{"title":"Parallelization and Optimization of Molecular Dynamics Simulation on Many Integrated Core","authors":"Qian Yin, Ruiyi Luo, Ping Guo","doi":"10.1109/CIS.2012.54","DOIUrl":"https://doi.org/10.1109/CIS.2012.54","url":null,"abstract":"Molecular dynamics (MD) simulations are useful in various areas. In this paper, we parallelize and optimize the grid-based MD algorithm on Many Integrated Core (MIC) Architecture. To get full play of the hardware and accelerate computation of MD simulation, we design the parallel structure using multi-threads with OpenMP. Also, various or method such as Array Notification, intrinsic and so on are used to vectorize the application according to the character of MIC for a higher performance. Due that multi-core is also a trendy of CPU and High Performance Computing, our method can be followed by other similar applications and provide a more choice.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cluster Synchronization of Complex Networks with Non-delayed and Delayed Coupling under Pinning Control","authors":"Ze Tang, Jianwen Feng, Yi Zhao","doi":"10.1109/CIS.2012.45","DOIUrl":"https://doi.org/10.1109/CIS.2012.45","url":null,"abstract":"In this paper, we focus on the cluster synchronization problem of a general network with non-delayed and delayed coupling. Based on the linear negative feedback control scheme, we use the Lyapunov stability theorem and linear matrix inequality (LMI) to obtain sufficient conditions which guarantee the realization of the cluster synchronization pattern for all initial values. Besides, numerical simulation is also given to support the validity of our theoretical results.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115395052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tianfei Wang, Bin Li, Jin Zou, Feng Sun, Zhihe Zhang
{"title":"New Bounds of the Nordhaus-Gaddum Type of the Laplacian Matrix of Graphs","authors":"Tianfei Wang, Bin Li, Jin Zou, Feng Sun, Zhihe Zhang","doi":"10.1109/CIS.2012.98","DOIUrl":"https://doi.org/10.1109/CIS.2012.98","url":null,"abstract":"The Laplacian matrix is the difference of the diagonal matrix of vertex degrees and the adjacency matrix of a graph G. In this paper, we first give two sharp upper bounds for the radius of the Laplacian spectrum of G in terms of the edge number, the vertex number, the largest degree, the second largest degree and the smallest degree of G by applying non-negative matrix theory and graph theory. Then, two upper bounds of the NordhausGaddum type are obtained for the sum of Laplacian spectral radius of a connected graph and its connected complement. Moreover, we determine all extremal graphs which achieve these upper bounds. Finally, one numerical example illustrate that our results are better than the existing results in some sense.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125271407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Image Hash Function Based on Polar Harmonic Transforms and Feature Selection","authors":"Yue-nan Li","doi":"10.1109/CIS.2012.100","DOIUrl":"https://doi.org/10.1109/CIS.2012.100","url":null,"abstract":"Robust hashing aims at representing the perceptual essence of media data in a compact manner, and it has been widely applied in content identification, copyright protection, content authentication, etc. In this paper, a robust hashing algorithm is proposed by incorporating the polar harmonic transforms and feature selection. The proposed hashing algorithm starts by preprocessing, where morphological operations are employed to disclose the principle structures of the input image. The polar harmonic transforms, which have shown promising results in pattern classification, are then exploited to produce candidate features for hash computation. In order to select the most robust and discriminative features, feature selections are applied on the candidate feature set via boosting algorithm. The hash string is finally generated by randomly permuting the quantization indexes of selected features. Experimental results reveal that the proposed work is both distortion-resistent and discriminative, and it can achieve higher content identification accuracy than the comparative algorithm.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121231620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Weak Filled Function Algorithm for Unconstrained Searching Optimization","authors":"Guiyu Li, Jiongcheng Li, Henghui Xiao, S. Ding","doi":"10.1109/CIS.2012.15","DOIUrl":"https://doi.org/10.1109/CIS.2012.15","url":null,"abstract":"Aiming at the optimization algorithm, weak filled function method is proposed and which with simple form is constructed. The restriction of this method is weaker than the known filled function method, thus it is easier to construct function and solve algorithm. The weak filled function method is feasible through the theoretical analysis, and the global minimum of simulation example can be obtained in its interval. The results indicate that weak filled function method is an effective method.