2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)最新文献

筛选
英文 中文
Codebook design of vector quantization based on improved particle swarm optimization 基于改进粒子群优化的矢量量化码本设计
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579330
Jifeng Sun, Jinhua Ouyang
{"title":"Codebook design of vector quantization based on improved particle swarm optimization","authors":"Jifeng Sun, Jinhua Ouyang","doi":"10.1109/ICACTE.2010.5579330","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579330","url":null,"abstract":"An improved particle swarm optimization scheme for codebook design is proposed in this paper. By sorting the training vector, we select the initial codebook to enhance the diversity of search, and add stagnant judging algebra to prevent the algorithm falling into a local optimum. The simulation results prove that the improved method is reasonable.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124881468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conformal flattening of non-planar surface 非平面的保形平坦化
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5578927
Qingbin Li, Junxiao Xue
{"title":"Conformal flattening of non-planar surface","authors":"Qingbin Li, Junxiao Xue","doi":"10.1109/ICACTE.2010.5578927","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5578927","url":null,"abstract":"This paper presents an approach that uses conformal mapping to flattening a 3D surface to 2D plane. We propose an algorithm by traversing the mesh in a region growing way. The algorithm is greedy and begins with a seed triangle which can be chosen freely. In each operation, we develop a piecewise linear mapping function that is conformal. In addition, at first step, we initialize the planar triangle which corresponding to the seed triangle. The initialization ensures that the seed triangle flattening process produce no distortion. And in other steps, we reduce the distortion by unifying the vertices in the plane. Our approach is efficient and fast enough.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125007508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integration of heterogeneous classifiers for intrusion detection 集成异构分类器的入侵检测
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579129
Yong Zhang, Linjie Zhu
{"title":"Integration of heterogeneous classifiers for intrusion detection","authors":"Yong Zhang, Linjie Zhu","doi":"10.1109/ICACTE.2010.5579129","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579129","url":null,"abstract":"To address the problem of less rare data and low detection accuracy, The paper proposes a heterogeneous classifier integrated by the random forests, support vector machines, clustering and Bayesian classifier to increase the detecting accuracy of rare class, and to detect rare class with the greatest weighted voting. Experimental results show that utilizing integration of heterogeneous classifiers in intrusion detection system can improve obviously detection precision and decrease false positive rate.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125076473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
User requirement model for federated identities threats 联邦身份威胁的用户需求模型
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579819
Z. Ahmad, Jamalul-lail Ab Manan, S. Sulaiman
{"title":"User requirement model for federated identities threats","authors":"Z. Ahmad, Jamalul-lail Ab Manan, S. Sulaiman","doi":"10.1109/ICACTE.2010.5579819","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579819","url":null,"abstract":"Federated identity management system interconnects distributed island of identity management systems with federated identity standards with single sign-on facility. In an open environment, such as those of a federated identity management system a user single sign-on credentials, can easily fall prey to identity theft, or unlawful information gathering. It may use either existing account or new account fraud. In this paper, we present scenarios related to identity theft, unlawful information gathering and tracking. We show the main issue of lack of platform trust in platforms involve in federated systems and discussed the consequences of respective threats on them. In an effort to present a holistic approach to handle security, trust and privacy, we propose a user requirement model involving these core issues for federated identities. These requirements include system trustworthiness, hardware protected key generations, usability, efficiency, identity information validity, privacy, accountability and system robustness. In our proposed model, Trusted Platform Module (TPM), is the fundamental component which ties and binds all communicating platforms together in authentication, verification and trustworthiness of the platform.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125128756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Face recognition based on Two-Dimensional Discriminant Locality Preserving Projection 基于二维判别保域投影的人脸识别
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579443
Xiajiong Shen, Qing Cong, Sheng Wang
{"title":"Face recognition based on Two-Dimensional Discriminant Locality Preserving Projection","authors":"Xiajiong Shen, Qing Cong, Sheng Wang","doi":"10.1109/ICACTE.2010.5579443","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579443","url":null,"abstract":"Locality Preserving Projection is a method which can extract the feature and reduce dimensionality effectively, which has been widely used in face recognition. However, it is also an unsupervised method, and it is an image vector-based method, needing to covert the face image into a vector. This conversion not only breaks the local structural information, but also brings lots of problems, such as the dimension of these converted vectors is too high and encounters the small sample size problem. And it is also an unsupervised method and has no directly relation to classification. In order to improve the performance of LPP, we present a method named Two-Dimensional Discriminant Locality Preserving Projection for extracting the feature and reduce dimensionality and apply it in face recognition. Experimental results on ORL and Yale databases suggest that the proposed 2DDLPP provides a better way to solve these problems and achieves lower error rates.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125146146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Small unmanned helicopter longitudinal control PID parameter optimization based on genetic algorithm 基于遗传算法的小型无人直升机纵向控制PID参数优化
