ICCKE 2013最新文献

筛选
英文 中文
Optimal tuning of Brain Emotional Learning Based Intelligent Controller using Clonal Selection Algorithm 基于克隆选择算法的脑情绪学习智能控制器优化调谐
ICCKE 2013 Pub Date : 2013-12-16 DOI: 10.1109/ICCKE.2013.6682810
M. Jafari, Alireza Mohammad shahri, S. H. Elyas
{"title":"Optimal tuning of Brain Emotional Learning Based Intelligent Controller using Clonal Selection Algorithm","authors":"M. Jafari, Alireza Mohammad shahri, S. H. Elyas","doi":"10.1109/ICCKE.2013.6682810","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682810","url":null,"abstract":"In this paper, an optimal parameter assignment methodology for intelligent controller based on computational model of emotional learning in mammalian brain is presented. Brain Emotional Learning Based Intelligent Controller (BELBIC) is an intelligent controller based on emotional learning process in mammalian limbic system. The proposed controller has been applied to control a single link flexible joint manipulator. In this paper, the CLONAL Selection Algorithm is utilized to obtain superior controller parameters in order to minimize Rise time, Settling time and Overshoot.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116692665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Scheduling hard real-time tasks on multi-core using intelligent rate-monotonic 基于智能速率单调的多核硬实时任务调度
ICCKE 2013 Pub Date : 2013-12-16 DOI: 10.1109/ICCKE.2013.6682836
Amin Rezaeian, Mahmoud Naghibzadeh, Peyman Neamatollahi
{"title":"Scheduling hard real-time tasks on multi-core using intelligent rate-monotonic","authors":"Amin Rezaeian, Mahmoud Naghibzadeh, Peyman Neamatollahi","doi":"10.1109/ICCKE.2013.6682836","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682836","url":null,"abstract":"Recently, researchers have applied semi-partitioned approaches to improve performance of hard real-time scheduling algorithms in multiprocessor architectures. RMLS is one of these methods. However, advantages of using semi-partitioned methods are often limited by well-known scheduling algorithms such as RM and EDF, which the former is simple but inefficient and the latter is efficient but has high processing overhead. There is an intelligent algorithm working on uniprocessor named IRM which takes advantages of both RM and EDF algorithms using that we present a new method called intelligent rate-monotonic least splitting to improve RMLS. Experimental results show that the proposed algorithm outperforms many other algorithms in literature in terms of processor utilization.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124910908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A low complexity and high speed gradient descent based secure localization in Wireless Sensor Networks 基于低复杂度和高速梯度下降的无线传感器网络安全定位
ICCKE 2013 Pub Date : 2013-12-16 DOI: 10.1109/ICCKE.2013.6682841
Mostafa Mofarreh-Bonab, S. Ghorashi
{"title":"A low complexity and high speed gradient descent based secure localization in Wireless Sensor Networks","authors":"Mostafa Mofarreh-Bonab, S. Ghorashi","doi":"10.1109/ICCKE.2013.6682841","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682841","url":null,"abstract":"In many applications of Wireless Sensor Networks (WSNs) such as monitoring applications or routing, localization is one of the important issues that affect directly the network quality of operation. Secure localization in WSNs needs to detect malicious nodes and exclude them in order to avoid deception by attackers. Accurate and appropriate methods that are usually iterative algorithms such as gradient descent, least median square (LMdS) and voting based secure localization have been introduced in the recent literature. Gradient descent based secure localization has better performance in terms of convergence speed and accuracy while have the minimum complexity compared to the other methods, however, still more convergence speed is needed for real-time applications. In this paper, a new gradient based method has been introduced which has higher convergence speed among all existing algorithms and the probability of fault for this algorithm is less than other algorithms. The other advantage of the proposed method is its low complexity in comparison to the other methods and its capability to be implemented in hardware. Simulation results show that the introduced algorithm's convergence speed is about 10 times more than the gradient descent algorithm with same localization error.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129938905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Immunization of complex networks using stochastic hill-climbing algorithm 基于随机爬坡算法的复杂网络免疫
ICCKE 2013 Pub Date : 2013-12-16 DOI: 10.1109/ICCKE.2013.6682858
Bita Shams, M. Khansari
