{"title":"Optimality Conditions for Discrete Variational Problems","authors":"Fang-Di Kong","doi":"10.1109/CIIS.2017.65","DOIUrl":"https://doi.org/10.1109/CIIS.2017.65","url":null,"abstract":"In this paper we consider optimality conditions for the following discrete variational problem: minimize J(x), subject to x(0), x(N). The necessary and sufficient condition for all feasible solutions satisfying the necessary optimality condition to be optimal solutions of the above problem is established.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129363128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensing-Throughput Tradeoff in Cognitive Radio Network Based on High Activity of Primary User","authors":"H. Cao, Shou-yi Yang","doi":"10.1109/CIIS.2017.64","DOIUrl":"https://doi.org/10.1109/CIIS.2017.64","url":null,"abstract":"Based on primary user traffic that the sensing-throughput tradeoff of secondary user has been investigated in cognitive radio network. In this paper, the method of discrete analysis and transition probabilities are used to derive the new formulas of probability and throughput in the higher grade of primary user activity. The probabilities of false alarm and detection are considered. When the active degree of primary user is increased to the channel state of primary user is able to change twice in one frame structure of secondary user, the throughput of secondary user decreases continuously.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127223464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discretization of Continuous Variables in Bayesian Networks Based on Matrix Decomposition","authors":"Haiteng Fang, Hongji Xu, Hui Yuan, Yingming Zhou","doi":"10.1109/CIIS.2017.36","DOIUrl":"https://doi.org/10.1109/CIIS.2017.36","url":null,"abstract":"Discretization of continuous variables (DCV) which could directly affect the results of Bayesian network inference (BNI) has been an important issue in Bayesian network (BN). Some common methods of DCV by the equal interval, the equal frequency, etc. always result in data loss which would make the results of BNI inaccurate. In this paper, a method of DCV in BN based on matrix decomposition is presented. This method could discretize the value of continuous variable into more states with different probability rather than one state, so it's more scientific and accurate. This paper makes a BN with two nodes, height and weight of each person, as an example and the simulation result demonstrates that the proposed method of DCV based on matrix decomposition can achieve discretization without data loss and ensure the accuracy of BNI.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121744535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Lattice-Based Public Encryption with Key Search Scheme for Wireless Sensor Networks","authors":"Fugeng Zeng","doi":"10.1109/CIIS.2017.27","DOIUrl":"https://doi.org/10.1109/CIIS.2017.27","url":null,"abstract":"With the rapid progress in technology, wireless sensor networks (WSNs) have attracted people's interest in the research community. However, due to the limited node communication and computing power, the traditional public key encryption algorithm can't be effectively applied. And as step into post-quantum era, pairing related assumption is fragile. Lattice is an ideal choice for building secure encryption scheme against quantum attack. Based on this, we propose a public encryption with key search scheme from lattice for wireless sensor networks. Compared with the existing public searchable encryption algorithm, the proposed encryption algorithm requires less computation time and achieves more security level.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132740194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combined Forecasting Model of Traffic Flow Based on DGM(1,1) and GRNN","authors":"Zhiheng Yu, Kecheng Liu, Chengli Zhao, Y. Liu","doi":"10.1109/CIIS.2017.17","DOIUrl":"https://doi.org/10.1109/CIIS.2017.17","url":null,"abstract":"In order to improve the prediction accuracy of traffic flow, this paper proposes a combined forecasting models with residual correction based on DGM(1,1). After introducing the modeling steps of DGM(1,1), DGM-GRNN combination model is established. In the model, the GRNN is used to predict the residual of DGM(1,1) model. Finally, we sum up the predict result of DGM(1,1) model and the residual correction model, and get the final prediction result of the combined forecasting model. We predicted the traffic flow of shangsan expressway by the model in this paper and then compared the results with the experimental results of DGM(1,1). The validity and feasibility of the proposed method are verified.