2017 International Conference on Computing Intelligence and Information System (CIIS)最新文献

筛选
英文 中文
Network Traffic Anomaly Detection Based on Dynamic Programming 基于动态规划的网络流量异常检测
Qing Yu, Xi-Wu Gu
{"title":"Network Traffic Anomaly Detection Based on Dynamic Programming","authors":"Qing Yu, Xi-Wu Gu","doi":"10.1109/CIIS.2017.18","DOIUrl":"https://doi.org/10.1109/CIIS.2017.18","url":null,"abstract":"In this paper, an optimum dynamic programming (DP) based time-normalization algorithm is designed for Network traffic anomaly detection. The two sets of data matched namely the sample data and the actual data, will need to calculate the time normalized distance through dynamic programming so as to achieve the effect of the anomaly detection, and have been using dynamic programming matching symmetry. By analyzing the experimental data, the traffic anomaly detection based on symmetry dynamic programming verify the improvement in the accuracy.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121404744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Study on the Robustness Based on PID Fuzzy Controller 基于PID模糊控制器的鲁棒性研究
Q. Song, Yaochun Wu
{"title":"Study on the Robustness Based on PID Fuzzy Controller","authors":"Q. Song, Yaochun Wu","doi":"10.1109/CIIS.2017.30","DOIUrl":"https://doi.org/10.1109/CIIS.2017.30","url":null,"abstract":"Fuzzy control has lots of advantages compared with traditional PID control. Good performance can be obtained by fuzzy control without mathematic model of control object. Meanwhile, fuzzy controller is equipped with high stability and robustness. The characteristics of traditional PID control and fuzzy controls were integrated as fuzzy PID control, greatly enhancing performance of the controller. The work discussed the design of fuzzy parameter self-tuning PID controller. The performance of the controller was compared with traditional PID controller mainly from the robustness. Results indicated robustness of fuzzy PID controller is better after comparison.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122825998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Best Performance Evaluation of Encryption Algorithms to Reduce Power Consumption in WSN 降低无线传感器网络功耗的加密算法的最佳性能评估
M. A. A. Sibahee, Songfeng Lu, Z. Hussien, M. Hussain, Keyan Abdul-Aziz Mutlaq, Z. Abduljabbar
{"title":"The Best Performance Evaluation of Encryption Algorithms to Reduce Power Consumption in WSN","authors":"M. A. A. Sibahee, Songfeng Lu, Z. Hussien, M. Hussain, Keyan Abdul-Aziz Mutlaq, Z. Abduljabbar","doi":"10.1109/CIIS.2017.50","DOIUrl":"https://doi.org/10.1109/CIIS.2017.50","url":null,"abstract":"Wireless Sensor Networks (WSNs), applications are growing rapidly, so the needs to protect such applications are increased. Cryptography plays a main role in information system security where encryption algorithm is the essential component of the security. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of four of the most common encryption algorithms namely: RC4, DES, and AES as a symmetric cipher and RSA for asymmetric cipher. A comparison has been conducted for those encryption algorithms at different settings such as different sizes of data blocks, different key size and finally encryption/decryption speed. Simulation results are given to demonstrate the effectiveness of each algorithm on power consuming.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131261575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Non-redundant Distributed Database Allocation Technology Research 非冗余分布式数据库分配技术研究
Qiao Sun, Bu-qiao Deng, Lan-mei Fu, Jiasong Sun
{"title":"Non-redundant Distributed Database Allocation Technology Research","authors":"Qiao Sun, Bu-qiao Deng, Lan-mei Fu, Jiasong Sun","doi":"10.1109/CIIS.2017.57","DOIUrl":"https://doi.org/10.1109/CIIS.2017.57","url":null,"abstract":"Redundancy is a traditional technique for improving the reliability of distributed systems. In many scenes, system redundancy is not available or not feasible. How to assign the tasks of parallel applications to the distributed system's processors and maximize the reliability of the system becomes one of the important issues that need to be studied. This paper proposes a dynamic non-redundant data allocation method for distributed database system, which specifies the fragment update parameters and dynamic cost parameters, to find the best solution for reallocating redundant data. Specifically, we use the parameters to iterative estimate the reassignment of the fragment to the cost of the node, according to the choice of the lowest cost of the node for data migration. The result shows that this kind of scheme can make full use of the advantages of non-redundant data allocation and fasten the speech of communication, which can further improve the consistency and reliability of the distributed database system.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132457963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Cloud Storage and Quick Keyword Based Retrieval System 安全云存储与基于关键字的快速检索系统
