International Conference on Critical Infrastructure Protection最新文献

筛选
英文 中文
Detecting consumer drones from static infrared images by fast-saliency and HOG descriptor 基于快速显著性和HOG描述符的静态红外无人机检测
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290426
Shengxiang Qi, Wei Zhang, Guojing Xu
{"title":"Detecting consumer drones from static infrared images by fast-saliency and HOG descriptor","authors":"Shengxiang Qi, Wei Zhang, Guojing Xu","doi":"10.1145/3290420.3290426","DOIUrl":"https://doi.org/10.1145/3290420.3290426","url":null,"abstract":"Consumer drones detection plays an important role in applications including counter-terrorism, intelligent security and airway management. In this paper, we present an effective way for detecting consumer drones from static infrared images by saliency mapping and machine learning. Crucially, we propose a fast-saliency model with a simple 5 × 5 kernel convolution to obtain the saliency map of the input image, in which targets are enhanced while the background is suppressed. Candidate regions that may contain drones are extracted from the saliency map by adaptive thresholding and connected domain filtering, followed by feature expression with HOG descriptor for each region. Finally, the realities of these candidates are discriminated by support vector machine being trained from 200 drone samples and 400 background samples. Experiments on four real sequences over 600 infrared images demonstrate that our proposed algorithm has good performance in both the detection accuracy and the computation efficiency.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123877031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multi-language description text automatic generation of BPMN process model 多语言描述文本自动生成的BPMN过程模型
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290471
Guiyuan Yuan, Q. Zeng, H. Duan, Wenyan Guo, Weijian Ni, N. Xie
{"title":"Multi-language description text automatic generation of BPMN process model","authors":"Guiyuan Yuan, Q. Zeng, H. Duan, Wenyan Guo, Weijian Ni, N. Xie","doi":"10.1145/3290420.3290471","DOIUrl":"https://doi.org/10.1145/3290420.3290471","url":null,"abstract":"BPMN abstractly expresses the complex structure and the role relationships of business process in a standardized way. Therefore, participants can achieve a consistent understanding of the process. However, there exist communication gap between domain expert and system analyst, as domain expert cannot fully understand process model and judge the rationality of the process model. The existing work only proposed single-language description generation of process model, considering that different domain experts may have different languages, we propose a multi-language description text automatic generation approach of BPMN process model. In the experiment, we evaluate the description text in term of completeness, consistency, complexity and readability.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129178148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of technology adoption for an online platform for development planning discussion 技术采用分析,为在线平台的发展规划进行探讨
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290434
Zahrina Hasyati, A. Suzianti
{"title":"Analysis of technology adoption for an online platform for development planning discussion","authors":"Zahrina Hasyati, A. Suzianti","doi":"10.1145/3290420.3290434","DOIUrl":"https://doi.org/10.1145/3290420.3290434","url":null,"abstract":"Currently, development planning in Jakarta has used bottom-up approach in order to cover the whole community needs. This is supported by the development of an Online Platform for Development Planning Discussion (OPDPD) that can be accessed via website for all Jakarta citizens. After five years since its first launch in 2014, OPDPD is currently used by all of the neighborhood chairman in Jakarta. However, this condition does not fit the actual target user of OPDPD which is all Jakarta citizens. Therefore, this research aims to develop adoption strategy which is derived from the analysis of factor that affects technology adoption of OPDPD and its current stage on the Technology Adoption Life Cycle. The combination of Unified Theory of Acceptance and Use of Technology (UTAUT) and Information Systems Success Model (ISSM) is used to be tested by Partial Least Square-Structural Equation Modeling. Results show that there are six factors that significantly affects OPDPD adoption and it is still adopted by the Innovators as analyzed in Technology Adoption Life Cycle.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126338936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on printing quantum dot anti-counterfeiting image generation and recognition technology 印刷量子点防伪图像生成与识别技术研究
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290469
Jianle Zhu, Peng Cao, Xuan Wang, Peijun Huo, Fangfang Chen
