2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)最新文献

筛选
英文 中文
Flow Based Botnet Detection 基于流量的僵尸网络检测
Hsiao-Chung Lin, Chia-Mei Chen, Jui-Yu Tzeng
{"title":"Flow Based Botnet Detection","authors":"Hsiao-Chung Lin, Chia-Mei Chen, Jui-Yu Tzeng","doi":"10.1109/ICICIC.2009.214","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.214","url":null,"abstract":"Botnet is a collection of computer hosts exploited by malicious software that is remotely controlled through a command and control channel. More new types of attacks invented based on Botnets. Because of usage of legitimate IRC (Internet Relay Chat) servers to command and control the bots, it is hard to detect and remove Botnets. Flow information may keep the fingerprint of bots and can be used to identify IRC-based Botnets. The proposed method applies flow correlation for grouping the same activities of the same IRC-based bots. After flow correlation, the normal IRC and abnormal IRC traces are identified by scoring technique.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116361744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Modelling and Simulation of Shape Memory Alloys Micro-Actuator 形状记忆合金微驱动器的建模与仿真
Hong Liang, Chunnian Zeng, C. Giraud-Audine
{"title":"Modelling and Simulation of Shape Memory Alloys Micro-Actuator","authors":"Hong Liang, Chunnian Zeng, C. Giraud-Audine","doi":"10.1109/ICICIC.2009.266","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.266","url":null,"abstract":"In recent years, the Preisach model has emerged to capture the complex hysteresis behavior of many smart material, such as piezoceramics, shape memory alloys (SMA) and so forth. This paper addressed modeling and simulation of the micro-actuator SMA wires. We introduce the numerical implementation of the preisach model, which avoids the double integration and using experimental data directly. For the explore of the model, the novel concept of input memory matrix MUt and output memory matrix MFt is introduced in the paper. These concept is useful not only for the numerical implementation of the Preisach model but also for its theoretical investigation as well. A experimental configuration has been constructed to obtain the data we need for the modeling. A good quantitative match is observed between model output and experimental data. Some theoretical explore of the Preisach model can be applied to a wide class of smart material actuators.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123474100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Designing and Realizing of Database System of Chinese Medicine Ancient Literature 中医古籍数据库系统的设计与实现
Yao Liu, Xuefei Chen, Yang Zhou, Zhenguo Wang
{"title":"Designing and Realizing of Database System of Chinese Medicine Ancient Literature","authors":"Yao Liu, Xuefei Chen, Yang Zhou, Zhenguo Wang","doi":"10.1109/ICICIC.2009.171","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.171","url":null,"abstract":"According to bibliography, this article classifies literatures with different structures and different style. It breaks through the traditional concept of field name and substitutes it with a kind of range to realize synchronous search and show of data with several kinds of formats successfully for the convenience of literature's management and use, which supplies a new thought and facilities the designer and the user. The built database of Chinese medicine ancient literature has such functions as editing, classifying, depositing, full-text search, post-controlled search and semantic search.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122015494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AHU Control Strategies in the VAV System 变风量空调系统中的AHU控制策略
Yuying Sun, Zhonglei Zheng, Xun Hou, Peizhe Tian
{"title":"AHU Control Strategies in the VAV System","authors":"Yuying Sun, Zhonglei Zheng, Xun Hou, Peizhe Tian","doi":"10.1109/ICICIC.2009.72","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.72","url":null,"abstract":"This paper mainly introduces Air Handling Unit control in the Variable Air Volume air condition system. Combined with engineering experiences, it introduces some experiences of supply air temperature control of AHU, and makes a comparison with the constant static pressure control strategy, the optimized static pressure control strategy, and the total air volume control strategy, to give some recommendations for the VAV system control.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124037640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Anomaly Program Behavior Detection Based on Neural Network 基于神经网络的异常程序行为检测
Dingyi Fang, Xiaojiang Chen, Zhangyong Tang, Feng Chen
{"title":"Anomaly Program Behavior Detection Based on Neural Network","authors":"Dingyi Fang, Xiaojiang Chen, Zhangyong Tang, Feng Chen","doi":"10.1109/ICICIC.2009.106","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.106","url":null,"abstract":"Neural network can be used in anomaly detection. In order to improve the traditional IDS (intrusion detection system) performance, we often had to change the network structure and detection algorithm. And because intrusion techniques are most variable and unpredictable, we cannot always use the fixed detection techniques to catch exactly all possible intrusions. It is therefore important to investigate novel detection methods and IDS models. In this paper, a model of intrusion detection system based on BP neural network is proposed through analyzing features of program behavior. Some details and issues on the design and implementation of the model are discussed and experiments are also given.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124718243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Introduction and Future Visions of E-Learning at Chienkuo Technology University 建国理工大学电子学习的介绍与未来展望
Chun-Hua Chen, Min-Hsin Chen
