Cybersecurity and Cyberforensics Conference最新文献

筛选
英文 中文
A new hand shape positioning algorithm based on Voronoi diagram 一种新的基于Voronoi图的手形定位算法
Cybersecurity and Cyberforensics Conference Pub Date : 2016-07-27 DOI: 10.1109/CHICC.2016.7553996
Shenghua Wang, Fu Liu, Huiying Liu, Shoukun Jiang
{"title":"A new hand shape positioning algorithm based on Voronoi diagram","authors":"Shenghua Wang, Fu Liu, Huiying Liu, Shoukun Jiang","doi":"10.1109/CHICC.2016.7553996","DOIUrl":"https://doi.org/10.1109/CHICC.2016.7553996","url":null,"abstract":"For the problem of inaccurate accuracy caused by deformation region of hand shape contour in traditional hand shape recognition algorithms, this paper proposes a new hand shape positioning algorithm based on Voronoi diagram. The algorithm first extracts the hand shape contour. And using the geometric information of the finger, this algorithm accurately extract the central axis of the fingers based on Voronoi diagram. This paper also identifies the optimal value of the threshold of normalized feature deviation and overall feature deviation, etc. Finally, the extracted finger width feature is used to recognize and match. Under the constraint of the false rejection rate and the error acceptance rate, recognition rate as high as 98. 952%. And the algorithm has low complexity and high accuracy and stability.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125273533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-time image-based driver fatigue detection and monitoring system for monitoring driver vigilance 基于实时图像的驾驶员疲劳检测与监控系统,用于监控驾驶员警惕性
Cybersecurity and Cyberforensics Conference Pub Date : 2016-07-27 DOI: 10.1109/CHICC.2016.7554007
Xinxing Tang, Pengfei Zhou, Ping Wang
{"title":"Real-time image-based driver fatigue detection and monitoring system for monitoring driver vigilance","authors":"Xinxing Tang, Pengfei Zhou, Ping Wang","doi":"10.1109/CHICC.2016.7554007","DOIUrl":"https://doi.org/10.1109/CHICC.2016.7554007","url":null,"abstract":"In order to realize automatic on-line monitoring of driver fatigue state, an automatic driver fatigue state early warning system based on vision on-line real time detection is established by analyzing driver's eye and mouth states. Firstly, this system use VJ detector algorithm to detect the face, and then in the face region of interest (FROI), MB-LBP feature is used to find the eye region and locate eyes' area rapidly and accurately in the upper FROI. Then Kalman filter algorithm is adopted to track the eyes and mouth. After this feature enhancement and ellipse fitting for human eye image is adopted after the edge points of human eyes, and a threshold is set to match mouth feature such as open, close and yawning, which is used judging the mouth state. Finally, the threshold is set to determine the human eye state by calculating the ratio between short axis and the long axis of the ellipse. Experimental results indicate that the method used can detect the position and states of human eye and mouth accurately and rapidly in the case of different angle and shielding rotation, and the detection rate is higher than 95%. The established driver fatigue warning system can meet the real-time requirement of the driver fatigue state detection.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121052641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Adaptive tracking control of a class of linear systems with constrained actuators 一类具有约束作动器的线性系统的自适应跟踪控制
Cybersecurity and Cyberforensics Conference Pub Date : 2016-07-27 DOI: 10.1109/CHICC.2016.7553070
Xiaozheng Jin, Jiahu Qin, Yu Kang
{"title":"Adaptive tracking control of a class of linear systems with constrained actuators","authors":"Xiaozheng Jin, Jiahu Qin, Yu Kang","doi":"10.1109/CHICC.2016.7553070","DOIUrl":"https://doi.org/10.1109/CHICC.2016.7553070","url":null,"abstract":"In this paper, the problem of adaptive tracking control for a class of linear continuous time-invariant systems subject to constrained actuators is investigated. A novel control strategy is developed to ensure the bounded tracking of the systems. Based on Lyapunov stability theory, a result that indicates the tracking bound can be reduced as small as desired via adjusting control parameters is obtained. Then the control strategy is improved to guarantee that actuator action behaves in the limitation of maximum magnitude of actuators. Finally, simulation results of a cruise keeping marine vehicle are given to illustrate the proposed procedures and their effectiveness.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125156600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Orbital flatness of a class of single-input control systems 一类单输入控制系统的轨道平坦度
Cybersecurity and Cyberforensics Conference Pub Date : 2016-07-27 DOI: 10.1109/CHICC.2016.7553187
Shunjie Li, Chao Xu
{"title":"Orbital flatness of a class of single-input control systems","authors":"Shunjie Li, Chao Xu","doi":"10.1109/CHICC.2016.7553187","DOIUrl":"https://doi.org/10.1109/CHICC.2016.7553187","url":null,"abstract":"This paper gives necessary and sufficient conditions describing single-input affine systems that are orbital feedback equivalent to the affine Goursat normal form (AGNF). This class of systems are not differential flat, but they are orbitally flat. A complete characterization of all the orbitally flat output for single-input affine systems that are orbitally feedback equivalent to AGNF are derived. Moreover, we analyze a linear controllable system that is orbital feedback equivalent to AGNF on ℝ3 and describe all the possible time re-scaling functions under which the time scaled system remains differential flat.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132785599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tracking control for a class of random Lagrange systems with colored noise 一类带有色噪声的随机拉格朗日系统的跟踪控制
