Tiancheng Zhang, Yifang Yin, D. Yue, Qian Ma, Ge Yu
{"title":"A Simulation Platform for RFID Application Deployment Supporting Multiple Scenarios","authors":"Tiancheng Zhang, Yifang Yin, D. Yue, Qian Ma, Ge Yu","doi":"10.1109/CIS.2012.132","DOIUrl":"https://doi.org/10.1109/CIS.2012.132","url":null,"abstract":"Radio Frequency Identification (RFID) poses multiple advantages over traditional barcodes, such as hands-off detection, longer read range and more data storage. In addition, the declining cost of RFID systems along with improved sensitivity and durability nowadays has increased its usage potential in a variety of domains such as logistical, planning and supply chain process. However, the deployment of RFID facilities in real-world scenario always takes time and money. Once some significant design weaknesses appear, the facilities must be deployed all over again. In this paper, we present an RFID simulation platform, RFIDSim, which supports users to build their own virtual scenario and deploy RFID facilities in it instead. This simulation platform, which relies on a discrete event simulator, is designed to implement part of ISO 18000-6C communication protocol and support path loss, backscatter, capture and tag mobility models. Besides, the reader models are programable by using a special language so that users can adjust the readers into different applications. All the data collected during the simulation would be stored in the database for users to judge if a certain deployment is fairly appropriate.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131793613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Kang, Haihua Xing, Shulei Wu, Juntao Chen, Jinmei Zhan
{"title":"Design of University Teacher's Files Management System","authors":"D. Kang, Haihua Xing, Shulei Wu, Juntao Chen, Jinmei Zhan","doi":"10.1109/CIS.2012.73","DOIUrl":"https://doi.org/10.1109/CIS.2012.73","url":null,"abstract":"Based on needs analysis of University Teacher's files management system, this paper proposed the construction content, goals and function set. It used the Visual Studio 2005 development platform, C # Programming Language, SQL Server 2005 database management system. In the design process, it applied modular management, iterative development, and realized a viable system ultimately that met the design requirements.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Osiris: A Malware Behavior Capturing System Implemented at Virtual Machine Monitor Layer","authors":"Ying Cao, Jiachen Liu, Qiguang Miao, Weisheng Li","doi":"10.1109/CIS.2012.126","DOIUrl":"https://doi.org/10.1109/CIS.2012.126","url":null,"abstract":"Capturing behavior of malware is one of the essential prerequisites for dynamic malware analysis. In this paper, we study and design a system called Osiris, which makes use of virtual machine technique to capture malware behavior. In particularly, we monitor Windows API calls invoked by the process under analysis (or target program) to rebuild its behaviors. The monitor is implemented at the virtual machine manager layer rather than inside the Guest OS, which is an innovation compared to other available methods. Qemu, an open-source system emulator, is used as the emulator component of Osiris. By modifying Qemu's translation process, an API analysis framework is inserted to intercept API calls. Besides this, Osiris also collects security relevant OS kernel data directly from virtual memory for further analysis. Osiris has advantages over previous systems in that it requires no complex analysis environment and does not interfere the execution of target programs. It overcomes the deficiencies previous ones employed that the information collected is incomplete and imprecise. These features make Osiris an ideal tool for automatic malware analysis. It can provide fine data for behavior-based malware detection.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"54 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123341966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preference-Based Evolutionary Multi-objective Optimization","authors":"Zhenhua Li, Hai-Lin Liu","doi":"10.1109/CIS.2012.24","DOIUrl":"https://doi.org/10.1109/CIS.2012.24","url":null,"abstract":"Evolutionary Multi-objective Optimization (EMO) approaches have been amply applied to find a representative set of Pareto-optimal solutions in the past decades. Although there are advantages of getting the range of each objective and the shape of the entire Pareto front for an adequate decision-making, the task of choosing a preferred set of Pareto-optimal solutions is also important. In this paper, we combine a preference-based strategy with an EMO methodology and demonstrate how, instead of one solution, a preferred set of solutions in the preferred range can be found. The basic idea is that each objective function corresponds to a marginal utility function, which indicates the decision-maker's preferred range for each objective. The corresponding utility function denotes the decision-maker's satisfaction. Such procedures will provide the decision-maker with a set of solutions near his preferred ranges so that a better and more reliable decision can be made.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130030438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Portfolio La-VaR Analysis Based on Copula-Kernel Model","authors":"Jianhui Yang, Bin Yang","doi":"10.1109/CIS.2012.102","DOIUrl":"https://doi.org/10.1109/CIS.2012.102","url":null,"abstract":"Traditional VaR method has many defects in measuring portfolio risk, this paper modifies BDSS model and gets revised BDSS model - La-VaR model based on relative price. For fitting the sequences of the rate of return and relative price, this paper adopts Gaussian-kernel function with good smoothness and Copula-kernel model to portray marginal distribution and correlation structure. Afterwards sequence of empirical distribution is produced through Monte Carlo simulation. The empirical results show that Copula-kernel model has a high accuracy in fitting sequences of the rate of return and relative price. Liquidity risk in La-VaR model is getting significant as the decrease of confidence c, but back testing shows that both VaR and La-VaR model overestimate the risk.