{"title":"Immunization of complex networks using stochastic hill-climbing algorithm","authors":"Bita Shams, M. Khansari","doi":"10.1109/ICCKE.2013.6682858","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682858","url":null,"abstract":"Recently, there is a growing interest in how to mitigate epidemic spreading through complex networks such as infection propagation in population, rumor spreading in social interaction, and, malicious attacks in computer networks. Due to high cost and limitation of immunization resources, a well-established strategy is required to select whom to inoculate. In this paper, we propose a new immunization strategy based on stochastic hill-climbing algorithm to find a subset of nodes whose immunization efficiently reduce the network vulnerability to worst-case epidemic size. Our experiments show that SHCI shows up to 31% improvement in real networks and up to 89% in model networks compared to targeted immunization algorithms which immunize nodes based on their centrality.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128738980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Fuzzy high-order sliding-mode control of blood glucose concentration 模糊高阶滑模控制血糖浓度
ICCKE 2013 Pub Date : 2013-12-16 DOI: 10.1109/ICCKE.2013.6682818
Soudabeh Taghian Dinani, M. Zekri, B. Nazari
{"title":"Fuzzy high-order sliding-mode control of blood glucose concentration","authors":"Soudabeh Taghian Dinani, M. Zekri, B. Nazari","doi":"10.1109/ICCKE.2013.6682818","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682818","url":null,"abstract":"This paper represents a fuzzy high-order sliding-mode (F-HOSM) controller in order to regulate blood glucose concentration in type 1 diabetics. This method uses merits of both fuzzy concept and high-order sliding-mode control so that not only the blood glucose level can be efficiently controlled, but also the amount of chattering in control effort will be significantly alleviated. Moreover the amount of control effort will decrease to its half in comparison to that in HOSM controller leading to a less risk of hypoglycemia, which is the most dangerous phenomenon in controlling the blood glucose level of diabetics. The efficiency of the proposed controller is validated by computer simulation. This controller is used to regulate the blood glucose level in a well-known diabetic model called minimal model.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121150514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Parasitic-aware Optimization of a 2.4GHz Cross-Coupled LC VCO using IPO compared to PSO 2.4GHz交叉耦合LC压控振荡器的寄生感知优化
ICCKE 2013 Pub Date : 2013-12-16 DOI: 10.1109/ICCKE.2013.6682812
M. Vakili, S. Zahiri
{"title":"Parasitic-aware Optimization of a 2.4GHz Cross-Coupled LC VCO using IPO compared to PSO","authors":"M. Vakili, S. Zahiri","doi":"10.1109/ICCKE.2013.6682812","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682812","url":null,"abstract":"A parasitic aware radio frequency computer aided design (RF CAD) tool based on an Inclined Planes system Optimization algorithm (IPO) is introduced. Also, in comparison to IPO, RF CAD tool was implemented with Particle Swarm Optimization algorithm (PSO). This CAD tool optimizes three structures of Cross-Coupled LC voltage controlled oscillator (LC VCOs) (i.e. CMOS alone, NMOS alone, PMOS alone VCOs) for 2.4GHz central frequency based on IEEE 802.11 in a commercial 0.18um RF CMOS technology, simultaneously. Parasitic aware RF CAD tool casts RF circuit synthesis as weighted multi-objective optimization quandary. Two major objectives fitness (i.e. phase noise and power consumption) are evaluated by harmonic balance (HB) analysis in HSPICE RF. Then results are sent to optimization core which is implemented in MATLAB. At the end, this CAD tool presents optimal parameters for final design.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116333133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Pasokh: A standard corpus for the evaluation of Persian text summarizers 一个标准语料库,用于评估波斯语文本摘要器
ICCKE 2013 Pub Date : 2013-12-16 DOI: 10.1109/ICCKE.2013.6682873
Behdad Behmadi Moghaddas, M. Kahani, Seyyed Ahmad Toosi, Asef Pourmasoumi, Ahmad Estiri
{"title":"Pasokh: A standard corpus for the evaluation of Persian text summarizers","authors":"Behdad Behmadi Moghaddas, M. Kahani, Seyyed Ahmad Toosi, Asef Pourmasoumi, Ahmad Estiri","doi":"10.1109/ICCKE.2013.6682873","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682873","url":null,"abstract":"The increasingly vast amount of information, particularly on the Web, has resulted in a profound need for automatic summarization systems. The systems, in turn, need to be evaluated in terms of how desirably they can retrieve information. The evaluation is done by comparing the machine summaries against a standard reference corpus containing a reasonably large number of text sources and the summaries that human beings have made out of them. Due to the lack of such a standard corpus for Persian, the summarizers that were developed used to be evaluated against the small corpora constructed by the developers of the proposed systems. This made the systems non-comparable. Thus, Pasokh was constructed as a standard large enough reference corpus. It took over 2000 man-hours of work.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131162124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Feature selection using modified imperialist competitive algorithm 利用改进的帝国主义竞争算法进行特征选择
ICCKE 2013 Pub Date : 2013-12-16 DOI: 10.1109/ICCKE.2013.6682833
S. J. Mousavirad, H. Ebrahimpour-Komleh
