Cybersecurity and Cyberforensics Conference最新文献

筛选
英文 中文
Flocking of multi-agents with arbitrary shape obstacle 具有任意形状障碍物的多智能体群集
Cybersecurity and Cyberforensics Conference Pub Date : 2014-07-28 DOI: 10.1109/CHICC.2014.6896818
Bixia Dai, Wei Li
{"title":"Flocking of multi-agents with arbitrary shape obstacle","authors":"Bixia Dai, Wei Li","doi":"10.1109/CHICC.2014.6896818","DOIUrl":"https://doi.org/10.1109/CHICC.2014.6896818","url":null,"abstract":"Flocking with obstacle avoidance of multi-agents is a significant problem. In this paper, a flocking algorithm in the presence of arbitrary shape obstacles avoidance is provided both in 2D space and 3D space. When obstacles are sensed by α-agents, β-agents which denote obstacles will guide the α-agent driving away from obstacles in a fastest route. We present an approach to determine the position and the velocity of β-agent which denote the repulsive effects of obstacles. Finally, simulation results show the effectiveness of our methods.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130228534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Dynamics analysis of an amended HBV infection model with a simulation for anti-HBV infection therapy 一种改进的HBV感染模型及其抗HBV感染治疗模拟的动力学分析
Cybersecurity and Cyberforensics Conference Pub Date : 2014-07-28 DOI: 10.1109/CHICC.2014.6897087
Xiao Chen, K. Sun, Jianlong Qiu, Xiangyong Chen, Chengdong Yang, A. Zhang
{"title":"Dynamics analysis of an amended HBV infection model with a simulation for anti-HBV infection therapy","authors":"Xiao Chen, K. Sun, Jianlong Qiu, Xiangyong Chen, Chengdong Yang, A. Zhang","doi":"10.1109/CHICC.2014.6897087","DOIUrl":"https://doi.org/10.1109/CHICC.2014.6897087","url":null,"abstract":"","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"8 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120847583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An evolutionary game optimization to vertex cover of dynamic networks 动态网络顶点覆盖的进化博弈优化
Cybersecurity and Cyberforensics Conference Pub Date : 2014-07-28 DOI: 10.1109/CHICC.2014.6897074
Ang Li, Changbing Tang, Xiang Li
{"title":"An evolutionary game optimization to vertex cover of dynamic networks","authors":"Ang Li, Changbing Tang, Xiang Li","doi":"10.1109/CHICC.2014.6897074","DOIUrl":"https://doi.org/10.1109/CHICC.2014.6897074","url":null,"abstract":"","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131895233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Static hand gesture recognition algorithm based on finger angle characteristics 基于手指角度特征的静态手势识别算法
Cybersecurity and Cyberforensics Conference Pub Date : 2014-07-28 DOI: 10.1109/CHICC.2014.6896380
Bo Yu, Y. Chen, Ying-Shu Huang, Chenjie Xia
{"title":"Static hand gesture recognition algorithm based on finger angle characteristics","authors":"Bo Yu, Y. Chen, Ying-Shu Huang, Chenjie Xia","doi":"10.1109/CHICC.2014.6896380","DOIUrl":"https://doi.org/10.1109/CHICC.2014.6896380","url":null,"abstract":"In this paper, we propose a static gesture recognition algorithm based on finger angle characteristics. Using a fingertip attachment, a gesture is determined by the angle of the fingers relative to the centre of the palm. According to the angle and number, we can define a gesture as one to nine. The algorithm does not significantly consider the direction or scale of the gesture. It considers only the finger angle size. In test experiments, we used 900 gesture images, and the accuracy rate was as high as 96.8%, with an average determination time of less than 0.05 seconds. The experiment results demonstrate that the algorithm is efficient and is able to satisfy practical applications.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131432215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust model reference sliding mode control for flexible air-breathing hypersonic vehicle 柔性吸气式高超声速飞行器鲁棒模型参考滑模控制
Cybersecurity and Cyberforensics Conference Pub Date : 2014-07-28 DOI: 10.1109/CHICC.2014.6895640
Xiaoxiang Hu, Changhua Hu, Qi Zhang, Yu Yao
{"title":"Robust model reference sliding mode control for flexible air-breathing hypersonic vehicle","authors":"Xiaoxiang Hu, Changhua Hu, Qi Zhang, Yu Yao","doi":"10.1109/CHICC.2014.6895640","DOIUrl":"https://doi.org/10.1109/CHICC.2014.6895640","url":null,"abstract":"","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124919430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-space PCA with its application in fault diagnosis 多空间PCA及其在故障诊断中的应用
Cybersecurity and Cyberforensics Conference Pub Date : 2014-07-28 DOI: 10.1109/CHICC.2014.6895487
Jing Hu, Chenglin Wen, Ping Li, Chunxia Wang
{"title":"Multi-space PCA with its application in fault diagnosis","authors":"Jing Hu, Chenglin Wen, Ping Li, Chunxia Wang","doi":"10.1109/CHICC.2014.6895487","DOIUrl":"https://doi.org/10.1109/CHICC.2014.6895487","url":null,"abstract":"Traditional PCA method can detect “big” failures with obvious signs of abnormality effectively. But it does not seem to apply for failures with smaller signs drowned in the noise or “big” failures. Meanwhile, there is still not a clear and consistent explanation for the impact of the PCA subspace decomposition on the fault detection capability. In this paper, aiming at fault diagnosis with small signs, a method of multi-space principal component analysis is proposed based on the research on the effect of subspace decomposition on the capability of fault diagnosis, which is applied into the process monitoring. Case studies validate the effectiveness of the proposed approaches.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122567370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust adaptive consensus of high-order nonlinear systems using fuzzy logical systems and continuous second-order sliding mode 基于模糊逻辑系统和连续二阶滑模的高阶非线性系统鲁棒自适应一致
