{"title":"Study of an RFID Based Object-Relationship Recognition System","authors":"Tiancheng Zhang, Xiaonan Yu, D. Yue, Yu Gu, Ge Yu","doi":"10.1109/CIS.2012.87","DOIUrl":"https://doi.org/10.1109/CIS.2012.87","url":null,"abstract":"As an information of combining RFID and wireless data communication technologies, Internet of Things is making things all over the world connected. RFID (Radio Frequency Identification) technology is the most basic key technology in Internet of Things, which combines signal processing, wireless communication, embedded calculation and data management. RFID technology is being widely used in various areas, such as object tracking systems, supply chain management, quick disbursement and so on. Especially, deducing semantic relationships of objects in RFID applications has caught worldwide attention, such as inferring an event reminder \"somebody lost things\" according to the containment-relationship 1 of objects. However, there are rarely any concrete solutions applied to our practical life. In this paper, we study and implement an RFID based object-relationship recognition system to efficiently retrieve the group-relationship and containment-relationship between objects in real-time. Finally, we give a real scenario to implement our research.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125495785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Urban Water Consumption Forecast Based on QPSO-RBF Neural Network","authors":"Xingtong Zhu, Bo Xu","doi":"10.1109/CIS.2012.59","DOIUrl":"https://doi.org/10.1109/CIS.2012.59","url":null,"abstract":"Accurate forecast of urban water consumption is the basis of urban water supply network planning and design, and provides a scientific basis for water production and scheduling. Because the convergence speed of RBF neural network and accuracy of urban water consumption forecast based on RBF neural network are too low, we proposed a new forecast method based on QPSO-RBF neural network. In this method, the parameters of RBF neural network are optimized by QPSO, and then used the QPSO-RBF neural network to forecast urban water daily consumption. The experimental results show that both convergence speed and accuracy of the proposed method are better than the method based on RBP and PSO-RBF neural network.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129132821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ship CAE Modeling Based on Tribon XML File","authors":"P. Liu, Jian-Hai Jin","doi":"10.1109/CIS.2012.101","DOIUrl":"https://doi.org/10.1109/CIS.2012.101","url":null,"abstract":"In order to solve the problem of CAD model and its property can not be transformed to CAE software, a method of model data transformation based on Tribon XML file is presented. First of all, the data of ship, block, panel, hole, stiffener, material and thickness are read, and then stored in a set of self-defined model data structure based on Tribon XML file. Finally, the model and its property are showed in CAE software. The method not only can transform the CAD model and its property data in Tribon automatically, but also can correct the data and simplify the model in the transformation process.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"60 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129572643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anti-jamming Scheme Based on Zero Pre-shared Secret in Cognitive Radio Network","authors":"Lu Zhang, Qingqi Pei, Hongning Li","doi":"10.1109/CIS.2012.154","DOIUrl":"https://doi.org/10.1109/CIS.2012.154","url":null,"abstract":"Cognitive radio (CR) is a novel technology that promises to improve spectrum efficiency by allowing secondary users (SUs) to dynamically access spectrum without using by primary users. With offering great flexibility and software reconfigurability, unsecured CR can be easily manipulated to attack legacy users on both control and data channels. In this paper, we explore anti-jamming schemes based on zero pre-shared secret key on both control and data channels in cognitive radio networks (CRN). Because of the mobility and variation of users and spectrum, the method of traditional pre-shared secret keys is not applied to CRN. For control channel, we propose a scheme that can counter both external and internal jammers, which guarantees delivery of control information against any coalition of jammers. For data channel, we propose a scheme that uses cryptographically PN sequence to transmit message segments, which is efficient both in terms of resiliency against jammers and computation.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127557935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Kind of Nonlinear and Non-convex Optimization Problems under Mixed Fuzzy Relational Equations Constraints with Max-min and Max-average Composition","authors":"Shuang Feng, Yingqiu Ma, Jinquan Li","doi":"10.1109/CIS.2012.42","DOIUrl":"https://doi.org/10.1109/CIS.2012.42","url":null,"abstract":"In this paper, a kind of nonlinear and non-convex optimization problems under the constraints expressed by a system of mixed fuzzy relation equations with max-min and max-average composition is investigated. First, some properties of this kind of optimization problem are obtained. Then, a polynomial-time algorithm for this optimization problem is given based on these properties. Furthermore, we show that this algorithm is optimal for the considered optimization problem. Finally, numerical examples are provided to illustrate our algorithms.