Zhixiang Li, Yinlong Wang, Xiufeng Gao, Xiwu Wang, Qianjin Li, Xi Li
{"title":"Non-linear signal processing with improved STAM algorithm","authors":"Zhixiang Li, Yinlong Wang, Xiufeng Gao, Xiwu Wang, Qianjin Li, Xi Li","doi":"10.1109/ICITEC.2014.7105603","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105603","url":null,"abstract":"Symmetric Table Lookup Addition Method (STAM) is an efficient approach to implement non-linear function approximation with hardware, in which only lookup tables and addition are involved, and size of table could be reduced remarkably due to symmetry of the second term of Taylor series. Nevertheless, the dominant memory occupier is the first term, which still uses relatively big table. An improved method based on differential decomposition was brought forth aiming at relieving the problem, and hyperbolic tangent sigmoid function was implemented on FPGA using the improved algorithm. Experiment results showed that 17% to 30% of memory was saved after improvement.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122388600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An implementation of cognitive management framework for the Internet of Things system","authors":"Yuan Jiang, W. Xie, Fapeng Wang, Ning Li","doi":"10.1109/ICITEC.2014.7105581","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105581","url":null,"abstract":"With the rapid development of Internet of Things (IoT), how to deal with the increasing number of objects with heterogeneity has become a new issue. Cognitive management emerges as the times require. On the basis of existing cognitive management frameworks, we provide a new cognitive management framework for the IoT system. The framework is based on cognitive cycle with the ability of controlling the behaviors of virtual representation of real world objects in virtual world according to users' request. A case study for renting a car and choosing an optimal way from origin to destiny is illustrated to show how the framework works.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel synthesis technique for generalized Chebyshev microwave band-pass filters","authors":"Qi Nan, Li Sheng-xian","doi":"10.1109/ICITEC.2014.7105579","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105579","url":null,"abstract":"A novel synthesis technique which can arbitrarily place transmission zeros, directly synthesize in band-pass domain without a low-pass prototype transformation for generalized Chebyshev microwave band-pass filters is discussed in this paper. Compared with the classical synthesis theory for narrowband filters, this method can reduce the relative error generated in the frequency transformation and apply to synthesize wideband and ultra-wideband filters. The network matrix derived from the discussed technique is physically meaningful and examples show a good agreement.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131228491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis and improvement of a SIP authentication scheme","authors":"Jun Zheng, Dongyun Wang","doi":"10.1109/ICITEC.2014.7105601","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105601","url":null,"abstract":"SIP (Session Initial Protocol) has been a very popular protocol for VoIP. However, the authentication of this protocol just derives from HTTP digest authentication, which has been demonstrated insecure in the open network. Recently, Arshad et al. proposed an improved mutual authentication scheme based on ECC and claimed that it's secure enough. In this paper, however, we point out that their protocol still could not resist offline password guessing attacks. Furthermore, we propose an ECC-based mutual authentication and key agreement scheme to overcome such a security problem. Also, an analysis of it is provided to indicate that compared to Arshad et al.'s scheme, this scheme reduces twice hash operation and is more secure with reasonable computation cost.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132828523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An user behavior credibility authentication model in cloud computing environment","authors":"Xin Lu, Yue Xu","doi":"10.1109/ICITEC.2014.7105617","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105617","url":null,"abstract":"To address the issue of credibility authentication of user behaviors in the cloud computing environment, this paper proposes a user behavior credibility authentication model built on the characteristic-based random Petri network to assess the behavior contract credibility of the users accessing the cloud service resources. This model first makes dimensional normalization of the behavioral residue data of the users and uses the decision tree ID3 algorithm to characterize the behavioral residue data of the users to check such data against the behavior authentication sets, so as to determine the credibility of the compliance of the user behaviors with the contract. User behaviors are dynamic and random, so this paper proposes the status deduction function of the random Petri network to analyze the credibility of the compliance of user behaviors with the contract. Then the credible degree is calculated to make quantitative assessment of the user behaviors' credibility. The simulation experiments indicate that this model is able to reliably assess user behaviors' credibility in the cloud computing environment and is a certain improvement in terms of accuracy and efficiency of credibility authentication compared with the traditional models.