2017 13th International Conference on Computational Intelligence and Security (CIS)最新文献

筛选
英文 中文
Toward Automatic Review of Bridge Template Turnover Based on Building Information Modeling 基于建筑信息模型的桥梁模板周转自动审核研究
Qingpan Zhao, Qing Tian, Xinhong Hei, Yuchao Li, Zhaoxi Ma
{"title":"Toward Automatic Review of Bridge Template Turnover Based on Building Information Modeling","authors":"Qingpan Zhao, Qing Tian, Xinhong Hei, Yuchao Li, Zhaoxi Ma","doi":"10.1109/CIS.2017.00088","DOIUrl":"https://doi.org/10.1109/CIS.2017.00088","url":null,"abstract":"With the acceleration of the assembly process of the construction industry, the assembly degree of bridge engineering is also getting higher and higher. However, template turnover review of bridge engineering is a difficult and time-consuming task, and there is a lack of automated methods of reviewing the feasibility of template turnover. Therefore, according to the characteristics of the template turnover review, this paper proposes an automatic review model with the BIM (Building Information Model) technology system, to reduce the difficulty and time of the turnover review and improve the reliability of the examination results. Taking practical engineering as an example, the advantages and disadvantages are analyzed, and the feasibility of the method is proved. The results show that this method can realize the rapid and automatic review of the turnover scheme before the turnover process, and save a lot of time.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127295564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Weight Based Density Peaks Clustering Algorithm for Numerical and Categorical Data 一种新的基于权值的密度峰聚类算法
Wuning Tong, Yuping Wang, Junkun Zhong, Weipeng P. Yan
{"title":"A New Weight Based Density Peaks Clustering Algorithm for Numerical and Categorical Data","authors":"Wuning Tong, Yuping Wang, Junkun Zhong, Weipeng P. Yan","doi":"10.1109/CIS.2017.00044","DOIUrl":"https://doi.org/10.1109/CIS.2017.00044","url":null,"abstract":"Discovering the potential group structure of objects is of crucial importance to data mining. Most of the existing clustering approaches are applicable only to purely numerical or categorical data, and only a few approaches can deal with both numerical and categorical attributes recently, however, these approaches often need higher computational cost. To cluster data with both numerical and categorical attributes efficiently, in this paper, we propose a new approach with the following schemes. First, a measure of the importance of each categorical attribute is designed and a method to generate the weight of each categorical attribute is proposed based on this measure. Then a unified distance metric is proposed by combining the distance for the numerical part and that for the categorical part with weights. Furthermore, combining the new weights into method in [1], an improved density peaks clustering algorithm is presented. Finally, the experimental results show the efficiency of the proposed approach.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"33 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120911591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Field Patterns in Circular-Shaped Microshield Lines 圆形微屏蔽线场模式的研究
Hai Sun
{"title":"Research on Field Patterns in Circular-Shaped Microshield Lines","authors":"Hai Sun","doi":"10.1109/CIS.2017.00144","DOIUrl":"https://doi.org/10.1109/CIS.2017.00144","url":null,"abstract":"The edge-based finite element method is employed to analyze the field patterns in two types of circular-shaped microshield lines, which include circular-shaped microshield line with single signal line and dual signal lines. Field patterns of the dominant mode and the first higher-order mode for different dimensions and the dielectric constant of dielectric substrate are illustrated. The figures in this article are considered helpful in practical applications.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126643653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Kind of Knowledge Metadata Management Model Research Based on Semantic Grid 一种基于语义网格的知识元数据管理模型研究
Chunyan Zhang, Yan Ma, Huili Hu, M. Ren
{"title":"A Kind of Knowledge Metadata Management Model Research Based on Semantic Grid","authors":"Chunyan Zhang, Yan Ma, Huili Hu, M. Ren","doi":"10.1109/CIS.2017.00064","DOIUrl":"https://doi.org/10.1109/CIS.2017.00064","url":null,"abstract":"Nowadays, Grid technology is a hot research topic. The application of grid technology to knowledge management can maximize the integration of existing resources. With the application of distributed management, the effective management of knowledge can change the current disorder of knowledge resources. Taking the LOM knowledge classification standard as the basis of the division of knowledge grid metadata community and according to the characteristics of grid management architecture, this paper constructs the grid community model based on knowledge resource metadata as the framework of knowledge management. This study discusses the construction of grid community. The internal structure of the community are the communicating system between communities, according to the characteristics of grid community.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126621675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extracting Company-Specific Keyphrases from News Media 从新闻媒体中提取公司特定的关键词
Q. Pan, Ping Guo, Xin Xin, Junshuai Liu
{"title":"Extracting Company-Specific Keyphrases from News Media","authors":"Q. Pan, Ping Guo, Xin Xin, Junshuai Liu","doi":"10.1109/CIS.2017.00037","DOIUrl":"https://doi.org/10.1109/CIS.2017.00037","url":null,"abstract":"Recently, with rapid growth of news media in the Internet, it presents both challenges and opportunities. One challenge lies in how to automatically extract a small group of company-specific keyphrases from news media that can accurately describe a company. Company-specific keyphrase extraction is an ef cient way to mine information from the news article. There are mainly two kinds of approaches for keyphrase extraction: supervised and the unsupervised. In this paper, we propose entity-rank, a novel unsupervised model which is based PageRank and integrate it with the specific company entity information. The experiment result shows that our model has an improvement compared with several other baseline models.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128802757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Identifying Emotion Sentence Based on Fuzzy Information Granulation 基于模糊信息粒化的情感句子识别研究
