIC.2009.259","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.259","url":null,"abstract":"Advances in computer and information technology have opened a new avenue in the analysis of large and more detailed datasets that has become possible to observe. Most of the classical methodologies and techniques have become obsolete and fresh approaches of data analysis are overdue. In our previous articles Ameen JRM & Basha R (2006) and Basha R & Ameen JRM (2007), we have introduced algorithms for observing sub sequence discords for time series data with periodicity making it possible to save considerable processing time using logic and borrowing ideas from classical statistics. This paper deals with time series with multiple periodicities. Such datasets are naturally occurring when data are observed at higher frequencies and at a near continuous level from real life processes. Our approach and methodology will be applied to data that have been observe from daily consumption of electricity for more than two years indicating periodicity at weekly, monthly and yearly levels having multiple periodicity. We will demonstrate our approach's efficiency for situations of a similar nature in identifying subsequence discords efficiently together with 'motifs' as defined by Keogh et al.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127428681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High-Accuracy Watermarking Scheme on H.264 Based on Majority Voting","authors":"Tsong-Yi Chen, Da-Jinn Wang, Thou-Ho Chen, Guan-Jiun Wang, Johng-Chern Chern","doi":"10.1109/ICICIC.2009.230","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.230","url":null,"abstract":"In this paper, we use video watermarking on H.264 video compressed, to reach protect for video data. In recent years, H.264 is a new advanced video compressed standard. It provides high compression efficiency and compress quality, digital data is easy to be altered. One of the most important things is to prevent the data to be illegally used. We propose a method is compare many corresponding AC coefficient, to embed watermark information of I Frame, and compare corresponding AC coefficient to extract watermark by majority. Additionally, results show that watermark extracting to possess high accuracy as well as the watermark information can be effective against the impact of video compression.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130019613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qiao-chu Sun, Chuang-Bai Xiao, Ben Guo, Qun-fei Mu
{"title":"Feature Extraction of Edible Oil FTIR Based on Fractal Geometry","authors":"Qiao-chu Sun, Chuang-Bai Xiao, Ben Guo, Qun-fei Mu","doi":"10.1109/ICICIC.2009.209","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.209","url":null,"abstract":"A feature extraction of edible oil FTIR based on fractal geometry is proposed in this paper. Theoretical calculation formulas of fractal dimension are introduced. The calculation method of box-counting dimension based on FTIR is analyzed. We have used the open source computer vision library OpenCV to implement the FTIR of edible vegetable oils fractal dimension calculation algorithm. The result indicates that the FTIR of corn oil and sesame oil can be discriminated effectively by the difference of boxcounting dimension.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130060142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Yamada, D. Gong, T. Hagiwara, I. Murakami, Y. Ando, Y. Imai, Masahiko Kobayashi
{"title":"The Parametrization of All Disturbance Observers for Time-Delay Plants with Input Disturbance","authors":"K. Yamada, D. Gong, T. Hagiwara, I. Murakami, Y. Ando, Y. Imai, Masahiko Kobayashi","doi":"10.1109/ICICIC.2009.362","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.362","url":null,"abstract":"In this paper, we examine the parametrization of all disturbance observers for time-delay plants with any input disturbance. The disturbance observers have been used to estimate the disturbance in the plant. Several papers on design methods of disturbance observers have been published. Recently, the parametrization of all disturbance observers for time-delay plants with any output disturbance was clarified. However, no paper examines the parametrization of all disturbance observers for time-delay plants with any input disturbance. In this paper, we propose parametrizations of all disturbance observers and all linear functional disturbance observers for time-delay plants with any input disturbance.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130140091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}