Proceedings of 2nd International Conference on Information Technology and Electronic Commerce最新文献

筛选
英文 中文
Non-linear signal processing with improved STAM algorithm 改进STAM算法的非线性信号处理
Zhixiang Li, Yinlong Wang, Xiufeng Gao, Xiwu Wang, Qianjin Li, Xi Li
{"title":"Non-linear signal processing with improved STAM algorithm","authors":"Zhixiang Li, Yinlong Wang, Xiufeng Gao, Xiwu Wang, Qianjin Li, Xi Li","doi":"10.1109/ICITEC.2014.7105603","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105603","url":null,"abstract":"Symmetric Table Lookup Addition Method (STAM) is an efficient approach to implement non-linear function approximation with hardware, in which only lookup tables and addition are involved, and size of table could be reduced remarkably due to symmetry of the second term of Taylor series. Nevertheless, the dominant memory occupier is the first term, which still uses relatively big table. An improved method based on differential decomposition was brought forth aiming at relieving the problem, and hyperbolic tangent sigmoid function was implemented on FPGA using the improved algorithm. Experiment results showed that 17% to 30% of memory was saved after improvement.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122388600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An implementation of cognitive management framework for the Internet of Things system 物联网系统认知管理框架的实现
Yuan Jiang, W. Xie, Fapeng Wang, Ning Li
{"title":"An implementation of cognitive management framework for the Internet of Things system","authors":"Yuan Jiang, W. Xie, Fapeng Wang, Ning Li","doi":"10.1109/ICITEC.2014.7105581","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105581","url":null,"abstract":"With the rapid development of Internet of Things (IoT), how to deal with the increasing number of objects with heterogeneity has become a new issue. Cognitive management emerges as the times require. On the basis of existing cognitive management frameworks, we provide a new cognitive management framework for the IoT system. The framework is based on cognitive cycle with the ability of controlling the behaviors of virtual representation of real world objects in virtual world according to users' request. A case study for renting a car and choosing an optimal way from origin to destiny is illustrated to show how the framework works.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel synthesis technique for generalized Chebyshev microwave band-pass filters 一种新的广义切比雪夫微波带通滤波器合成技术
Qi Nan, Li Sheng-xian
{"title":"A novel synthesis technique for generalized Chebyshev microwave band-pass filters","authors":"Qi Nan, Li Sheng-xian","doi":"10.1109/ICITEC.2014.7105579","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105579","url":null,"abstract":"A novel synthesis technique which can arbitrarily place transmission zeros, directly synthesize in band-pass domain without a low-pass prototype transformation for generalized Chebyshev microwave band-pass filters is discussed in this paper. Compared with the classical synthesis theory for narrowband filters, this method can reduce the relative error generated in the frequency transformation and apply to synthesize wideband and ultra-wideband filters. The network matrix derived from the discussed technique is physically meaningful and examples show a good agreement.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131228491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cryptanalysis and improvement of a SIP authentication scheme 一个SIP认证方案的密码分析与改进
Jun Zheng, Dongyun Wang
{"title":"Cryptanalysis and improvement of a SIP authentication scheme","authors":"Jun Zheng, Dongyun Wang","doi":"10.1109/ICITEC.2014.7105601","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105601","url":null,"abstract":"SIP (Session Initial Protocol) has been a very popular protocol for VoIP. However, the authentication of this protocol just derives from HTTP digest authentication, which has been demonstrated insecure in the open network. Recently, Arshad et al. proposed an improved mutual authentication scheme based on ECC and claimed that it's secure enough. In this paper, however, we point out that their protocol still could not resist offline password guessing attacks. Furthermore, we propose an ECC-based mutual authentication and key agreement scheme to overcome such a security problem. Also, an analysis of it is provided to indicate that compared to Arshad et al.'s scheme, this scheme reduces twice hash operation and is more secure with reasonable computation cost.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132828523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An user behavior credibility authentication model in cloud computing environment 云计算环境下的用户行为可信度认证模型
Xin Lu, Yue Xu
{"title":"An user behavior credibility authentication model in cloud computing environment","authors":"Xin Lu, Yue Xu","doi":"10.1109/ICITEC.2014.7105617","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105617","url":null,"abstract":"To address the issue of credibility authentication of user behaviors in the cloud computing environment, this paper proposes a user behavior credibility authentication model built on the characteristic-based random Petri network to assess the behavior contract credibility of the users accessing the cloud service resources. This model first makes dimensional normalization of the behavioral residue data of the users and uses the decision tree ID3 algorithm to characterize the behavioral residue data of the users to check such data against the behavior authentication sets, so as to determine the credibility of the compliance of the user behaviors with the contract. User behaviors are dynamic and random, so this paper proposes the status deduction function of the random Petri network to analyze the credibility of the compliance of user behaviors with the contract. Then the credible degree is calculated to make quantitative assessment of the user behaviors' credibility. The simulation experiments indicate that this model is able to reliably assess user behaviors' credibility in the cloud computing environment and is a certain improvement in terms of accuracy and efficiency of credibility authentication compared with the traditional models.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114027396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Small target detection in sea clutter based on linear prediction 基于线性预测的海杂波小目标检测