{"title":"Research on printing quantum dot anti-counterfeiting image generation and recognition technology","authors":"Jianle Zhu, Peng Cao, Xuan Wang, Peijun Huo, Fangfang Chen","doi":"10.1145/3290420.3290469","DOIUrl":"https://doi.org/10.1145/3290420.3290469","url":null,"abstract":"This paper presents a method of information hiding and recognition based on the reliability codec of printed quantum dots, which is mainly used to solve the problem of authentication and information increment of anti-counterfeiting printing. This method uses multiple detection error-correcting coding method to generate the primitive lattice pattern of printed quantum dots, which figs out the issue of error in lattice pattern data caused by the printing output and the information recognition process. At the same time, in order to meet the requirement of scale matching of printed quantum dot dot matrix pattern mask, it is necessary to make multiple stitching for the primitive lattice pattern of printed quantum dots. In the stitching process, each primitive lattice information is interleaved with pseudo random iterative number, which resolves the trouble of information security vulnerabilities caused by the relative rules of the printed quantum dot dot matrix pattern, and achieves better information anti-counterfeiting and hidden effect. The technique settles the defects of the existing anti-counterfeiting printing in the aspects of anti duplication and damage resistance, and can be widely used in the anti-counterfeiting of cigarette label, wine label, negotiable securities and certificate.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126921221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
User-oriented green computation in small cell networks with mobile edge computing 基于移动边缘计算的小型蜂窝网络中面向用户的绿色计算
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290456
Yulun Cheng, Peng Zhao, Lei Wang
{"title":"User-oriented green computation in small cell networks with mobile edge computing","authors":"Yulun Cheng, Peng Zhao, Lei Wang","doi":"10.1145/3290420.3290456","DOIUrl":"https://doi.org/10.1145/3290420.3290456","url":null,"abstract":"Mobile edge computing (MEC) is significant in reducing the energy consumption of user equipment (UE), since the computation task can be transferred to MEC server through offloading. However, conventional offloading only considered the scenario in which the MEC server is integrated with macro base station. In this paper, we investigate the energy consumption of the UE for small cell networks integrated with MEC. The problem is firstly formulated as a mixed integer nonlinear programming. Through variable and problem transformation, it is decomposed by the alternating direction method of multipliers. And then, a greedy scheme is proposed to solve the integer optimization. On the basis of that, a distributed green offloading algorithm is proposed. Simulation results show that the proposed scheme can converge to the suboptimal solution, with slight gap comparing with the optimal one.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127018250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient and density adaptive edge weight model for measuring semantic similarity 一种高效、密度自适应的边缘权值语义相似度度量模型
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290459
Fei Li, L. Liao, Chun-yan Li, S. He
{"title":"Efficient and density adaptive edge weight model for measuring semantic similarity","authors":"Fei Li, L. Liao, Chun-yan Li, S. He","doi":"10.1145/3290420.3290459","DOIUrl":"https://doi.org/10.1145/3290420.3290459","url":null,"abstract":"The measurement of semantic similarity between concepts is an important research topic in natural language processing. However, previous efforts suffered from the mismatch of the accuracy and efficiency. In this paper, we propose an edge weight model for improving the accuracy of edge-based measures that have an inherent high efficiency. It combines the edge counting model with the information theory and deduces a function of edge weight based on the number of direct hyponyms of the subsumer in the edge. This model doesn't require any additional parameter and can adapt the effect of different densities to edges. Extensive experiments on four test datasets for WordNet and SNOMED-CT demonstrate that the proposed edge weight model can significantly improve the accuracy of various edge-based similarity measures and has a wide coverage over different ontologies. Compared with IC-based measures, our model has a remarkable advantage in efficiency and is comparable to it in accuracy.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134455923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative spectrum sensing for cognitive radio networks by using 1-bit compressed sensing 基于1位压缩感知的认知无线电网络协同频谱感知
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290479
Shengnan Yan
