2012 Eighth International Conference on Computational Intelligence and Security最新文献

筛选
英文 中文
Study of an RFID Based Object-Relationship Recognition System 基于RFID的物体关系识别系统研究
Tiancheng Zhang, Xiaonan Yu, D. Yue, Yu Gu, Ge Yu
{"title":"Study of an RFID Based Object-Relationship Recognition System","authors":"Tiancheng Zhang, Xiaonan Yu, D. Yue, Yu Gu, Ge Yu","doi":"10.1109/CIS.2012.87","DOIUrl":"https://doi.org/10.1109/CIS.2012.87","url":null,"abstract":"As an information of combining RFID and wireless data communication technologies, Internet of Things is making things all over the world connected. RFID (Radio Frequency Identification) technology is the most basic key technology in Internet of Things, which combines signal processing, wireless communication, embedded calculation and data management. RFID technology is being widely used in various areas, such as object tracking systems, supply chain management, quick disbursement and so on. Especially, deducing semantic relationships of objects in RFID applications has caught worldwide attention, such as inferring an event reminder \"somebody lost things\" according to the containment-relationship 1 of objects. However, there are rarely any concrete solutions applied to our practical life. In this paper, we study and implement an RFID based object-relationship recognition system to efficiently retrieve the group-relationship and containment-relationship between objects in real-time. Finally, we give a real scenario to implement our research.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125495785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Urban Water Consumption Forecast Based on QPSO-RBF Neural Network 基于QPSO-RBF神经网络的城市用水量预测
Xingtong Zhu, Bo Xu
{"title":"Urban Water Consumption Forecast Based on QPSO-RBF Neural Network","authors":"Xingtong Zhu, Bo Xu","doi":"10.1109/CIS.2012.59","DOIUrl":"https://doi.org/10.1109/CIS.2012.59","url":null,"abstract":"Accurate forecast of urban water consumption is the basis of urban water supply network planning and design, and provides a scientific basis for water production and scheduling. Because the convergence speed of RBF neural network and accuracy of urban water consumption forecast based on RBF neural network are too low, we proposed a new forecast method based on QPSO-RBF neural network. In this method, the parameters of RBF neural network are optimized by QPSO, and then used the QPSO-RBF neural network to forecast urban water daily consumption. The experimental results show that both convergence speed and accuracy of the proposed method are better than the method based on RBP and PSO-RBF neural network.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129132821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Ship CAE Modeling Based on Tribon XML File 基于Tribon XML文件的船舶CAE建模
P. Liu, Jian-Hai Jin
{"title":"Ship CAE Modeling Based on Tribon XML File","authors":"P. Liu, Jian-Hai Jin","doi":"10.1109/CIS.2012.101","DOIUrl":"https://doi.org/10.1109/CIS.2012.101","url":null,"abstract":"In order to solve the problem of CAD model and its property can not be transformed to CAE software, a method of model data transformation based on Tribon XML file is presented. First of all, the data of ship, block, panel, hole, stiffener, material and thickness are read, and then stored in a set of self-defined model data structure based on Tribon XML file. Finally, the model and its property are showed in CAE software. The method not only can transform the CAD model and its property data in Tribon automatically, but also can correct the data and simplify the model in the transformation process.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"60 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129572643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anti-jamming Scheme Based on Zero Pre-shared Secret in Cognitive Radio Network 基于零预共享秘密的认知无线网络抗干扰方案
Lu Zhang, Qingqi Pei, Hongning Li
{"title":"Anti-jamming Scheme Based on Zero Pre-shared Secret in Cognitive Radio Network","authors":"Lu Zhang, Qingqi Pei, Hongning Li","doi":"10.1109/CIS.2012.154","DOIUrl":"https://doi.org/10.1109/CIS.2012.154","url":null,"abstract":"Cognitive radio (CR) is a novel technology that promises to improve spectrum efficiency by allowing secondary users (SUs) to dynamically access spectrum without using by primary users. With offering great flexibility and software reconfigurability, unsecured CR can be easily manipulated to attack legacy users on both control and data channels. In this paper, we explore anti-jamming schemes based on zero pre-shared secret key on both control and data channels in cognitive radio networks (CRN). Because of the mobility and variation of users and spectrum, the method of traditional pre-shared secret keys is not applied to CRN. For control channel, we propose a scheme that can counter both external and internal jammers, which guarantees delivery of control information against any coalition of jammers. For data channel, we propose a scheme that uses cryptographically PN sequence to transmit message segments, which is efficient both in terms of resiliency against jammers and computation.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127557935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Kind of Nonlinear and Non-convex Optimization Problems under Mixed Fuzzy Relational Equations Constraints with Max-min and Max-average Composition 一类具有最大-最小和最大-平均组合的混合模糊关系方程约束下的非线性非凸优化问题
Shuang Feng, Yingqiu Ma, Jinquan Li
{"title":"A Kind of Nonlinear and Non-convex Optimization Problems under Mixed Fuzzy Relational Equations Constraints with Max-min and Max-average Composition","authors":"Shuang Feng, Yingqiu Ma, Jinquan Li","doi":"10.1109/CIS.2012.42","DOIUrl":"https://doi.org/10.1109/CIS.2012.42","url":null,"abstract":"In this paper, a kind of nonlinear and non-convex optimization problems under the constraints expressed by a system of mixed fuzzy relation equations with max-min and max-average composition is investigated. First, some properties of this kind of optimization problem are obtained. Then, a polynomial-time algorithm for this optimization problem is given based on these properties. Furthermore, we show that this algorithm is optimal for the considered optimization problem. Finally, numerical examples are provided to illustrate our algorithms.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121677778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On Synchronizability of Kleinberg Small World Networks Kleinberg小世界网络的同步性