Yunfeng Liu, Jidong Suo, Xiaoming Liu, Bo Li
{"title":"Small target detection in sea clutter based on linear prediction","authors":"Yunfeng Liu, Jidong Suo, Xiaoming Liu, Bo Li","doi":"10.1109/ICITEC.2014.7105607","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105607","url":null,"abstract":"To detect small target in sea clutter, a method based on local backscattering amplitude prediction error is proposed in the paper. This approach builds on linear prediction: calculating the mean of the fourth power of prediction error of backscattering amplitude. By analyzing the IPIX radar datasets, it is found that the prediction error's mean and variance of the range bin containing a small target is much smaller than that of other range bins containing only sea clutter. The range bin, in which a small target is contained, gets smaller prediction error than those bins in which only pure sea clutter is occupied. Upon this point, we detect the small target in sea clutter with small amount of priori knowledge. The experimental results show that the proposed method can effectively detect small target in sea clutter with better performance.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123314216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Estimation of distribution algorithm for solving hybrid flow-shop scheduling problem 求解混合流水车间调度问题的分布估计算法
Xiaobing Liu, Xuan Jiao, Fengchao Zhang
{"title":"Estimation of distribution algorithm for solving hybrid flow-shop scheduling problem","authors":"Xiaobing Liu, Xuan Jiao, Fengchao Zhang","doi":"10.1109/ICITEC.2014.7105571","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105571","url":null,"abstract":"According to the characteristics of hybrid flow shop scheduling problem (HFSP), this paper designed encoding and decoding methods based on permutation, established a probability model to describe the problem solution space, and proposed a estimation of distribution algorithm (EDA) to solve the hybrid flow shop scheduling problem. The algorithm based on probabilistic models generates new individuals by random sampling methods and updates the probabilistic models based on the dominant population. Based on examples of numerical simulation and compared with the existing algorithm, the paper verified the effectiveness and robustness of the algorithm.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123256993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Research on end-user programming tool for pen-based e-form software 基于笔的电子表单软件终端用户编程工具的研究
Xiaochun Wang, Lin Zhu
{"title":"Research on end-user programming tool for pen-based e-form software","authors":"Xiaochun Wang, Lin Zhu","doi":"10.1109/ICITEC.2014.7105623","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105623","url":null,"abstract":"Pen-based e-form is the e-form software based on pen-based user interface. Because of the complexity of existing development tool and difficulty of implementing pen-based user interface, pen-based e-form only can be designed and implemented by the professional developers, which make it difficult to adapt to the changing user requirements. It is a good method to solve the above problem to develop a software programming tool which supports end users to design their own software. Therefore, the paper systemically searches the end-user programming tool for pen-based e-form software, and details its software structure and component. In the end, we develop the prototype system and analyze its end-user programming support degree.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125569396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local-SURF based 3D scene reconstruction for mobile robot 基于Local-SURF的移动机器人三维场景重建
Zhengrong Chen, Haofeng Zhang
{"title":"Local-SURF based 3D scene reconstruction for mobile robot","authors":"Zhengrong Chen, Haofeng Zhang","doi":"10.1109/ICITEC.2014.7105590","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105590","url":null,"abstract":"Traditional SURF based 3D reconstruction methods need to extract features on the whole image. Although this technique can provide rich and accurate environment information, however, it is too time consuming and not practical. To solve that problem, a local SURF based 3D reconstruction algorithm for mobile robot is proposed, which includes three main steps: first, the posture variations were captured from posture sensor and milemeter, and then the initial transition matrix was established; second, when finishing extracting features of the previous frame, searching areas were computed from the initial transition matrix and search radius; last, final transition matrix was computed according to the matching points. Experiments showed that the proposed algorithm did improve the speed of scene reconstruction while preserving precision, and moreover, our approach also can correct the posture variation of robot according to the matching results.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129433512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison of different variants of Restricted Boltzmann Machines 受限玻尔兹曼机不同变体的比较
Xiaowei Guo, H. Huang, Jason Zhang
{"title":"Comparison of different variants of Restricted Boltzmann Machines","authors":"Xiaowei Guo, H. Huang, Jason Zhang","doi":"10.1109/ICITEC.2014.7105610","DOIUrl":"https://doi.org/10.1109/ICITEC.2014.7105610","url":null,"abstract":"Restricted Boltzmann Machines (RBMs) have been developed for a lot of applications in the past few years, and many of its variants have also appeared. In this paper, RBM model and its learning algorithm with contrastive divergence algorithm will be introduced firstly. Then three important variants of RBM are presented in details, which are sparse RBM, discriminative RBM, and the Deep Boltzmann Machines (DBM). All the variants including original RBM are tested on MNIST handwriting digit dataset for classification task. Our empirical results demonstrate the advantage of RBM models and show that compared with other variants, the DBM is the best one in terms of the classification accuracy.","PeriodicalId":293382,"journal":{"name":"Proceedings of 2nd International Conference on Information Technology and Electronic Commerce","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125844226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信