{"title":"Feature selection using modified imperialist competitive algorithm","authors":"S. J. Mousavirad, H. Ebrahimpour-Komleh","doi":"10.1109/ICCKE.2013.6682833","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682833","url":null,"abstract":"Feature selection process is one of the main steps in data mining and knowledge discovery. Feature selection is a process to remove redundant and irreverent features without reducing the classification accuracy. This paper tries to select the best features set using imperialist competitive algorithm. Imperialist competitive algorithm is a novel population based algorithm which is inspired sociopolitical process of imperialist competition. In this paper, a modified imperialist competitive algorithm is presented and then this proposed algorithm is applied to feature selection process. To verify the effectiveness of the proposed approach, experiments carried out on some datasets. Results showed the features set selected by the imperialist competitive algorithm provide the better classification performance compared to the other methods.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133809664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
VHDLSFI: A simulation-based multi-bit fault injection for dependability analysis VHDLSFI:基于仿真的多比特故障注入可靠性分析方法
ICCKE 2013 Pub Date : 2013-12-16 DOI: 10.1109/ICCKE.2013.6682846
Faezeh Pournaghdali, Amir Rajabzadeh, M. Ahmadi
{"title":"VHDLSFI: A simulation-based multi-bit fault injection for dependability analysis","authors":"Faezeh Pournaghdali, Amir Rajabzadeh, M. Ahmadi","doi":"10.1109/ICCKE.2013.6682846","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682846","url":null,"abstract":"Decreasing technology sizing makes the CMOS devices more error prone to alpha particles and cosmic radiation. Therefore, the probability of occurring multi faults in such devices is increasing. This paper presents a simulation-based multi-bit fault injection tool, named VHDLSFI, aiming at conducting multi-bit fault injection campaign to analyze the dependability of digital systems modeled by VHDL description language. This fault injection tool utilizes the Force and Release statements which are features in the VHDL 2008 standard to inject transient and permanent single and multi-bit faults. Different fault models are developed using force and release statements. A VHDL model of DP32 processor is evaluated by this fault injection tool to demonstrate its functionality. A total of 2000 single faults and 7000 double faults have been injected into the ALU, Register File, General Registers, and different Buses in the processor using VHDLSFI fault injection tool. Only one single or one double fault is injected in each run. The results show that the percentages of errors propagation vary between 7% and 89% depending on single or double faults, the different workload programs, and location of the injected faults in the processor. The error propagation latency is much lower when the double faults in injected in DP32 processor.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115425659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A novel reputation system to detect DGA-based botnets 一种检测基于dga的僵尸网络的新型信誉系统
ICCKE 2013 Pub Date : 2013-12-16 DOI: 10.1109/ICCKE.2013.6682860
Reza Sharifnya, M. Abadi
{"title":"A novel reputation system to detect DGA-based botnets","authors":"Reza Sharifnya, M. Abadi","doi":"10.1109/ICCKE.2013.6682860","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682860","url":null,"abstract":"A botnet is a network of compromised hosts (bots) remotely controlled by a so-called bot herder through one or more command and control (C&C) servers. New generation botnets, such as Conficker and Murofet, tend to use a form of domain fluxing for command and control. Each domain fluxing bot generates a list of domain names using a domain name generation algorithm (DGA) and queries each of them until one of them is resolved to a C&C server. Since the bot herder registers only a few of these domain names, the domain fluxing bots generate many failed DNS queries. Even though some efforts have been focused on the detection of DGA-based botnets, but none of them consider the history of suspicious activities. This makes the detection system has a potentially high false alarm rate. In this paper, we propose a novel reputation system to detect DGA-based botnets. Our main goal is to automatically assign a high negative reputation score to each host that is involved in suspicious bot activities. To achieve this goal, we first choose DNS queries with similar characteristics at the end of each time window. We then identify hosts that algorithmically generated a large set of suspicious domain names and add them to a so-called suspicious group activity matrix. We also identify hosts with high numbers of failed DNS queries and add them to a so called suspicious failure matrix. We finally calculate the negative reputation score of each host in these two matrices and detect hosts with high negative reputation scores as bot-infected. We evaluate our reputation system using DNS queries collected from the campus network. The experimental results show that it can successfully detect DGA-based botnets with a high detection rate and a low false alarm rate while providing real-time monitoring in large-scale networks.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129654212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信