Proceedings of 2014 International Conference on Cloud Computing and Internet of Things最新文献

筛选
英文 中文
Analysis of information transmission in GEO+IGSO+MEO constellation GEO+IGSO+MEO星座信息传输分析
Yi Liu, Bin Wu, Bo Wang
{"title":"Analysis of information transmission in GEO+IGSO+MEO constellation","authors":"Yi Liu, Bin Wu, Bo Wang","doi":"10.1109/CCIOT.2014.7062524","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062524","url":null,"abstract":"Satellite constellations with more and more powerful functions are now in busy construction, which makes its status higher and higher in aerospace filed. GEO+IGSO+MEO constellation can provide regional and global navigation. Different demands of various information transmission via Inter-satellite links (ISL) are analyzed based on research hotspots.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using V-Model methodology, UML process-based risk assessment of software and visualization 采用V-Model方法,基于UML过程的软件风险评估和可视化
M. Naeem, Weihua Zhu, A. A. Memon, A. Khalid
{"title":"Using V-Model methodology, UML process-based risk assessment of software and visualization","authors":"M. Naeem, Weihua Zhu, A. A. Memon, A. Khalid","doi":"10.1109/CCIOT.2014.7062536","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062536","url":null,"abstract":"Risk Assessment is one of the most critical parts of software engineering process, and risks are the factors that could be results in software failure if they are not correctly handled. In this Paper, we propose a solution to reduce risks using UML visualization of software processes in detail, and V-Model (Software Development Lifecycle Model) techniques are performed to produce verified results in each phase of development lifecycle. Using all above aspects and research findings, we propose “Risk Assessment V-Model”. Furthermore, we use “Do Sale Process” to discuss different properties of our model. This model is quite in general and can be applicable and expendable for many kinds of software systems.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125411842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimization of Neural Network based on Genetic Algorithm and BP 基于遗传算法和BP的神经网络优化
Shiwei Zhang, Hanshi Wang, Lizhen Liu, Chao Du, Jingli Lu
{"title":"Optimization of Neural Network based on Genetic Algorithm and BP","authors":"Shiwei Zhang, Hanshi Wang, Lizhen Liu, Chao Du, Jingli Lu","doi":"10.1109/CCIOT.2014.7062537","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062537","url":null,"abstract":"In order to improve the intelligence, high efficiency, humanization of the type of the search and eliminate games, and also to improve the search performance and rule out the accuracy of the target during intelligent games running. This paper puts forward a comprehensive method that combines Genetic Algorithm, Neural Network and Back Propagation (BP) to solve the insufficiency of computing power and low efficiency by using a single algorithm in Intelligence games. In this method, Genetic Algorithm will be used in weight training of Neural Network first of all. It will not stop iterating until Genetic Algorithm evolves into a certain degree or network errors satisfies the requirements, and delivers the best chromosome we get to Neural Network. Then BP trains the data that runs through the Neural Network, which is Neural Network's second training. Finally, the paper applies the new way in the Mine Clearance experiment. By comparing this experiment with only using Genetic Algorithm or Neural Network, it finds out that the proposed method significantly improves the minesweepers accuracy.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127761353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cognitive theory applied to radar system 认知理论在雷达系统中的应用
Chenghong Zhou, Weiping Qian
{"title":"Cognitive theory applied to radar system","authors":"Chenghong Zhou, Weiping Qian","doi":"10.1109/CCIOT.2014.7062527","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062527","url":null,"abstract":"Cognition, a basic concept in psychology, is the set of a human's inner mental activities and processes related to knowledge. Actually it is possible to introduce cognition into engineering systems to construct intelligent systems with human cognitive functions. Cognitive radar is such a successful case that improves the working performance in complex environment. The article starts with the concept of cognition and cognitive radar, subsequently followed by the basic elements including intelligent information processing, information feedback. The fundamentals about how cognition increases the perceptual ability of radar are discussed in detail.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130262964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Survey of structure from motion 从运动观察结构
Gao Yi, Luo Jianxin, Qiu Hang-ping, Wu Bo
{"title":"Survey of structure from motion","authors":"Gao Yi, Luo Jianxin, Qiu Hang-ping, Wu Bo","doi":"10.1109/CCIOT.2014.7062508","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062508","url":null,"abstract":"As a useful technology of 3D reconstruction based on binocular stereo vision, structure from motion is widely used in many fields and highly valuable in applications. However, few reviews have been focused on this technology. In this paper, the basic principles are overviewed. More specifically, the related works and main methods are discussed. Finally some future research directions are summarized.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133938225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An efficient and robust one-time message authentication code scheme using feature extraction of iris in cloud computing 基于虹膜特征提取的云计算一次性消息认证码方案
Z. Abduljabbar, Hai Jin, Deqing Zou, A. Yassin, Z. Hussien, M. Hussain