Yi Zhao, Jianwen Feng, Jingyi Wang
{"title":"On Synchronizability of Kleinberg Small World Networks","authors":"Yi Zhao, Jianwen Feng, Jingyi Wang","doi":"10.1109/CIS.2012.53","DOIUrl":"https://doi.org/10.1109/CIS.2012.53","url":null,"abstract":"In this paper, the impact of edge-adding probability on both synchronizability and average path length of Klein berg small world networks is investigated. It could be seen from the analysis that two dimensional Klein berg small world networks have similar properties as NW small world networks but Klein berg small world network is more general, that is, the synchronizability becomes stronger as the edge-adding probability increases. Moreover, the average path length of Klein berg small world network decreases with the increasing edge-adding probability. And this phenomenon is verified by numerical simulations on a network of Lorenz oscillators. Then, it could be deduced from the phenomenon observed that compared with the small probabilities of longer distance of the edge-adding, the large probabilities of shorter distance of the edge-adding could achieve better synchronizability. This means the probabilities of the edge-adding play more important than the length of edge-adding to enhance the synchronizability of the small world network.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114165751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Algorithm to Estimate Mixing-Matrix of Underdetermined Blind Signal Separation 欠定盲信号分离混合矩阵估计新算法
Cui Zhi-tao, Jian Ke
{"title":"A New Algorithm to Estimate Mixing-Matrix of Underdetermined Blind Signal Separation","authors":"Cui Zhi-tao, Jian Ke","doi":"10.1109/CIS.2012.90","DOIUrl":"https://doi.org/10.1109/CIS.2012.90","url":null,"abstract":"The paper puts forward a new algorithm to estimate mixing-matrix according to the underdetermined blind signal separation of 3 observed signals and 4 sources. According to the geometric meaning of the SCA model, the paper analyzes the numerical feature of the observed signal and proves that the inner product under Euclidean space can be used to classify the observed signal in the situation. Besides, the paper gives a method for determining the number of source signal and introduces an estimation algorithm for mixing-matrix using inner products in the Euclidean space combined with the density of interval point. The algorithm can effectively identify the number of source signals and can realize the estimation of mixing-matrix. The experimental results show the algorithm is feasible.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131561751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scene Recognition via Combining Information of Neighbors 结合邻域信息的场景识别
Minguang Song, Ping Guo
{"title":"Scene Recognition via Combining Information of Neighbors","authors":"Minguang Song, Ping Guo","doi":"10.1109/CIS.2012.84","DOIUrl":"https://doi.org/10.1109/CIS.2012.84","url":null,"abstract":"Recently, spatial principal component analysis of census transform histograms (PACT) was proposed to recognize instance and categories of places or scenes in an image. When combining PACT with Local difference Magnitude Binary Pattern (LMBP), a new representation called Local Difference Binary Pattern (LDBP) was proposed and performed better. LDBP is based on the comparisons between center pixel and its neighboring pixels. However, the relationship among neighbor pixels is not considered. In this paper we proposed Local Neighbor Binary Pattern (LNBP) to utilize the relationship among neighboring pixels. LNBP provides complementary information regarding neighboring pixels for LDBP. We propose to combine LDBP with LNBP, and used a spatial representation for scene recognition. Experiments on two widely used dataset demonstrate the proposed method can improve the performance of recognition.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130984536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Data Recording in Seismic PSD Experiment 地震PSD实验数据记录的研究
Peng Sun, Xin Guo, Kang Chen, Zi-yan Wu
{"title":"Research on Data Recording in Seismic PSD Experiment","authors":"Peng Sun, Xin Guo, Kang Chen, Zi-yan Wu","doi":"10.1109/CIS.2012.55","DOIUrl":"https://doi.org/10.1109/CIS.2012.55","url":null,"abstract":"Civil Experimental System consists of electric-hydraulic servo-controlled machine and the data recorder in which the recorded data are saved. In Electro-hydraulic servo controller, a exterior trigger signal is used to remote control the data recorder working, and the problem of simultaneously data recording is solved by on-line processing of servo testing machine and data recorder, which quicken the test speed by making deliberately command and control. The example which is based on digital command control for pseudo-dynamic on-line test for hybrid structure of thermal power plant is described, by which the data recording simultaneously in pseudo-dynamic test achieved automatically. The research provides important reference value for the same type of on-line experiment.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114350005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D Model Retrieval Method Based on Single View 基于单视图的三维模型检索方法
Zhi Liu, Q. Chen, Xiang Pan, Yipan Feng
{"title":"3D Model Retrieval Method Based on Single View","authors":"Zhi Liu, Q. Chen, Xiang Pan, Yipan Feng","doi":"10.1109/CIS.2012.68","DOIUrl":"https://doi.org/10.1109/CIS.2012.68","url":null,"abstract":"In order to solve the view redundant problem in existing research work, we propose an approach based on a single view for 3D model shape feature measuring, and the similarity between models is calculated through dynamic programming algorithm. This method implements single view feature description and shape matching for 3D model. The algorithm is composed of three steps: Firstly, the pose of a 3D model is adjusted and the main view of the 3D model that best describes the profile features of the 3D model can be acquired by rendering. Then, through contour sampling of the rendered view, the model shape feature is described through extracting inner distance and inner angle. Finally, the similarity between different 3D models is calculated through dynamic programming algorithm. The experimental results show that the retrieval precision of the proposed method based on a single view is better than some traditional retrieval methods using 3D shape feature descriptor.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115095344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信