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"175 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113987774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Stability of Uncertain Neutral Systems with Time-varying and Distributed Delays","authors":"Ruliang Wang, D.-J. Gao","doi":"10.1109/CIS.2012.66","DOIUrl":"https://doi.org/10.1109/CIS.2012.66","url":null,"abstract":"The robust stability of uncertain neutral systems with time-varying and distribute delays is investigated. The robust stability criterion is proposed based on Lyapunov-Krasovskii and free weight matrices methods, we derive a new stability criterion. Finally, the numerical example was given to illustrate the effectiveness of the method.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114682776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Epileptic EEG Signal Classification with ANFIS Based on Harmony Search Method","authors":"Jing Wang, X. Gao, J. Tanskanen, Ping Guo","doi":"10.1109/CIS.2012.159","DOIUrl":"https://doi.org/10.1109/CIS.2012.159","url":null,"abstract":"In this paper, the Adaptive Neuro-Fuzzy Inference System (ANFIS) is used for the classification of the epileptic electroencephalogram (EEG) signals. The ANFIS combines the adaptation capability of the neural networks and the fuzzy logic-based qualitative approach together. A given input/output data set is deployed to construct a fuzzy inference system, whose membership function parameters are trained using a back propagation algorithm in combination with a least squares method. However, the training method sometimes may lead to local optima. We here propose a new strategy of hybrid training algorithm based on the fusion of the ANFIS and Harmony Search (HS), HS-ANFIS, which is adopted to tune all the parameters of the ANFIS. The validity of our method is verified by numerical experiments.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"58 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134332386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Copyright Protection Scheme Based on JUNA Lightweight Digital Signatures","authors":"Hailin Hao, Shenghui Su","doi":"10.1109/CIS.2012.136","DOIUrl":"https://doi.org/10.1109/CIS.2012.136","url":null,"abstract":"With the swift development of computer network and digitalization technology, researches on the digital copyright protection becomes specially important. Images, texts, and common signatures are used as invisible watermarks in traditional digital copyright protection systems, which will lead to a complicated embedding process. In this paper, JUNA(Joint Unit for Numbering Algorithm) Lightweight Digital Signature is acted as a visible watermark and stacked on the lower right corner of the original work in a dominant way. So we needn't to consider the selection of embedded position. The scheme can simplify the process of the digital copyright protection, meanwhile, ensure the security of the system. The length of the signature is only 80 bits. After the signature is coded by 32-bit system, the length of which is only 16 characters. That means, in the digital copyright protection system, it can implement the requirement of lower space consumption, lower time consumption and lower cost. With the combination of cloud computing concept, the author proposes a digital copyright protection scheme based on JUNA Lightweight Digital Signature, builds a digital copyright protection model, and analyzes the performance of the scheme.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133086816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New TOPSIS with Triangular Fuzzy Number and Uncertain Weight Based on Cosines Similar Degree","authors":"Zhenghai Ai","doi":"10.1109/CIS.2012.12","DOIUrl":"https://doi.org/10.1109/CIS.2012.12","url":null,"abstract":"In order to study the interval multiple attribute decision making problem with triangular fussy number and uncertain weight, this paper presents a new method based on cosines similar degree. The detailed procedure of the proposed algorithm and numerical experiment are given. The proposed algorithm is also compared with an existed algorithm. Compared results show that the proposed algorithm are effective and rational.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129343283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ant Colony Algorithm for Waste Collection Vehicle Arc Routing Problem with Turn Constraints","authors":"Jie Liu, Yanfeng He","doi":"10.1109/CIS.2012.16","DOIUrl":"https://doi.org/10.1109/CIS.2012.16","url":null,"abstract":"A Waste Collection Arc Vehicle Routing Problem with turn constraints (WCAVRPTC) model is proposed to minimize the length of municipal solid waste (MSW) collection routes, which presents several characteristics derived from traffic regulations: some streets can be traversed crossed in only one direction, and some turns should be forbidden when the common angle is too narrow. The problem is transformed into a node routing ones and a clustering-based multiple ant colony system algorithm is described to address it. This algorithm possesses a set of new strategies to construct solutions, including clustering-based strategy, improved global pheromone update rule. The methodology is also applied to the urban waste collection problem in Shuangnan. The results of optimization indicate that the length of saving routes is 89984.96m and 92330.04m respectively with or without turns constrains constraints, which decreased by 31.1% and 31.9% respectively.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126035470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}