{"title":"The Introduction and Future Visions of E-Learning at Chienkuo Technology University","authors":"Chun-Hua Chen, Min-Hsin Chen","doi":"10.1109/ICICIC.2009.358","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.358","url":null,"abstract":"The eLearning technology is developing rapidly, therefore the overall studying environment is also changed in a quick way. Through the establishment of Learning System Management (LSM), learner can study through internet everywhere and every time to reduce the problem of having no time to come to school physically. This really bring the nowadays media technology into full play. Beginning from the fall semester of 2003 we began eLearning study for students in ChienKuo Technology University (CTU). From the semester of fall of 2005 to the semester of spring of 2009, ChienKuo Technology University total got continued 3 years of academic support of Teaching Excellent Plan of Ministry of Education (MOE). Total support amount reached NT$165,000,000. We used part of these supports to extend eLearning equipments and finished 2 eLearning digitized courses of general education center and 7 of college of business. Moreover, we are getting to coordinate with other country's college to perform eLearning to advance the practice of eLearning in CTU.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125049216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mining Multiple Periodic Time Series for Detecting Unusual Sub-Sequences 挖掘多周期时间序列检测异常子序列
J. Ameen, R. Basha
{"title":"Mining Multiple Periodic Time Series for Detecting Unusual Sub-Sequences","authors":"J. Ameen, R. Basha","doi":"10.1109/ICICIC.2009.259","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.259","url":null,"abstract":"Advances in computer and information technology have opened a new avenue in the analysis of large and more detailed datasets that has become possible to observe. Most of the classical methodologies and techniques have become obsolete and fresh approaches of data analysis are overdue. In our previous articles Ameen JRM & Basha R (2006) and Basha R & Ameen JRM (2007), we have introduced algorithms for observing sub sequence discords for time series data with periodicity making it possible to save considerable processing time using logic and borrowing ideas from classical statistics. This paper deals with time series with multiple periodicities. Such datasets are naturally occurring when data are observed at higher frequencies and at a near continuous level from real life processes. Our approach and methodology will be applied to data that have been observe from daily consumption of electricity for more than two years indicating periodicity at weekly, monthly and yearly levels having multiple periodicity. We will demonstrate our approach's efficiency for situations of a similar nature in identifying subsequence discords efficiently together with 'motifs' as defined by Keogh et al.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127428681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-Accuracy Watermarking Scheme on H.264 Based on Majority Voting 基于多数投票的H.264高精度水印方案
Tsong-Yi Chen, Da-Jinn Wang, Thou-Ho Chen, Guan-Jiun Wang, Johng-Chern Chern
{"title":"High-Accuracy Watermarking Scheme on H.264 Based on Majority Voting","authors":"Tsong-Yi Chen, Da-Jinn Wang, Thou-Ho Chen, Guan-Jiun Wang, Johng-Chern Chern","doi":"10.1109/ICICIC.2009.230","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.230","url":null,"abstract":"In this paper, we use video watermarking on H.264 video compressed, to reach protect for video data. In recent years, H.264 is a new advanced video compressed standard. It provides high compression efficiency and compress quality, digital data is easy to be altered. One of the most important things is to prevent the data to be illegally used. We propose a method is compare many corresponding AC coefficient, to embed watermark information of I Frame, and compare corresponding AC coefficient to extract watermark by majority. Additionally, results show that watermark extracting to possess high accuracy as well as the watermark information can be effective against the impact of video compression.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130019613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feature Extraction of Edible Oil FTIR Based on Fractal Geometry 基于分形几何的食用油FTIR特征提取
Qiao-chu Sun, Chuang-Bai Xiao, Ben Guo, Qun-fei Mu
{"title":"Feature Extraction of Edible Oil FTIR Based on Fractal Geometry","authors":"Qiao-chu Sun, Chuang-Bai Xiao, Ben Guo, Qun-fei Mu","doi":"10.1109/ICICIC.2009.209","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.209","url":null,"abstract":"A feature extraction of edible oil FTIR based on fractal geometry is proposed in this paper. Theoretical calculation formulas of fractal dimension are introduced. The calculation method of box-counting dimension based on FTIR is analyzed. We have used the open source computer vision library OpenCV to implement the FTIR of edible vegetable oils fractal dimension calculation algorithm. The result indicates that the FTIR of corn oil and sesame oil can be discriminated effectively by the difference of boxcounting dimension.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130060142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Parametrization of All Disturbance Observers for Time-Delay Plants with Input Disturbance 具有输入扰动的时滞对象的所有扰动观测器的参数化
K. Yamada, D. Gong, T. Hagiwara, I. Murakami, Y. Ando, Y. Imai, Masahiko Kobayashi
{"title":"The Parametrization of All Disturbance Observers for Time-Delay Plants with Input Disturbance","authors":"K. Yamada, D. Gong, T. Hagiwara, I. Murakami, Y. Ando, Y. Imai, Masahiko Kobayashi","doi":"10.1109/ICICIC.2009.362","DOIUrl":"https://doi.org/10.1109/ICICIC.2009.362","url":null,"abstract":"In this paper, we examine the parametrization of all disturbance observers for time-delay plants with any input disturbance. The disturbance observers have been used to estimate the disturbance in the plant. Several papers on design methods of disturbance observers have been published. Recently, the parametrization of all disturbance observers for time-delay plants with any output disturbance was clarified. However, no paper examines the parametrization of all disturbance observers for time-delay plants with any input disturbance. In this paper, we propose parametrizations of all disturbance observers and all linear functional disturbance observers for time-delay plants with any input disturbance.","PeriodicalId":240226,"journal":{"name":"2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130140091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信