Cybersecurity and Cyberforensics Conference Pub Date : 2014-07-28 DOI: 10.1109/CHICC.2014.6896798
Wei Wang, Dan Wang, Zhouhua Peng
{"title":"Robust adaptive consensus of high-order nonlinear systems using fuzzy logical systems and continuous second-order sliding mode","authors":"Wei Wang, Dan Wang, Zhouhua Peng","doi":"10.1109/CHICC.2014.6896798","DOIUrl":"https://doi.org/10.1109/CHICC.2014.6896798","url":null,"abstract":"This paper considers the leader-following consensus problem of high-order nonlinear multi-agent systems in the presence of unknown dynamics and bounded disturbances under undirected communication topologies. A distributed consensus scheme is proposed by using fuzzy logical systems and second-order sliding mode. Fuzzy logical systems are utilized to approximate the unknown dynamics, while the fuzzy approximation errors and external disturbances are counteracted via continuous second-order sliding mode. The proposed controllers guarantee that the outputs of all followers can track that of the leader under the condition that only a subset of the followers can receive the information of the leader. Based on Lyapunov stability theory, it is proved that the global tracking errors converge to a small neighborhood of the origin. An example is provided to show the effectiveness of the proposed consensus scheme.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128280340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On particle filter and Mean Shift tracking algorithm based on multi-feature fusion 基于多特征融合的粒子滤波和Mean Shift跟踪算法
Cybersecurity and Cyberforensics Conference Pub Date : 2014-07-28 DOI: 10.1109/CHICC.2014.6895734
N. Qiao, Jin-xia Yu
{"title":"On particle filter and Mean Shift tracking algorithm based on multi-feature fusion","authors":"N. Qiao, Jin-xia Yu","doi":"10.1109/CHICC.2014.6895734","DOIUrl":"https://doi.org/10.1109/CHICC.2014.6895734","url":null,"abstract":"To solve the problem that a single feature lead to tracking failure easily in a complex environment, an efficient particle filter and Mean Shift tracking algorithm based on multi-feature fusion was proposed. Under the framework of particle filter, it the closer to the real posterior distribution by embedding Mean Shift algorithm and using color and structural as the observation model to represent the object, and the weights of particles were calculated by this integration, in order to avoid the single color features easy to track the failure problem. The experiments show that the proposed method has a better robustness when using the same particles and the average weight of the particle is improved and the resample times reduced significantly, even using the less particles can achieve tracking stability.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130804796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Transformation model of thrust-vectoring using RBF neural network 基于RBF神经网络的推力矢量变换模型
Cybersecurity and Cyberforensics Conference Pub Date : 2014-07-28 DOI: 10.1109/CHICC.2014.6895788
Kenan Yong, Hui Ye, Mou Chen, Qingxian Wu
{"title":"Transformation model of thrust-vectoring using RBF neural network","authors":"Kenan Yong, Hui Ye, Mou Chen, Qingxian Wu","doi":"10.1109/CHICC.2014.6895788","DOIUrl":"https://doi.org/10.1109/CHICC.2014.6895788","url":null,"abstract":"In this paper, a transformation model between the thrust-vectoring vane deflections and the resultant thrust deviation angles is established for the thrust-vectoring with three vane construction based on the radial basis function (RBF) neural network. The RBF neural network is trained using the experiment transformation data from NASA research memorandum via the generalized growing and pruning algorithm (GGAP). The established RBF neural network model can eliminate the inaccuracy of existing estimation model and avoids the modeling difficulties using the experiment data. To test the correctness of the transformation model using RBF neural network, it is compared with the existing estimation model. Through the simulation results, one can obtain that the RBF neural network transformation model established in this paper has a global and accurate description for the transformation relationship between the thrust-vectoring vane deflections and the resultant thrust deviation angles. Moreover, it can show the characteristics of the thrust-vectoring more precisely.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121834733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Polylogarithmic PRG for Degree $2$ Threshold Functions in the Gaussian Setting 高斯设置下二阶阈值函数的多对数PRG
Cybersecurity and Cyberforensics Conference Pub Date : 2014-04-03 DOI: 10.4230/LIPIcs.CCC.2015.567
D. Kane
{"title":"A Polylogarithmic PRG for Degree $2$ Threshold Functions in the Gaussian Setting","authors":"D. Kane","doi":"10.4230/LIPIcs.CCC.2015.567","DOIUrl":"https://doi.org/10.4230/LIPIcs.CCC.2015.567","url":null,"abstract":"We construct and analyze a new pseudorandom generator for degree 2 polynomial threshold functions with respect to the Gaussian measure. In particular, we obtain one whose seed length is polylogarithmic in both the dimension and the desired error, a substantial improvement over existing constructions. \u0000 \u0000Our generator is obtained as an appropriate weighted average of pseudorandom generators against read once branching programs. The analysis requires a number of ideas including a hybrid argument and a structural result that allows us to treat our degree 2 threshold function as a function of a number of linear polynomials and one approximately linear polynomial.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129441865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信