Cybersecurity and Cyberforensics Conference Pub Date : 2016-07-27 DOI: 10.1109/CHICC.2016.7553357
Mingyue Cui, Shitong Wang, Liangchao Geng
{"title":"Tracking control for a class of random Lagrange systems with colored noise","authors":"Mingyue Cui, Shitong Wang, Liangchao Geng","doi":"10.1109/CHICC.2016.7553357","DOIUrl":"https://doi.org/10.1109/CHICC.2016.7553357","url":null,"abstract":"For a class of Lagrange systems with colored noise, the problem of tracking control is considered. Using the structural properties of Lagrange systems, a Lyapunov function is skillfully constructed. Based on it, using backstepping idea, a tracking controller is designed such that the mean square of the tracking error converges to an arbitrarily small neighborhood of zero by tuning design parameters. By a stochastic mechanical model, the reasonability of assumption is verified, and the simulation result demonstrates the effectiveness of the control scheme.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130991483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An experiment and research platform for DC micro-grid 直流微电网实验研究平台
Cybersecurity and Cyberforensics Conference Pub Date : 2016-07-27 DOI: 10.1109/CHICC.2016.7554727
Xiaofeng Lin, Yanhong Xue, Chunning Song, Shaojian Song, Liu Bin
{"title":"An experiment and research platform for DC micro-grid","authors":"Xiaofeng Lin, Yanhong Xue, Chunning Song, Shaojian Song, Liu Bin","doi":"10.1109/CHICC.2016.7554727","DOIUrl":"https://doi.org/10.1109/CHICC.2016.7554727","url":null,"abstract":"Aiming at solving the problems that the present DC micro-grid research is still in simulation software or semi-physical simulation platform so that they cannot response the real system accurately, we take the advantage of the devices in our lab to set up a physical DC micro-grid platform, which includes PV cells; wind driven generator; lithium battery pack; super-capacitor; EV research platform; LED and the controllable electric load. They are connected together by the DC-DC convertors to the DC bus, its voltage level is 380V (equaling to the electric supply so that can invert to the grid). In addition, we create its monitoring system using the LABVIEW software. The experiment results show that every convertor can meet their performance well and we can control the power distribute appropriately between the every unit connecting to the DC bus.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121185259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
New Hardness Results for Graph and Hypergraph Colorings 图和超图着色的新硬度结果
Cybersecurity and Cyberforensics Conference Pub Date : 2016-05-29 DOI: 10.4230/LIPIcs.CCC.2016.14
Joshua Brakensiek, V. Guruswami
{"title":"New Hardness Results for Graph and Hypergraph Colorings","authors":"Joshua Brakensiek, V. Guruswami","doi":"10.4230/LIPIcs.CCC.2016.14","DOIUrl":"https://doi.org/10.4230/LIPIcs.CCC.2016.14","url":null,"abstract":"Finding a proper coloring of a t-colorable graph G with t colors is a classic NP-hard problem when t ≥ 3. In this work, we investigate the approximate coloring problem in which the objective is to find a proper c-coloring of G where c ≥ t. We show that for all t ≥ 3, it is NP-hard to find a c-coloring when c ≤ 2t - 2. In the regime where t is small, this improves, via a unified approach, the previously best known hardness result of c ≤ max{2t - 5, t + 2⌊t/3⌋ - 1} [9, 21, 13]. For example, we show that 6-coloring a 4-colorable graph is NP-hard, improving on the NP-hardness of 5-coloring a 4-colorable graph. \u0000 \u0000We also generalize this to related problems on the strong coloring of hypergraphs. A k-uniform hypergraph H is t-strong colorable (where t ≥ k) if there is a t-coloring of the vertices such that no two vertices in each hyperedge of H have the same color. We show that if t = ⌈3k/2⌉, then it is NP-hard to find a 2-coloring of the vertices of H such that no hyperedge is monochromatic. We conjecture that a similar hardness holds for t = k + 1. \u0000 \u0000We establish the NP-hardness of these problems by reducing from the hardness of the Label Cover problem, via a \"dictatorship test\" gadget graph. By combinatorially classifying all possible colorings of this graph, we can infer labels to provide to the label cover problem. This approach generalizes the \"weak polymorphism\" framework of [3], though interestingly our results are \"PCP-free\" in that they do not require any approximation gap in the starting Label Cover instance.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128610825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Tight Bounds for Communication-Assisted Agreement Distillation 通信辅助协议蒸馏的紧密边界
Cybersecurity and Cyberforensics Conference Pub Date : 2016-05-29 DOI: 10.4230/LIPIcs.CCC.2016.6
V. Guruswami, J. Radhakrishnan