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579403
Zhao Ping, Du Chao, Yu Zhou
{"title":"Small unmanned helicopter longitudinal control PID parameter optimization based on genetic algorithm","authors":"Zhao Ping, Du Chao, Yu Zhou","doi":"10.1109/ICACTE.2010.5579403","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579403","url":null,"abstract":"The PID control as a popularly control method that is used in the control system, this control method is still adopted in many practical applications of the process currently. The paper mainly discusses the classical PID tuning methods, and on the basis of the method, which achieve a small unmanned helicopter longitudinal PID control parameters optimization by introducing the idea of genetic algorithm. The performance of control system is assured when adopting genetic algorithms. The simulation results comparing with the classical PID tuning methods shows that PID controller that is designed with genetic algorithms is better flexibility, and can obtain the better control effect.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"10 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125190958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Prediction of bus traffic volume based on extension cluster model 基于可拓聚类模型的公交交通量预测
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579051
Wenjuan Wang, Yongquan Yu, Shoujian Lan
{"title":"Prediction of bus traffic volume based on extension cluster model","authors":"Wenjuan Wang, Yongquan Yu, Shoujian Lan","doi":"10.1109/ICACTE.2010.5579051","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579051","url":null,"abstract":"This paper analyze the influential factors of bus traffic volume. Use the concept of matter-element and correlation function to establish prediction model, the prediction results can be obtained by means of cluster analysis. Through analyzing and calculating the historical data of Guangzhou City, the results show that the model in the bus traffic volume is valid.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123474699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The computer simulation of the spiral bevel gear with equal conjugate curvature 等共轭曲率螺旋锥齿轮的计算机仿真
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579513
L. Huran
{"title":"The computer simulation of the spiral bevel gear with equal conjugate curvature","authors":"L. Huran","doi":"10.1109/ICACTE.2010.5579513","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579513","url":null,"abstract":"A new theory of gearing: high order contact meshing theory of gearing is presented in this paper. We believe that this kind of gear profile is most suitable in both the contact and bending fatigue strength. From careful analysis and deep going investigation, we think that it is the profile of equal conjugate curvature with high order of contact, and analyzed the forming principle of this kind of profile. In this paper our aim is to deduce the theory to form this kind of profile, and produce the proto type of reducer of this kind of spiral bevel gear.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125504683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization model of vessel equipment LORA based on LINGO 基于LINGO的船舶设备LORA优化模型
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579236
Chun-yu He, Jia-shan Jin, Song-bin Liu
{"title":"Optimization model of vessel equipment LORA based on LINGO","authors":"Chun-yu He, Jia-shan Jin, Song-bin Liu","doi":"10.1109/ICACTE.2010.5579236","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579236","url":null,"abstract":"LORA plays an important role in the supportability analysis of vessel equipment. There are much less LORA models dealing with few data, so, an optimization model based on LINGO is offered to solve the 3I3R vessel equipment, which is solved by programming. Finally, the model of LORA is practical and effective validated by a case.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125551528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modular machine tool spindle box expert system development environment design 组合机床主轴箱专家系统开发环境设计
2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) Pub Date : 2010-09-20 DOI: 10.1109/ICACTE.2010.5579261
Yuehua Gao, Jing Li, Jun Han, Xiuping Zhang
{"title":"Modular machine tool spindle box expert system development environment design","authors":"Yuehua Gao, Jing Li, Jun Han, Xiuping Zhang","doi":"10.1109/ICACTE.2010.5579261","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579261","url":null,"abstract":"Expert system development environment directly affects the efficiency and quality of development of expert system. According to modular machine tool spindle box's design complexity and design goals of multiple solutions, it identifies modular machine tool spindle box expert system platform is the Pro/Engineer. Its development tools are Visual C++6.0 and Pro/Toolkit, its database management system is Access. It has shortened modular machine tool spindle box expert system development cycle, not only increases flexibility of development process, but also laid the foundation for the main axle box subsequent CAM/CAE/CAPP.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126767341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信