Song Lu, Abdulruhman I Ahmed Abomakhelb
{"title":"Secure Cloud Storage and Quick Keyword Based Retrieval System","authors":"Song Lu, Abdulruhman I Ahmed Abomakhelb","doi":"10.1109/CIIS.2017.67","DOIUrl":"https://doi.org/10.1109/CIIS.2017.67","url":null,"abstract":"In recent years, Cloud Computing becomes more prevalent in data store domain. More and more sensitive to store information into the cloud, Due to the importance the protection of data privacy, to protect sensitive data, should be encrypted before outsourcing, which makes ineffective data utilization and a very challenging task. Although the protection of the privacy of the data has to be encrypted, There should be schemes allow a user to securely search over encrypted data through keywords and selectively retrieve the appropriate files interest. These techniques support only exact searchable over encryption. In this paper, find a solution to the problem of effective keyword search over encrypted cloud data while maintaining keyword privacy. Keyword search greatly enhances system usability by returning the matching files when users' searching inputs exactly match the predefined keywords. In our solution, we extract the keywords from the file and encrypted the keywords then added into the index. Instead of storing file and searchable index on a cloud system, the proposed system will store the file on cloud and store searchable index on a private server. Which greatly reduces network congestion and representation overheads, also retrieval fast for files, and reduces the storage by file compression With enhanced security using encryption techniques and permission to access the data, through accurate security analysis, we show that our proposed solution is secure and privacy-preserving, while correctly realizing the goal of retrieval data.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"6 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120835880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Confidence Interval Estimation Based on Ohba's Software Reliability Growth Model 基于Ohba软件可靠性增长模型的有效置信区间估计
Po-Chiang Tsai, Chih-Chiang Fang
{"title":"Effective Confidence Interval Estimation Based on Ohba's Software Reliability Growth Model","authors":"Po-Chiang Tsai, Chih-Chiang Fang","doi":"10.1109/CIIS.2017.38","DOIUrl":"https://doi.org/10.1109/CIIS.2017.38","url":null,"abstract":"Software reliability is an essential quality indicator which can provide critical messages for software managers. Due to fact that most of researchers might improperly infer the variance regarding the mean value function, its confidence interval would not conform to the real world situation. In this situation, software manager cannot accurately estimate the possible risk variation of software system by using the randomness of mean value function, and it might debase the practicability of applications. In this paper, Ohba's model is used to build the SRGM with confidence intervals that can help the software developers to effectively determine the optimal release time in practice.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120931467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Content-Based Image Retrieval Based on Multi-feature Fusion Optimized by Brain Storm Optimization 基于头脑风暴优化多特征融合的基于内容的图像检索
Hengjun Zhou, M. Jiang
{"title":"Content-Based Image Retrieval Based on Multi-feature Fusion Optimized by Brain Storm Optimization","authors":"Hengjun Zhou, M. Jiang","doi":"10.1109/CIIS.2017.20","DOIUrl":"https://doi.org/10.1109/CIIS.2017.20","url":null,"abstract":"With the fast development of information technology and increasing number of image database, how to retrieval a large amount of information from the image quickly and effectively becomes more and more important. Brain Storm Optimization (BSO) is simple, robust and has high searching precision. So it is applied into the image retrieval in this paper. Content-based image retrieval (CBIR) extracts the color, texture, shape and other low-level visual features of images to realize image matching. Compared with image retrieval based on single feature, image retrieval based on multi-feature fusion can fully represent image information. In the multi-feature fusion, the ratio of each feature selection is critical to the search result. Traditional method is manually set or proportional integration, which ignores the priority between the various features. This paper uses BSO for image retrieval. Color histogram, color moment, color structure descriptor, Tamura texture feature, GLCM texture, wavelet transform texture, Gabor transform texture, edge histogram descriptors and Hu invariant moment are extracted in the paper and BSO is used for image retrieval. Experiment results show that the proposed method can retrieval the target image accurately and improve the precision of the system.