2017 International Conference on Computing Intelligence and Information System (CIIS)最新文献

筛选
英文 中文
Optimality Conditions for Discrete Variational Problems 离散变分问题最优性条件
Fang-Di Kong
{"title":"Optimality Conditions for Discrete Variational Problems","authors":"Fang-Di Kong","doi":"10.1109/CIIS.2017.65","DOIUrl":"https://doi.org/10.1109/CIIS.2017.65","url":null,"abstract":"In this paper we consider optimality conditions for the following discrete variational problem: minimize J(x), subject to x(0), x(N). The necessary and sufficient condition for all feasible solutions satisfying the necessary optimality condition to be optimal solutions of the above problem is established.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129363128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensing-Throughput Tradeoff in Cognitive Radio Network Based on High Activity of Primary User 基于主用户高活跃度的认知无线网络感知吞吐量权衡
H. Cao, Shou-yi Yang
{"title":"Sensing-Throughput Tradeoff in Cognitive Radio Network Based on High Activity of Primary User","authors":"H. Cao, Shou-yi Yang","doi":"10.1109/CIIS.2017.64","DOIUrl":"https://doi.org/10.1109/CIIS.2017.64","url":null,"abstract":"Based on primary user traffic that the sensing-throughput tradeoff of secondary user has been investigated in cognitive radio network. In this paper, the method of discrete analysis and transition probabilities are used to derive the new formulas of probability and throughput in the higher grade of primary user activity. The probabilities of false alarm and detection are considered. When the active degree of primary user is increased to the channel state of primary user is able to change twice in one frame structure of secondary user, the throughput of secondary user decreases continuously.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127223464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Discretization of Continuous Variables in Bayesian Networks Based on Matrix Decomposition 基于矩阵分解的贝叶斯网络连续变量离散化
Haiteng Fang, Hongji Xu, Hui Yuan, Yingming Zhou
{"title":"Discretization of Continuous Variables in Bayesian Networks Based on Matrix Decomposition","authors":"Haiteng Fang, Hongji Xu, Hui Yuan, Yingming Zhou","doi":"10.1109/CIIS.2017.36","DOIUrl":"https://doi.org/10.1109/CIIS.2017.36","url":null,"abstract":"Discretization of continuous variables (DCV) which could directly affect the results of Bayesian network inference (BNI) has been an important issue in Bayesian network (BN). Some common methods of DCV by the equal interval, the equal frequency, etc. always result in data loss which would make the results of BNI inaccurate. In this paper, a method of DCV in BN based on matrix decomposition is presented. This method could discretize the value of continuous variable into more states with different probability rather than one state, so it's more scientific and accurate. This paper makes a BN with two nodes, height and weight of each person, as an example and the simulation result demonstrates that the proposed method of DCV based on matrix decomposition can achieve discretization without data loss and ensure the accuracy of BNI.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121744535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lattice-Based Public Encryption with Key Search Scheme for Wireless Sensor Networks 一种基于格子的无线传感器网络公钥加密与密钥搜索方案
Fugeng Zeng
{"title":"A Lattice-Based Public Encryption with Key Search Scheme for Wireless Sensor Networks","authors":"Fugeng Zeng","doi":"10.1109/CIIS.2017.27","DOIUrl":"https://doi.org/10.1109/CIIS.2017.27","url":null,"abstract":"With the rapid progress in technology, wireless sensor networks (WSNs) have attracted people's interest in the research community. However, due to the limited node communication and computing power, the traditional public key encryption algorithm can't be effectively applied. And as step into post-quantum era, pairing related assumption is fragile. Lattice is an ideal choice for building secure encryption scheme against quantum attack. Based on this, we propose a public encryption with key search scheme from lattice for wireless sensor networks. Compared with the existing public searchable encryption algorithm, the proposed encryption algorithm requires less computation time and achieves more security level.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132740194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Combined Forecasting Model of Traffic Flow Based on DGM(1,1) and GRNN 基于DGM(1,1)和GRNN的交通流联合预测模型
Zhiheng Yu, Kecheng Liu, Chengli Zhao, Y. Liu
{"title":"Combined Forecasting Model of Traffic Flow Based on DGM(1,1) and GRNN","authors":"Zhiheng Yu, Kecheng Liu, Chengli Zhao, Y. Liu","doi":"10.1109/CIIS.2017.17","DOIUrl":"https://doi.org/10.1109/CIIS.2017.17","url":null,"abstract":"In order to improve the prediction accuracy of traffic flow, this paper proposes a combined forecasting models with residual correction based on DGM(1,1). After introducing the modeling steps of DGM(1,1), DGM-GRNN combination model is established. In the model, the GRNN is used to predict the residual of DGM(1,1) model. Finally, we sum up the predict result of DGM(1,1) model and the residual correction model, and get the final prediction result of the combined forecasting model. We predicted the traffic flow of shangsan expressway by the model in this paper and then compared the results with the experimental results of DGM(1,1). The validity and feasibility of the proposed method are verified.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"332 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134454027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Bid Evaluation Model in the Bidding Management for Power Grid Corporations 电网公司招投标管理中的评标模型研究
Xiaojing Wei, Caiyun Guo
