Qingpan Zhao, Qing Tian, Xinhong Hei, Yuchao Li, Zhaoxi Ma
{"title":"Toward Automatic Review of Bridge Template Turnover Based on Building Information Modeling","authors":"Qingpan Zhao, Qing Tian, Xinhong Hei, Yuchao Li, Zhaoxi Ma","doi":"10.1109/CIS.2017.00088","DOIUrl":"https://doi.org/10.1109/CIS.2017.00088","url":null,"abstract":"With the acceleration of the assembly process of the construction industry, the assembly degree of bridge engineering is also getting higher and higher. However, template turnover review of bridge engineering is a difficult and time-consuming task, and there is a lack of automated methods of reviewing the feasibility of template turnover. Therefore, according to the characteristics of the template turnover review, this paper proposes an automatic review model with the BIM (Building Information Model) technology system, to reduce the difficulty and time of the turnover review and improve the reliability of the examination results. Taking practical engineering as an example, the advantages and disadvantages are analyzed, and the feasibility of the method is proved. The results show that this method can realize the rapid and automatic review of the turnover scheme before the turnover process, and save a lot of time.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127295564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wuning Tong, Yuping Wang, Junkun Zhong, Weipeng P. Yan
{"title":"A New Weight Based Density Peaks Clustering Algorithm for Numerical and Categorical Data","authors":"Wuning Tong, Yuping Wang, Junkun Zhong, Weipeng P. Yan","doi":"10.1109/CIS.2017.00044","DOIUrl":"https://doi.org/10.1109/CIS.2017.00044","url":null,"abstract":"Discovering the potential group structure of objects is of crucial importance to data mining. Most of the existing clustering approaches are applicable only to purely numerical or categorical data, and only a few approaches can deal with both numerical and categorical attributes recently, however, these approaches often need higher computational cost. To cluster data with both numerical and categorical attributes efficiently, in this paper, we propose a new approach with the following schemes. First, a measure of the importance of each categorical attribute is designed and a method to generate the weight of each categorical attribute is proposed based on this measure. Then a unified distance metric is proposed by combining the distance for the numerical part and that for the categorical part with weights. Furthermore, combining the new weights into method in [1], an improved density peaks clustering algorithm is presented. Finally, the experimental results show the efficiency of the proposed approach.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"33 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120911591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Field Patterns in Circular-Shaped Microshield Lines","authors":"Hai Sun","doi":"10.1109/CIS.2017.00144","DOIUrl":"https://doi.org/10.1109/CIS.2017.00144","url":null,"abstract":"The edge-based finite element method is employed to analyze the field patterns in two types of circular-shaped microshield lines, which include circular-shaped microshield line with single signal line and dual signal lines. Field patterns of the dominant mode and the first higher-order mode for different dimensions and the dielectric constant of dielectric substrate are illustrated. The figures in this article are considered helpful in practical applications.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126643653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Kind of Knowledge Metadata Management Model Research Based on Semantic Grid","authors":"Chunyan Zhang, Yan Ma, Huili Hu, M. Ren","doi":"10.1109/CIS.2017.00064","DOIUrl":"https://doi.org/10.1109/CIS.2017.00064","url":null,"abstract":"Nowadays, Grid technology is a hot research topic. The application of grid technology to knowledge management can maximize the integration of existing resources. With the application of distributed management, the effective management of knowledge can change the current disorder of knowledge resources. Taking the LOM knowledge classification standard as the basis of the division of knowledge grid metadata community and according to the characteristics of grid management architecture, this paper constructs the grid community model based on knowledge resource metadata as the framework of knowledge management. This study discusses the construction of grid community. The internal structure of the community are the communicating system between communities, according to the characteristics of grid community.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126621675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extracting Company-Specific Keyphrases from News Media","authors":"Q. Pan, Ping Guo, Xin Xin, Junshuai Liu","doi":"10.1109/CIS.2017.00037","DOIUrl":"https://doi.org/10.1109/CIS.2017.00037","url":null,"abstract":"Recently, with rapid growth of news media in the Internet, it presents both challenges and opportunities. One challenge lies in how to automatically extract a small group of company-specific keyphrases from news media that can accurately describe a company. Company-specific keyphrase extraction is an ef cient way to mine information from the news article. There are mainly two kinds of approaches for keyphrase extraction: supervised and the unsupervised. In this paper, we propose entity-rank, a novel unsupervised model which is based PageRank and integrate it with the specific company entity information. The experiment result shows that our model has an improvement compared with several other baseline models.