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121677778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Synchronizability of Kleinberg Small World Networks","authors":"Yi Zhao, Jianwen Feng, Jingyi Wang","doi":"10.1109/CIS.2012.53","DOIUrl":"https://doi.org/10.1109/CIS.2012.53","url":null,"abstract":"In this paper, the impact of edge-adding probability on both synchronizability and average path length of Klein berg small world networks is investigated. It could be seen from the analysis that two dimensional Klein berg small world networks have similar properties as NW small world networks but Klein berg small world network is more general, that is, the synchronizability becomes stronger as the edge-adding probability increases. Moreover, the average path length of Klein berg small world network decreases with the increasing edge-adding probability. And this phenomenon is verified by numerical simulations on a network of Lorenz oscillators. Then, it could be deduced from the phenomenon observed that compared with the small probabilities of longer distance of the edge-adding, the large probabilities of shorter distance of the edge-adding could achieve better synchronizability. This means the probabilities of the edge-adding play more important than the length of edge-adding to enhance the synchronizability of the small world network.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114165751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Algorithm to Estimate Mixing-Matrix of Underdetermined Blind Signal Separation","authors":"Cui Zhi-tao, Jian Ke","doi":"10.1109/CIS.2012.90","DOIUrl":"https://doi.org/10.1109/CIS.2012.90","url":null,"abstract":"The paper puts forward a new algorithm to estimate mixing-matrix according to the underdetermined blind signal separation of 3 observed signals and 4 sources. According to the geometric meaning of the SCA model, the paper analyzes the numerical feature of the observed signal and proves that the inner product under Euclidean space can be used to classify the observed signal in the situation. Besides, the paper gives a method for determining the number of source signal and introduces an estimation algorithm for mixing-matrix using inner products in the Euclidean space combined with the density of interval point. The algorithm can effectively identify the number of source signals and can realize the estimation of mixing-matrix. The experimental results show the algorithm is feasible.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131561751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scene Recognition via Combining Information of Neighbors","authors":"Minguang Song, Ping Guo","doi":"10.1109/CIS.2012.84","DOIUrl":"https://doi.org/10.1109/CIS.2012.84","url":null,"abstract":"Recently, spatial principal component analysis of census transform histograms (PACT) was proposed to recognize instance and categories of places or scenes in an image. When combining PACT with Local difference Magnitude Binary Pattern (LMBP), a new representation called Local Difference Binary Pattern (LDBP) was proposed and performed better. LDBP is based on the comparisons between center pixel and its neighboring pixels. However, the relationship among neighbor pixels is not considered. In this paper we proposed Local Neighbor Binary Pattern (LNBP) to utilize the relationship among neighboring pixels. LNBP provides complementary information regarding neighboring pixels for LDBP. We propose to combine LDBP with LNBP, and used a spatial representation for scene recognition. Experiments on two widely used dataset demonstrate the proposed method can improve the performance of recognition.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130984536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Data Recording in Seismic PSD Experiment","authors":"Peng Sun, Xin Guo, Kang Chen, Zi-yan Wu","doi":"10.1109/CIS.2012.55","DOIUrl":"https://doi.org/10.1109/CIS.2012.55","url":null,"abstract":"Civil Experimental System consists of electric-hydraulic servo-controlled machine and the data recorder in which the recorded data are saved. In Electro-hydraulic servo controller, a exterior trigger signal is used to remote control the data recorder working, and the problem of simultaneously data recording is solved by on-line processing of servo testing machine and data recorder, which quicken the test speed by making deliberately command and control. The example which is based on digital command control for pseudo-dynamic on-line test for hybrid structure of thermal power plant is described, by which the data recording simultaneously in pseudo-dynamic test achieved automatically. The research provides important reference value for the same type of on-line experiment.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114350005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3D Model Retrieval Method Based on Single View","authors":"Zhi Liu, Q. Chen, Xiang Pan, Yipan Feng","doi":"10.1109/CIS.2012.68","DOIUrl":"https://doi.org/10.1109/CIS.2012.68","url":null,"abstract":"In order to solve the view redundant problem in existing research work, we propose an approach based on a single view for 3D model shape feature measuring, and the similarity between models is calculated through dynamic programming algorithm. This method implements single view feature description and shape matching for 3D model. The algorithm is composed of three steps: Firstly, the pose of a 3D model is adjusted and the main view of the 3D model that best describes the profile features of the 3D model can be acquired by rendering. Then, through contour sampling of the rendered view, the model shape feature is described through extracting inner distance and inner angle. Finally, the similarity between different 3D models is calculated through dynamic programming algorithm. The experimental results show that the retrieval precision of the proposed method based on a single view is better than some traditional retrieval methods using 3D shape feature descriptor.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115095344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}