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121284790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TV OS-SART with Fractional Order Integral Filtering","authors":"Ji Dong-Jiang, He Wen-zhang, Zou Xiao-bing","doi":"10.1109/CIS.2012.37","DOIUrl":"https://doi.org/10.1109/CIS.2012.37","url":null,"abstract":"Computed tomography (CT) is widely used in industrial nondestructive testing (NDT). The projection data of CT usually contain serious noises. In this situation, compared with conventional filtered back projection (FBP), total variation ordered subsets simultaneous algebraic reconstruction technique (TV-OS-SART) is a better reconstruction method. However, image noise will increase after some iterations while the image quality does not meet the requirement. In order to improve the quality of reconstructed image, for three dimensional cone-beam CT, a total variation ordered subsets simultaneous iterative reconstruction algorithm with fractional order integral is researched. Experimental results show that the proposed method has faster convergence speed.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116162224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One-round Tripartite Authenticated Batch-Keys Agreement Protocol from Paring","authors":"Wei Gao, Zhenyou Wang","doi":"10.1109/CIS.2012.118","DOIUrl":"https://doi.org/10.1109/CIS.2012.118","url":null,"abstract":"This paper presents a one-round tripartite authenticated key agreement protocol based on certification from Weil pairing. 27 different authenticated keys can be shared in a single run of the protocol. Their properties of security and efficiency are discussed.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126237686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Analysis of Several Chosen Ciphertext Secure Group-oriented Encryption Schemes","authors":"Xu An Wang, Jinting Nie, Wei Wang","doi":"10.1109/CIS.2012.120","DOIUrl":"https://doi.org/10.1109/CIS.2012.120","url":null,"abstract":"In Journal of Systems Engineering and Electronics, Maet al. proposed a broadcast group-oriented encryption secure against chosen cipher text attack scheme, later they proposed several other chosen cipher text secure group-oriented encryption schemes, based on this scheme, they also proposed a group-based proxy re-encryption scheme secure against chosen cipher text attack. However, in this paper we will show that these schemes are not chosen cipher text secure.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127049519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Niching Harmony Search Method for Multi-modal Optimization","authors":"X. Gao, Xiaolei Wang, K. Zenger, Xiaofeng Wang","doi":"10.1109/CIS.2012.13","DOIUrl":"https://doi.org/10.1109/CIS.2012.13","url":null,"abstract":"The Harmony Search (HS) method is an emerging meta-heuristic optimization algorithm. However, it is generally not so efficient in dealing with multi-modal optimization problems, in which instead of only a single optimum, multiple optima need to be found. In our paper, a novel HS method based on the niching technique (deterministic crowding), n-HS, is proposed and studied to overcome this shortcoming. A total of eight typical multi-modal optimization functions are used to demonstrate that the n-HS can successfully locate most of the global and local optima.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130382478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential Evolution Algorithm for the Optimization of the Vehicle Routing Problem in Logistics","authors":"Huan Xu, Jiechang Wen","doi":"10.1109/CIS.2012.19","DOIUrl":"https://doi.org/10.1109/CIS.2012.19","url":null,"abstract":"The unidirectional logistics distribution vehicle routing problem with no time windows is considered. It contains the vehicle capacity restriction, the longest distance restriction and the full loaded vehicle. The solution must ensure the non-full loaded factor is the least and the total distance is the shortest. A multi-objective optimization mathematical model for the problem is established. And the differential evolution algorithm is proposed for this problem. The optimal solutions to the model are obtained by selecting the appropriate encoding method. The results of simulation show that the differential evolution algorithm is an effective way for solving the vehicle routing problem.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133315904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}