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128802757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Identifying Emotion Sentence Based on Fuzzy Information Granulation","authors":"Qiong Shen, Bin Gui, Jianlin Zhu","doi":"10.1109/CIS.2017.00033","DOIUrl":"https://doi.org/10.1109/CIS.2017.00033","url":null,"abstract":"We put forward a method based on fuzzy information granulation to solve the problem of identifying the emotional sentence. Firstly, the necessary work is carried out on the microblogging sentence training set, including the word segmentation, stop words and so on. The feature vector is constructed and the weight of the feature is calculated. The fuzzy granulation algorithm proposed by W. Pedrycz is improved, and finally the improved the fuzzy information granulation algorithm learns the classification model and verifies the performance of the classification model on the test set. The experiment shows that this method has good recognition performance.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132276151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DeepSense-Inception: Gait Identification from Inertial Sensors with Inception-like Architecture and Recurrent Network","authors":"Ha V. Hoang, M. Tran","doi":"10.1109/CIS.2017.00138","DOIUrl":"https://doi.org/10.1109/CIS.2017.00138","url":null,"abstract":"Gait recognition has been considered as a new promising approach for biometric-based authentication. Gait signals are commonly obtained by collecting motion data from inertial sensors (accelerometers, gyroscopes) integrated in mobile and wearable devices. Motion data is subsequently transformed to a feature space for recognition procedure. One fashionable, effective way to extract features automatically is using conventional Convolutional Neural Networks (CNN) as feature extractors. In this paper, we propose DeepSense-Inception (DSI), a new method inspired from DeepSense, to recognize users from their gait features using Inception-like modules for better feature extraction than conventional CNN. Experiments for user identification on UCI Human Activity Recognition dataset demonstrate that our method not only achieves an accuracy of 99.9%, higher than that of DeepSense (99.7%), but also uses only 149K parameters, less than one third of the parameters in DeepSense (529K parameters). Thus, our method can be implemented more efficiently in limited resource systems.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133283338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Implementation of Trojan Side-Channel with a Masking Scheme","authors":"Wenlin Meng, Wenfeng Zhu, Chi Zhang, Junrong Liu, Zheng Guo, Dawu Gu, Wei Fan, Haifeng Zhang, Yidong Yuan","doi":"10.1109/CIS.2017.00131","DOIUrl":"https://doi.org/10.1109/CIS.2017.00131","url":null,"abstract":"Hardware trojans have posed great threats to the security of cryptographic devices, due to their invisibility and difficulty of removal. Trojan side-channel (TSC) is a kind of hardware trojan which leaks side channel information of the secrets in the devices. In this article, we present a new implementation of TSC for FPGAs. In the experiments, to verify its feasibility, we analysis the leakage model of our TSC implementation on FPGAs. Moreover, to resist the TSC detection, we apply a masking technique to our scheme by blinding the output of our TSC.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124002333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Big-Data Based Data Mining Engine","authors":"Xinxin Huang, Shu Gong","doi":"10.1109/CIS.2017.00043","DOIUrl":"https://doi.org/10.1109/CIS.2017.00043","url":null,"abstract":"In order to solve the problem of data mining in big data, this paper studies the data mining engine based on big data. Using Spark as the engine core and programming model, some parallel data mining algorithms are designed and implemented, and an efficient data mining engine system is built. Therefore, the traditional data mining algorithms can run in parallel in the cluster environment, in which big data can be made better of use. Through the above work, a complete big data mining system is realized, which provides an efficient and easy-to-use tool for the implementation of data mining algorithms on big data sets.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127965789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Pricing Strategy of Manufacturer's Dual Channel under the Closed-Loop Supply Chain","authors":"Xiaohao Liang, Zuqing Huang","doi":"10.1109/CIS.2017.00098","DOIUrl":"https://doi.org/10.1109/CIS.2017.00098","url":null,"abstract":"This article focuses on the product pricing of manufacturer's dual channel under the closed-loop supply chain, which consists a single manufacturer and retailer. In this paper, we assume that the manufacturer is the market leader, and it sales the products through online and offline channels in the same time. All supply chain member's products prices are determined by recycling level and re-manufacturing capacity. Furthermore, we have calculated the best pricing strategy of products under the leadership of manufacturer for the market.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129118190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}