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"332 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134454027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Bid Evaluation Model in the Bidding Management for Power Grid Corporations","authors":"Xiaojing Wei, Caiyun Guo","doi":"10.1109/CIIS.2017.72","DOIUrl":"https://doi.org/10.1109/CIIS.2017.72","url":null,"abstract":"Bid evaluation is the core in the bidding process. At present, a wide range of bid evaluation methods are adopted in the bidding process. On the basis of analyzing the characteristics of various bid evaluation methods, this paper established a new bid evaluation model. The model made some improvements and perfection in some important links, such as the establishment of the evaluation index system, the weight of the evaluation indexes and evaluating mathematical models. The whole process of bid evaluation was objectively described and the essence of the bid evaluation problem was factually reflected. It is conducive for the bidder to select the best bidding corporation through comprehensively evaluating the economic strength, technical strength and corporation reputation along with market behavior of the bidding corporations.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115702084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Implementation Based on Three-Dimensional Model Watermarking Algorithm","authors":"Aoshuang Dong, Rui Zeng","doi":"10.1109/CIIS.2017.47","DOIUrl":"https://doi.org/10.1109/CIIS.2017.47","url":null,"abstract":"In this paper, a digital watermarking technique is proposed for 3D model. Through the three-dimensional model file model into a two-dimensional image, this paper uses watermark embedding in the transform domain of two - dimensional image to achieve 3D model copyright protection. First, the watermark embedding process is used to analyze the principal components, the normalization and the choice of the projection viewpoint. Then based on the X-axis projection to get three-dimensional model projection RGB color pictures. Wavelet transform, discrete cosine transform and singular value decomposition of the blind watermarking algorithm are used to carry out image transformation of two-dimensional images and embed watermark. Experimental results show that the invisibility of the watermark is higher in the 3D watermarking model and the capabilities of anti-rotation, anti-translation and anti-noise attack are stronger.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114672270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research on Forecasting Model Based on Support Vector Machine and Discrete Grey System","authors":"Chengli Zhao, Zhiheng Yu","doi":"10.1109/CIIS.2017.24","DOIUrl":"https://doi.org/10.1109/CIIS.2017.24","url":null,"abstract":"In order to improve the prediction accuracy, this paper proposes a combined forecasting model based on the residual correction of DGM (1,1). After introducing the basic DGM(1,1) model and LSSVM regression model, DGM-LSSVM combination model is established. In this model, DGM(1, 1) is used to predict the original data sequence and obtain the predictive value and residual value. Then LSSVM model is used to correct the residual errors. Finally, the predicted results of DGM (1, 1) and residual correction of LSSVM model are combined, and the final prediction result is obtained by the combination forecasting model. Experimental results demonstrate that the proposed model has the advantages of effectiveness and feasibility.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121134658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Adaptive Optimization Algorithm for Stability Control of Electric Patrol Survey UAV","authors":"Zhifang Wang, Jie Shen, Xingjian Fu, Boyuan Chen","doi":"10.1109/CIIS.2017.25","DOIUrl":"https://doi.org/10.1109/CIIS.2017.25","url":null,"abstract":"In this paper, a mathematical model of flight pattern and flight attitude is established and analyzed. The flight pattern of the power patrol flight is analyzed. Based on the original linear quadratic optimal control algorithm, the motion and optimal control model of the unmanned aerial vehicle (UAV) patrol process is established to meet the unmanned aerial vehicle (UAV) inspection constraints, then a linear quadratic optimization Control based optimal control algorithm is proposed. In this paper, four-rotor aircraft as an example for simulation research, different motion models with different optimization control, and add different interference signals and the corresponding filter algorithm for antijamming performance testing. The simulation results show that the UAV can obtain good control effect by the linear quadratic optimal control, and its stability and anti - jamming performance can be improved obviously.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-orthogonal Pulse Shape Modulation for Wireless Relay D2D Communication","authors":"Jie Shen, Ou Wang, Jianguo Yu","doi":"10.1109/CIIS.2017.63","DOIUrl":"https://doi.org/10.1109/CIIS.2017.63","url":null,"abstract":"This paper presents a novel multilevel Nonorthogonal Pulse Shape Modulation (NPSM) method, which based on the prolate spheroidal wave function (PSWF) and utilizes the spectral overlap to obtain the excellent power spectrum characteristic, and utilizes the complete characteristic of the frame function to effectively eliminate the inter symbol interference while improving the system band utilization rate. We also give the architecture used for D2D Non-Orthogonal Multiplex Access (NOMA) relay wireless system, which can be decoded by genetic algorithm. Through simulation different environments, it shows such codes have higher spectrum efficiency and 3dB out performance over the traditional QAM","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129162573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}