{"title":"Research on Bid Evaluation Model in the Bidding Management for Power Grid Corporations","authors":"Xiaojing Wei, Caiyun Guo","doi":"10.1109/CIIS.2017.72","DOIUrl":"https://doi.org/10.1109/CIIS.2017.72","url":null,"abstract":"Bid evaluation is the core in the bidding process. At present, a wide range of bid evaluation methods are adopted in the bidding process. On the basis of analyzing the characteristics of various bid evaluation methods, this paper established a new bid evaluation model. The model made some improvements and perfection in some important links, such as the establishment of the evaluation index system, the weight of the evaluation indexes and evaluating mathematical models. The whole process of bid evaluation was objectively described and the essence of the bid evaluation problem was factually reflected. It is conducive for the bidder to select the best bidding corporation through comprehensively evaluating the economic strength, technical strength and corporation reputation along with market behavior of the bidding corporations.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115702084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and Implementation Based on Three-Dimensional Model Watermarking Algorithm 基于三维模型的水印算法研究与实现
Aoshuang Dong, Rui Zeng
{"title":"Research and Implementation Based on Three-Dimensional Model Watermarking Algorithm","authors":"Aoshuang Dong, Rui Zeng","doi":"10.1109/CIIS.2017.47","DOIUrl":"https://doi.org/10.1109/CIIS.2017.47","url":null,"abstract":"In this paper, a digital watermarking technique is proposed for 3D model. Through the three-dimensional model file model into a two-dimensional image, this paper uses watermark embedding in the transform domain of two - dimensional image to achieve 3D model copyright protection. First, the watermark embedding process is used to analyze the principal components, the normalization and the choice of the projection viewpoint. Then based on the X-axis projection to get three-dimensional model projection RGB color pictures. Wavelet transform, discrete cosine transform and singular value decomposition of the blind watermarking algorithm are used to carry out image transformation of two-dimensional images and embed watermark. Experimental results show that the invisibility of the watermark is higher in the 3D watermarking model and the capabilities of anti-rotation, anti-translation and anti-noise attack are stronger.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114672270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Research on Forecasting Model Based on Support Vector Machine and Discrete Grey System 基于支持向量机和离散灰色系统的预测模型研究
Chengli Zhao, Zhiheng Yu
{"title":"The Research on Forecasting Model Based on Support Vector Machine and Discrete Grey System","authors":"Chengli Zhao, Zhiheng Yu","doi":"10.1109/CIIS.2017.24","DOIUrl":"https://doi.org/10.1109/CIIS.2017.24","url":null,"abstract":"In order to improve the prediction accuracy, this paper proposes a combined forecasting model based on the residual correction of DGM (1,1). After introducing the basic DGM(1,1) model and LSSVM regression model, DGM-LSSVM combination model is established. In this model, DGM(1, 1) is used to predict the original data sequence and obtain the predictive value and residual value. Then LSSVM model is used to correct the residual errors. Finally, the predicted results of DGM (1, 1) and residual correction of LSSVM model are combined, and the final prediction result is obtained by the combination forecasting model. Experimental results demonstrate that the proposed model has the advantages of effectiveness and feasibility.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121134658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Adaptive Optimization Algorithm for Stability Control of Electric Patrol Survey UAV 电动巡测无人机稳定性控制的鲁棒自适应优化算法
Zhifang Wang, Jie Shen, Xingjian Fu, Boyuan Chen
{"title":"Robust Adaptive Optimization Algorithm for Stability Control of Electric Patrol Survey UAV","authors":"Zhifang Wang, Jie Shen, Xingjian Fu, Boyuan Chen","doi":"10.1109/CIIS.2017.25","DOIUrl":"https://doi.org/10.1109/CIIS.2017.25","url":null,"abstract":"In this paper, a mathematical model of flight pattern and flight attitude is established and analyzed. The flight pattern of the power patrol flight is analyzed. Based on the original linear quadratic optimal control algorithm, the motion and optimal control model of the unmanned aerial vehicle (UAV) patrol process is established to meet the unmanned aerial vehicle (UAV) inspection constraints, then a linear quadratic optimization Control based optimal control algorithm is proposed. In this paper, four-rotor aircraft as an example for simulation research, different motion models with different optimization control, and add different interference signals and the corresponding filter algorithm for antijamming performance testing. The simulation results show that the UAV can obtain good control effect by the linear quadratic optimal control, and its stability and anti - jamming performance can be improved obviously.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Non-orthogonal Pulse Shape Modulation for Wireless Relay D2D Communication 无线中继D2D通信的非正交脉冲形状调制
Jie Shen, Ou Wang, Jianguo Yu
{"title":"Non-orthogonal Pulse Shape Modulation for Wireless Relay D2D Communication","authors":"Jie Shen, Ou Wang, Jianguo Yu","doi":"10.1109/CIIS.2017.63","DOIUrl":"https://doi.org/10.1109/CIIS.2017.63","url":null,"abstract":"This paper presents a novel multilevel Nonorthogonal Pulse Shape Modulation (NPSM) method, which based on the prolate spheroidal wave function (PSWF) and utilizes the spectral overlap to obtain the excellent power spectrum characteristic, and utilizes the complete characteristic of the frame function to effectively eliminate the inter symbol interference while improving the system band utilization rate. We also give the architecture used for D2D Non-Orthogonal Multiplex Access (NOMA) relay wireless system, which can be decoded by genetic algorithm. Through simulation different environments, it shows such codes have higher spectrum efficiency and 3dB out performance over the traditional QAM","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129162573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信