{"title":"Evidence and Trust: IoT Collaborative Security Mechanism","authors":"Bin Wen, Ziqiang Luo, Yazhi Wen","doi":"10.1109/ICIST.2018.8426148","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426148","url":null,"abstract":"The evidence has three properties including relevance, authenticity and legitimacy. For evidence, once implemented, it must not be tampered with and can always be traced back. For trust, the content can be forensics, so the relationship between each other is trustworthy and exchangeable value. Blockchain is a tamper-proof and unforgeable decentralized shared ledger that chunks data blocks chronologically into specific data structures and is cryptographically guaranteed. In this paper, we use the key technologies of blockchain to investigate and achieve collaborative security for IoT devices. This approach uses distributed crowd-sourcing to make tampering of critical data evidence (security). Combination of theoretical research and empirical validation, the paper tries to provide a technical operational and cost-effective solution for collaborative security with blockchain services and promoting the key data stability and self-healing ability.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123357240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel TOA-Based Source Localization Algorithm in Wireless Sensor Networks","authors":"R. Feng, Chenguang Li, Qiu Ran, Yinfeng Wu, N. Yu","doi":"10.1109/ICIST.2018.8426135","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426135","url":null,"abstract":"With great development of wireless sensor networks (WSNs) technology, one of its important applications, source localization, has attracted numerous interests of recent scientific researches. Among different kinds of methods, techniques based on time difference of arrival (TDOA) and time of arrival (TOA) are practical and of high accuracy. In consideration of TDOA-based methods' inherent noise correlation and loss in signal-to-noise ratio (SNR), this paper focuses on TOA-based source localization method in WSNs. We formulate the localization problem as a maximum-likelihood (ML) problem, and exploit the relationship between the emitting time constant of signal and the coordinate of source to remove the time constant in the ML function. Then the conjugate gradient method is utilized to obtain the final solution. Simulation results validate the convergence of the proposed algorithm and demonstrate its better performance than some existing TDOA based techniques.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124379224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy-Model-Based Output Feedback Controller Design for Discrete-Time Non-Affine Nonlinear Systems via Piecewise Lyapunov Functions","authors":"Wenqiang Ji, M. Wang, Jianbin Qiu","doi":"10.1109/ICIST.2018.8426064","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426064","url":null,"abstract":"A robust H∞ output-feedback (DOF) control method is proposed for discrete-time non-affine nonlinear systems based on Takagi-Sugeno (T-S) fuzzy models. On the basis of several convexification techniques and piecewise quadratic Lyapunov functions (PQLFs), sufficient conditions for the controller design are derived. A simulation example is presented to show the feasibility of the proposed method.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116589599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radio Tomographic Imaging with Feedback-Based Sparse Bayesian Learning","authors":"Zhen Wang, Hang Su, Xuemei Guo, Guoli Wang","doi":"10.1109/ICIST.2018.8426185","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426185","url":null,"abstract":"Radio tomographic imaging (RTI) provides an efficient method to realize device-free localization (DFL) which does not require the target to carry any tags or electronic devices. By the measurement of received signal strength (RSS) between node pairs in a wireless sensor network, the attenuation image caused by the target can be reconstructed. Subsequently, the target location can be extracted from the attenuation image. Sparse Bayesian learning (SBL) can be employed for reconstruction because of the sparseness of the attenuation image. However, the fast SBL degrades in reconstruction performances due to the inaccurate estimation on the noise hyper-parameters. To address this, this paper exploits a feedback-based fast SBL framework both for homogeneous-noise and heterogeneous-noise cases. Theoretical modeling and Bayesian inference procedure are given for this feedback-based framework. Finally, RTI experimental results from three different scenarios demonstrate the effectiveness of the proposed scheme.