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114027396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Small target detection in sea clutter based on linear prediction","authors":"Yunfeng Liu, Jidong Suo, Xiaoming Liu, Bo Li","doi":"10.1109/ICITEC.2014.7105607","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105607","url":null,"abstract":"To detect small target in sea clutter, a method based on local backscattering amplitude prediction error is proposed in the paper. This approach builds on linear prediction: calculating the mean of the fourth power of prediction error of backscattering amplitude. By analyzing the IPIX radar datasets, it is found that the prediction error's mean and variance of the range bin containing a small target is much smaller than that of other range bins containing only sea clutter. The range bin, in which a small target is contained, gets smaller prediction error than those bins in which only pure sea clutter is occupied. Upon this point, we detect the small target in sea clutter with small amount of priori knowledge. The experimental results show that the proposed method can effectively detect small target in sea clutter with better performance.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123314216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of distribution algorithm for solving hybrid flow-shop scheduling problem","authors":"Xiaobing Liu, Xuan Jiao, Fengchao Zhang","doi":"10.1109/ICITEC.2014.7105571","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105571","url":null,"abstract":"According to the characteristics of hybrid flow shop scheduling problem (HFSP), this paper designed encoding and decoding methods based on permutation, established a probability model to describe the problem solution space, and proposed a estimation of distribution algorithm (EDA) to solve the hybrid flow shop scheduling problem. The algorithm based on probabilistic models generates new individuals by random sampling methods and updates the probabilistic models based on the dominant population. Based on examples of numerical simulation and compared with the existing algorithm, the paper verified the effectiveness and robustness of the algorithm.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123256993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on end-user programming tool for pen-based e-form software","authors":"Xiaochun Wang, Lin Zhu","doi":"10.1109/ICITEC.2014.7105623","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105623","url":null,"abstract":"Pen-based e-form is the e-form software based on pen-based user interface. Because of the complexity of existing development tool and difficulty of implementing pen-based user interface, pen-based e-form only can be designed and implemented by the professional developers, which make it difficult to adapt to the changing user requirements. It is a good method to solve the above problem to develop a software programming tool which supports end users to design their own software. Therefore, the paper systemically searches the end-user programming tool for pen-based e-form software, and details its software structure and component. In the end, we develop the prototype system and analyze its end-user programming support degree.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125569396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local-SURF based 3D scene reconstruction for mobile robot","authors":"Zhengrong Chen, Haofeng Zhang","doi":"10.1109/ICITEC.2014.7105590","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105590","url":null,"abstract":"Traditional SURF based 3D reconstruction methods need to extract features on the whole image. Although this technique can provide rich and accurate environment information, however, it is too time consuming and not practical. To solve that problem, a local SURF based 3D reconstruction algorithm for mobile robot is proposed, which includes three main steps: first, the posture variations were captured from posture sensor and milemeter, and then the initial transition matrix was established; second, when finishing extracting features of the previous frame, searching areas were computed from the initial transition matrix and search radius; last, final transition matrix was computed according to the matching points. Experiments showed that the proposed algorithm did improve the speed of scene reconstruction while preserving precision, and moreover, our approach also can correct the posture variation of robot according to the matching results.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129433512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of different variants of Restricted Boltzmann Machines","authors":"Xiaowei Guo, H. Huang, Jason Zhang","doi":"10.1109/ICITEC.2014.7105610","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105610","url":null,"abstract":"Restricted Boltzmann Machines (RBMs) have been developed for a lot of applications in the past few years, and many of its variants have also appeared. In this paper, RBM model and its learning algorithm with contrastive divergence algorithm will be introduced firstly. Then three important variants of RBM are presented in details, which are sparse RBM, discriminative RBM, and the Deep Boltzmann Machines (DBM). All the variants including original RBM are tested on MNIST handwriting digit dataset for classification task. Our empirical results demonstrate the advantage of RBM models and show that compared with other variants, the DBM is the best one in terms of the classification accuracy.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125844226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}