Qiong Shen, Bin Gui, Jianlin Zhu
{"title":"Research on Identifying Emotion Sentence Based on Fuzzy Information Granulation","authors":"Qiong Shen, Bin Gui, Jianlin Zhu","doi":"10.1109/CIS.2017.00033","DOIUrl":"https://doi.org/10.1109/CIS.2017.00033","url":null,"abstract":"We put forward a method based on fuzzy information granulation to solve the problem of identifying the emotional sentence. Firstly, the necessary work is carried out on the microblogging sentence training set, including the word segmentation, stop words and so on. The feature vector is constructed and the weight of the feature is calculated. The fuzzy granulation algorithm proposed by W. Pedrycz is improved, and finally the improved the fuzzy information granulation algorithm learns the classification model and verifies the performance of the classification model on the test set. The experiment shows that this method has good recognition performance.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132276151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeepSense-Inception: Gait Identification from Inertial Sensors with Inception-like Architecture and Recurrent Network 基于类初始结构和循环网络的惯性传感器步态识别
Ha V. Hoang, M. Tran
{"title":"DeepSense-Inception: Gait Identification from Inertial Sensors with Inception-like Architecture and Recurrent Network","authors":"Ha V. Hoang, M. Tran","doi":"10.1109/CIS.2017.00138","DOIUrl":"https://doi.org/10.1109/CIS.2017.00138","url":null,"abstract":"Gait recognition has been considered as a new promising approach for biometric-based authentication. Gait signals are commonly obtained by collecting motion data from inertial sensors (accelerometers, gyroscopes) integrated in mobile and wearable devices. Motion data is subsequently transformed to a feature space for recognition procedure. One fashionable, effective way to extract features automatically is using conventional Convolutional Neural Networks (CNN) as feature extractors. In this paper, we propose DeepSense-Inception (DSI), a new method inspired from DeepSense, to recognize users from their gait features using Inception-like modules for better feature extraction than conventional CNN. Experiments for user identification on UCI Human Activity Recognition dataset demonstrate that our method not only achieves an accuracy of 99.9%, higher than that of DeepSense (99.7%), but also uses only 149K parameters, less than one third of the parameters in DeepSense (529K parameters). Thus, our method can be implemented more efficiently in limited resource systems.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133283338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Implementation of Trojan Side-Channel with a Masking Scheme 基于屏蔽机制的木马侧信道实现
Wenlin Meng, Wenfeng Zhu, Chi Zhang, Junrong Liu, Zheng Guo, Dawu Gu, Wei Fan, Haifeng Zhang, Yidong Yuan
{"title":"An Implementation of Trojan Side-Channel with a Masking Scheme","authors":"Wenlin Meng, Wenfeng Zhu, Chi Zhang, Junrong Liu, Zheng Guo, Dawu Gu, Wei Fan, Haifeng Zhang, Yidong Yuan","doi":"10.1109/CIS.2017.00131","DOIUrl":"https://doi.org/10.1109/CIS.2017.00131","url":null,"abstract":"Hardware trojans have posed great threats to the security of cryptographic devices, due to their invisibility and difficulty of removal. Trojan side-channel (TSC) is a kind of hardware trojan which leaks side channel information of the secrets in the devices. In this article, we present a new implementation of TSC for FPGAs. In the experiments, to verify its feasibility, we analysis the leakage model of our TSC implementation on FPGAs. Moreover, to resist the TSC detection, we apply a masking technique to our scheme by blinding the output of our TSC.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124002333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Big-Data Based Data Mining Engine 基于大数据的数据挖掘引擎分析
Xinxin Huang, Shu Gong
{"title":"Analysis of Big-Data Based Data Mining Engine","authors":"Xinxin Huang, Shu Gong","doi":"10.1109/CIS.2017.00043","DOIUrl":"https://doi.org/10.1109/CIS.2017.00043","url":null,"abstract":"In order to solve the problem of data mining in big data, this paper studies the data mining engine based on big data. Using Spark as the engine core and programming model, some parallel data mining algorithms are designed and implemented, and an efficient data mining engine system is built. Therefore, the traditional data mining algorithms can run in parallel in the cluster environment, in which big data can be made better of use. Through the above work, a complete big data mining system is realized, which provides an efficient and easy-to-use tool for the implementation of data mining algorithms on big data sets.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127965789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the Pricing Strategy of Manufacturer's Dual Channel under the Closed-Loop Supply Chain 闭环供应链下制造商双渠道定价策略研究
Xiaohao Liang, Zuqing Huang
{"title":"Research on the Pricing Strategy of Manufacturer's Dual Channel under the Closed-Loop Supply Chain","authors":"Xiaohao Liang, Zuqing Huang","doi":"10.1109/CIS.2017.00098","DOIUrl":"https://doi.org/10.1109/CIS.2017.00098","url":null,"abstract":"This article focuses on the product pricing of manufacturer's dual channel under the closed-loop supply chain, which consists a single manufacturer and retailer. In this paper, we assume that the manufacturer is the market leader, and it sales the products through online and offline channels in the same time. All supply chain member's products prices are determined by recycling level and re-manufacturing capacity. Furthermore, we have calculated the best pricing strategy of products under the leadership of manufacturer for the market.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129118190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信