{"title":"Collaborative spectrum sensing for cognitive radio networks by using 1-bit compressed sensing","authors":"Shengnan Yan","doi":"10.1145/3290420.3290479","DOIUrl":"https://doi.org/10.1145/3290420.3290479","url":null,"abstract":"As an essential task for enabling dynamic spectrum sharing, spectrum sensing in wideband cognitive radio (CR) networks becomes quite challenging due to high sampling pressure, huge data transmission overheads and serious channel fading. To overcome these challenges, this paper proposes a collaborative spectrum sensing scheme based on 1-bit compressed sensing (CS). Each SU performs local 1-bit CS and obtains its own estimated support set via signal reconstruction. To make use of joint sparsity, all the support sets are fused in the fusion center (FC) and the fused result is used as priori information to guide the next local signal reconstruction. The weighted binary iterative hard thresholding (BIHT) algorithm with support estimate vector is proposed to implement the second reconstruction. Simulation results show that our proposed scheme can achieve effective spectrum detection at low communication and computation load.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123830420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding similar users from GPS data based on assignment problem 基于分配问题的GPS数据查找相似用户
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290470
Zedong Lin, Q. Zeng, H. Duan, Faming Lu
{"title":"Finding similar users from GPS data based on assignment problem","authors":"Zedong Lin, Q. Zeng, H. Duan, Faming Lu","doi":"10.1145/3290420.3290470","DOIUrl":"https://doi.org/10.1145/3290420.3290470","url":null,"abstract":"The application of location-aware technology has increasingly accumulated a large amount of user spatiotemporal data, which gives us the opportunity to analyze users' interests and behavior patterns. This paper proposes a new method for constructing user's mobility profiles and measuring their similarity. First, a new method of using the categories of points of interest (POI) to represent the semantics of a geographical area (stay region) where a user stays for a long period of time is proposed. Second, the sequential pattern mining technique is applied to extract the user's mobility profiles. Then, the user similarity is computed based on the maximum benefit assignment problem. Finally, a comparison experiment with the existing works on the real dataset verifies the effectiveness of the proposed approach.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"380 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122767554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and implementation of FA networking control software that accords with SEMI standards 符合SEMI标准的FA联网控制软件的设计与实现
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290468
N. Jin, Aidong Xu, Mingzhe Liu, Chenxi Wang
{"title":"Design and implementation of FA networking control software that accords with SEMI standards","authors":"N. Jin, Aidong Xu, Mingzhe Liu, Chenxi Wang","doi":"10.1145/3290420.3290468","DOIUrl":"https://doi.org/10.1145/3290420.3290468","url":null,"abstract":"As the complexity of the semiconductor process becomes more and more complex. The types and functions of production equipment involved in the semiconductor industry are also increasing. This paper studies and analyzes SEMI E5, E37, E30, E39, E40, E94, E87, E90, E84 and other related standards. Design and develop networked control software for equipment and plant automation (FA) system according to SEMI international standards.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126263480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clustering based spatial spectral preprocessing for hyperspectral unmxing 基于聚类的高光谱解混空间光谱预处理
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290475
Xiangfei Shen, Wenxing Bao, Kewen Qu
{"title":"Clustering based spatial spectral preprocessing for hyperspectral unmxing","authors":"Xiangfei Shen, Wenxing Bao, Kewen Qu","doi":"10.1145/3290420.3290475","DOIUrl":"https://doi.org/10.1145/3290420.3290475","url":null,"abstract":"Numerous spectral-based endmember extraction algorithms (EEAs) for hyperspectral unmixing (HU) at the price of ignoring spatial context information in recent years. In this paper, we propose a novel preprocessing module by integrating spatial-spectral information, which consists of three parts: 1) k-means algorithm based on spectral angle distance measurement criterion is used to identify hyperspectral image homogenous regions; 2) the local window is utilized to detect the anomalous pixels that hide in the scene; 3) the reconstruction weight that takes into account spatial and spectral information jointly is designed to revise the anomalous pixels to strengthen image homogeneity. The principal contribution of the proposed algorithm is to promote the homogeneity of image and lessen computational complexity while improving the accuracy of endmember extraction. The experimental results obtained by using real hyperspectral data set show a slight improvement for HU while comparing with the state-of-art spatial preprocessing framework.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126418651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信