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"393 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122994705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MCIR: A Multi-modal Image Registration Algorithm Based on Membrane Computing 基于膜计算的多模态图像配准算法
Zhilv Gao, Chengfang Zhang
{"title":"MCIR: A Multi-modal Image Registration Algorithm Based on Membrane Computing","authors":"Zhilv Gao, Chengfang Zhang","doi":"10.1109/CIIS.2017.46","DOIUrl":"https://doi.org/10.1109/CIIS.2017.46","url":null,"abstract":"In order to realize the rapid and exact image registration, a multi-modal image registration algorithm under the framework of membrane computing is proposed in this paper, which is named as MCIR algorithm. First, a cell-like P system of membrane structure is designed. Each object in membranes represents a group of transform parameters of floated images. All objects are constantly evolved by the group intelligent algorithm, which obtains the best parameters and transforms them into upper-layer membrane. At the same time, the best objects between the same layers transport randomly in the process of evolution. Finally, the global optimal object is stored in the skin membrane. The proposed MCIR algorithm is evaluated on the multi-modal image, such as the computer tomography (CT) images of the brain, the visible images, and the thermal infrared images. Our algorithm is superior to other methods in terms of properties of global convergence and obtains better registration accuracy and robustness.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122149292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application of Phase Space Reconstruction in a Few-Channel EEG-NIRS Bimodal Brain-Computer Interface System 相空间重构在少通道脑电-近红外双峰脑机接口系统中的应用
Yuchen Xie, Qing Yang, Pan Lin, Y. Leng, Yuankui Yang, Haixian Wang, S. Ge
{"title":"Application of Phase Space Reconstruction in a Few-Channel EEG-NIRS Bimodal Brain-Computer Interface System","authors":"Yuchen Xie, Qing Yang, Pan Lin, Y. Leng, Yuankui Yang, Haixian Wang, S. Ge","doi":"10.1109/CIIS.2017.19","DOIUrl":"https://doi.org/10.1109/CIIS.2017.19","url":null,"abstract":"We developed a highly accurate, few-channel, bimodal electroencephalograph (EEG) and near-infrared spectroscopy (NIRS) brain-computer interface (BCI) system by developing new methods for signal processing and feature extraction. For data processing, we performed source analysis of EEG and NIRS signals to select the best channels from which to build a few-channel system. For EEG feature extraction, we used phase space reconstruction to convert EEG few-channel signals into multichannel signals, facilitating the extraction of EEG features by common spatial pattern. The Hurst exponent of the selected 10 channels constituted the extracted NIRS data feature. For pattern classification, we fused EEG and NIRS features together and used the support vector machine classification method. The average accuracy of bimodal EEG-NIRS was significantly higher than that of either EEG or NIRS as unimodal techniques.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131361080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mathematical Modeling of Pursuit-Evasion System for Video Surveillance Network 视频监控网络追逃系统的数学建模
Wenjun Wang, Fanliang Bu
{"title":"Mathematical Modeling of Pursuit-Evasion System for Video Surveillance Network","authors":"Wenjun Wang, Fanliang Bu","doi":"10.1109/CIIS.2017.48","DOIUrl":"https://doi.org/10.1109/CIIS.2017.48","url":null,"abstract":"This paper mainly proposed a kind of algorithm based on moving object detection and direction recognition, with a variety of data in video surveillance system, constructing a moving objects trajectories system with a combination of artificial and video surveillance system, to find escape routes of suspects accurately and make work easy for investigators. This system was created by Python language, MySQL database language and Open CV direction recognition technology, completing usage of map, creating database structure and recognizing the direction of a moving object, to predict object moving direction.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130016276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信