{"title":"Tight Bounds for Communication-Assisted Agreement Distillation","authors":"V. Guruswami, J. Radhakrishnan","doi":"10.4230/LIPIcs.CCC.2016.6","DOIUrl":"https://doi.org/10.4230/LIPIcs.CCC.2016.6","url":null,"abstract":"Suppose Alice holds a uniformly random string X ∈ {0, 1}N and Bob holds a noisy version Y of X where each bit of X is flipped independently with probability e ∈ [0, 1/2]. Alice and Bob would like to extract a common random string of min-entropy at least k. In this work, we establish the communication versus success probability trade-off for this problem by giving a protocol and a matching lower bound (under the restriction that the string to be agreed upon is determined by Alice's input X). Specifically, we prove that in order for Alice and Bob to agree on a common string with probability 2-γk (γk ≥ 1), the optimal communication (up to o(k) terms, and achievable for large N) is precisely [EQUATION], where C:= 4e(1 - e). In particular, the optimal communication to achieve Ω(1) agreement probability approaches 4e(1 - e)k. \u0000 \u0000We also consider the case when Y is the output of the binary erasure channel on X, where each bit of Y equals the corresponding bit of X with probability 1 - e and is otherwise erased (that is, replaced by a '?'). In this case, the communication required becomes [EQUATION]. In particular, the optimal communication to achieve Ω(1) agreement probability approaches ek, and with no communication the optimal agreement probability approaches [EQUATION]. \u0000 \u0000Our protocols are based on covering codes and extend the approach of (Bogdanov and Mossel, 2011) for the zero-communication case. Our lower bounds rely on hypercontractive inequalities. For the model of bit-flips, our argument extends the approach of (Bogdanov and Mossel, 2011) by allowing communication; for the erasure model, to the best of our knowledge the needed hypercontractivity statement was not studied before, and it was established (given our application) by (Nair and Wang 2015). We also obtain information complexity lower bounds for these tasks, and together with our protocol, they shed light on the recently popular \"most informative Boolean function\" conjecture of Courtade and Kumar.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122406200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Tight SoS-Degree Bounds for Approximate Nash Equilibria 近似纳什均衡的紧sos度界
Cybersecurity and Cyberforensics Conference Pub Date : 2016-05-29 DOI: 10.4230/LIPIcs.CCC.2016.22
A. Harrow, Anand Natarajan, Xiaodi Wu
{"title":"Tight SoS-Degree Bounds for Approximate Nash Equilibria","authors":"A. Harrow, Anand Natarajan, Xiaodi Wu","doi":"10.4230/LIPIcs.CCC.2016.22","DOIUrl":"https://doi.org/10.4230/LIPIcs.CCC.2016.22","url":null,"abstract":"Nash equilibria always exist, but are widely conjectured to require time to find that is exponential in the number of strategies, even for two-player games. By contrast, a simple quasi-polynomial time algorithm, due to Lipton, Markakis and Mehta (LMM), can find approximate Nash equilibria, in which no player can improve their utility by more than e by changing their strategy. The LMM algorithm can also be used to find an approximate Nash equilibrium with near-maximal total welfare. Matching hardness results for this optimization problem were found assuming the hardness of the planted-clique problem (by Hazan and Krauthgamer) and assuming the Exponential Time Hypothesis (by Braverman, Ko and Weinstein). \u0000 \u0000In this paper we consider the application of the sum-squares (SoS) algorithm from convex optimization to the problem of optimizing over Nash equilibria. We show the first unconditional lower bounds on the number of levels of SoS needed to achieve a constant factor approximation to this problem. While it may seem that Nash equilibria do not naturally lend themselves to convex optimization, we also describe a simple LP (linear programming) hierarchy that can find an approximate Nash equilibrium in time comparable to that of the LMM algorithm, although neither algorithm is obviously a generalization of the other. This LP can be viewed as arising from the SoS algorithm at log n levels -- matching our lower bounds. The lower bounds involve a modification of the Braverman-Ko-Weinstein embedding of CSPs into strategic games and techniques from sum-of-squares proof systems. The upper bound (i.e. analysis of the LP) uses information-theory techniques that have been recently applied to other linear- and semidefinite-programming hierarchies.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116638731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evolution and Computation (Invited Talk) 进化与计算(特邀演讲)
Cybersecurity and Cyberforensics Conference Pub Date : 2016-05-29 DOI: 10.4230/LIPIcs.CCC.2016.21
Nisheeth K. Vishnoi
{"title":"Evolution and Computation (Invited Talk)","authors":"Nisheeth K. Vishnoi","doi":"10.4230/LIPIcs.CCC.2016.21","DOIUrl":"https://doi.org/10.4230/LIPIcs.CCC.2016.21","url":null,"abstract":"Over the last two centuries there have been tremendous scientific and mathematical advances in our understanding of evolution, life and its mysteries. Recently, the relatively new and powerful tool of computation has joined forces to develop this understanding further: the underlying tenet is that several natural processes, including evolution itself, can be viewed as computing or optimizing something -- evolution is computation. Furthermore, as in computation, efficiency is an important consideration in evolution. As many of these evolutionary processes are described using the language of dynamical systems, this entails understanding how quickly such systems can attain their equilibria. This endeavor not only has the potential to give us fundamental insights into life, it holds the promise that we will unveil new computational models and techniques. In this talk we will see some vignettes of this interplay between evolution and computation.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126426675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信