{"title":"An efficient and robust one-time message authentication code scheme using feature extraction of iris in cloud computing","authors":"Z. Abduljabbar, Hai Jin, Deqing Zou, A. Yassin, Z. Hussien, M. Hussain","doi":"10.1109/CCIOT.2014.7062499","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062499","url":null,"abstract":"Cloud computing suffers from a number of problems in terms of security issues. Authentication and integrity play an important role in the security field and numerous concerns have been raised to recognizeor protect any tampering with exchanges of text between two entities (sender and receiver) within the cloud environment. Many schemes in this area can be vulnerable to well known methods of attack such as replay attack, forgery attack, dictionary, insider, and modification attacks. A robust scheme is therefore required to detect or prevent any modification or manipulation of a message during transmission. In this paper, we propose a new message authentication code (MAC) based on feature extraction of the user's iris in order to assure the integrity of the user's message. Features are extracted from the user's iris to generate a message code for each user's login and to prohibit malicious attacks such as replay, forgery and insider attacks. Our proposed scheme enjoys several important security attributes such as a user's one time bio-key, robust message anonymity, data integrity for a user's message, phase key agreement, bio-key management,and one time message code for each user's session. Finally, our security analysis and experimental results demonstrate and prove the invulnerability and efficiency of our proposed scheme.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130343657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Power and performance analysis of the Graph 500 benchmark on the Single-chip Cloud Computer 图500基准测试在单芯片云计算机上的功耗和性能分析
Zhiquan Lai, King Tin Lam, Cho-Li Wang, Jinshu Su
{"title":"Power and performance analysis of the Graph 500 benchmark on the Single-chip Cloud Computer","authors":"Zhiquan Lai, King Tin Lam, Cho-Li Wang, Jinshu Su","doi":"10.1109/CCIOT.2014.7062496","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062496","url":null,"abstract":"The concerns of data-intensiveness and energy awareness are actively reshaping the design of high-performance computing (HPC) systems nowadays. The Graph500 is a widely adopted benchmark for evaluating the performance of computing systems for data-intensive workloads. In this paper, we introduce a data-parallel implementation of Graph500 on the Intel Single-chip Cloud Computer (SCC). The SCC features a non-coherent many-core architecture and multi-domain on-chip DVFS support for dynamic power management. With our custom-made shared virtual memory programming library, memory sharing among threads is done efficiently via the shared physical memory (SPM) while the library has taken care of the coherence. We conduct an in-depth study on the power and performance characteristics of the Graph500 workloads running on this system with varying system scales and power states. Our experimental results are insightful for the design of energy-efficient many-core systems for data-intensive applications.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133141985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Small file access optimization based on GlusterFS 基于GlusterFS的小文件访问优化
Xie Tao, Liang Alei
{"title":"Small file access optimization based on GlusterFS","authors":"Xie Tao, Liang Alei","doi":"10.1109/CCIOT.2014.7062514","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062514","url":null,"abstract":"This paper describes a strategy to optimize small file's reading and writing performance on traditional distributed file system. Traditional distributed file system like GlusterFS stores data within local file system (XFS, EXT3, EXT4, etc.), which shows a significant bottleneck on file metadata lookup. We try to re-design metadata structure by merging small file into large file, thus to reduce size of metadata, so we can store the whole files' metadata inside main memory. We design and implement the whole strategy on GlusterFS, test results show a great performance optimization on small file operation.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"527 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116226070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An improved online multiple kernel classification algorithm based on double updating online learning 基于双更新在线学习的改进在线多核分类算法
Y. Xiao, Shangping Zhong
{"title":"An improved online multiple kernel classification algorithm based on double updating online learning","authors":"Y. Xiao, Shangping Zhong","doi":"10.1109/CCIOT.2014.7062516","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062516","url":null,"abstract":"Online multiple kernel classification(OMKC) algorithm is a promising algorithm in machine learning. Because of low error rate and relatively fast training time, it has been sucessfully applied to many real-world problems. However, in the phase of learning a single classifier for a given kernel, the OMKC adopts the perceptron algorithm, which significantly limits the performance of the algorithm. In this paper, we adopts the double updating online learning(DUOL) algorithm to learn the single classifier. Comparing to the perceptron algorithm, the DUOL algorithm not only assigns a weight to the misclassified example, but also updates the weight for one of the existing support vectors, which significantly improves the classification performance. Then we use the hedge algorithm to combines these classifiers. The experimental results show that the proposed algorithm is more effective than the OMKC algorithm, the state-of-the-art algorithms, and single kernel learning algorithm.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115368000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Publicly verifiable delegation of set intersection 集合交集的公开可验证委托
Tingting Wang, Yanqin Zhu, Xizhao Luo
{"title":"Publicly verifiable delegation of set intersection","authors":"Tingting Wang, Yanqin Zhu, Xizhao Luo","doi":"10.1109/CCIOT.2014.7062500","DOIUrl":"https://doi.org/10.1109/CCIOT.2014.7062500","url":null,"abstract":"We study the verifiable delegation of set intersection in the model of authenticated data structures, where a weak client in storage and computation stores its dataset composed of some sets into a powerful server. The client can issue update and set intersection query over outsourced data. The server returns the result and a proof of its correctness. Our scheme allows any entity to publicly verify the correctness of set intersection query, and requires no secret key. Based on characteristic polynomials of sets, our authenticated data structure firstly provides a practical and specific method for set intersection through polynomial evaluations. It achieves optimal verification and proof complexity, as well as optimal update complexity without bearing any extra space overhead. The overhead for computing actual answer and proofs is reduced significantly in contrast with previous methods based on bilinear-map accumulators. The intersection query comes up in keyword search, database queries and other applications. Indeed, our scheme can be effectively used in such scenarios. The security of our constructions is based on co-Computational Diffie-Hellman assumption.","PeriodicalId":255477,"journal":{"name":"Proceedings of 2014 International Conference on Cloud Computing and Internet of Things","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122201816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信