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130318701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Micro-Expression Recognition Based on Spatiotemporal Gabor Filters","authors":"ChenHan Lin, Fei Long, J. Huang, Jun Li","doi":"10.1109/ICIST.2018.8426088","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426088","url":null,"abstract":"For its wide range of applications in public security and psychotherapy, recognizing micro-expressions from facial image sequences has gain increasing attentions recently. Subtlety and short duration are major challenges for micro-expression recognition. In this paper, we propose a method for micro-expression recognition based on spatiotemporal Gabor filters. In preprocessing, for each video clip, the intensities of facial movements are first magnified by Eulerian video magnification (EVM), and then a sequence of frame difference is generated by subtracting a non-expression frame from all the frames in original video clip. Following that, we convolve a bank of spatiotemporal Gabor filters with the difference sequences, and the magnitudes of Gabor filter responses are used as features. The final features are fed up into a linear SVM for classification after spatiotemporal max pooling. The proposed method is evaluated on two micro-expression datasets, CASME2 and SMIC. Experimental results on CASME2 demonstrate the importance of preprocessing for micro-expression recognition. Furthermore, the proposed method achieves better recognition performance than some popular methods on both CASME2 and SMIC datasets, such as LBP-TOP and HOOF, in micro-expression recognition.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128303172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Event-Based Control for Discrete-Time Nonaffine Systems with Constrained Inputs","authors":"Mingming Ha, Ding Wang, Derong Liu, Bo Zhao","doi":"10.1109/ICIST.2018.8426093","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426093","url":null,"abstract":"This paper investigates an event-based controller for the near-optimal control policy of nonaffine discrete-time systems with constrained inputs. This algorithm is based on the dual heuristic dynamic programming (DHP) approach. In order to overcome the challenge which is generated by systems with control constraints, a useful nonquadratic performance index is introduced. Besides, the event-based control technique is employed to reduce the computational burden. Meanwhile, a Lyapunov stability analysis is elaborated to prove that the proposed control algorithm can asymptotically stabilize this type of systems. Moreover, we give the stablility condition and the design procedure of the event-based controller. Additionally, we apply three neural networks to realize the present algorithm. Finally, a numerical simulation is conducted to verify the feasibility and performance of the proposed control algorithm.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123755624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Table Transformation Rule Learner","authors":"Yongchi Su, Chunping Li, Shaoxu Song, Kenji Takao","doi":"10.1109/ICIST.2018.8426166","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426166","url":null,"abstract":"As we know, table data is a popular data form in industry and scientific research fields. However, sometimes the original table data could not meet updating requirements in real applications, so we need to convert them into required form. In this paper we propose an approach to learn the transformation rules that convert original table data to target form. Based on Inductive Logic Programming(ILP), we design a learning system called Table Transformation Rule Learner (TTRL). It uses specific predicates and background knowledge for this task to generate table transformation rules. We implement a unique heuristic function (HF) in TTRL to accelerate searching process for rule generation, and we use semi-supervised learning (SSL) in order to obtain more information especially from small set of sample data. We also address the problem like over-generalization which may occur when having only positive training examples in ILP learning process. We test our program in several kinds of table data, and the result shows that the transformation rules can be learned correctly. Moreover, our designed searching strategy can greatly reduce the time cost of searching rules.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130228956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Memristor-CMOS Hybrid Circuit for Classical Conditioning Reflex","authors":"Le Yang, Z. Zeng","doi":"10.1109/ICIST.2018.8426079","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426079","url":null,"abstract":"The imitation of classical conditioning reflex at circuit level is a significant procedure to achieve biology-like circuit systems. In order to realize the imitation, the important process are to imitate synaptic behaviors. As an emerging device, the memristor has some excellent properties like nonvolatility, adjustability, nanoscale. Therefore, it is an appropriate candidate to simulate the synaptic behavior in artificial neural network circuits. This paper presents a memristor-CMOS hybrid circuit to imitate classical conditioning reflex of aplysia californica. Besides, the proposed circuit can simulate additional forgetting stages that are activated by the single unconditional stimulus (US) or the single conditioned stimulus (CS) after the learning stage. The learning and forgetting stages can be described as: when US and CS are given to an aplysia californica together, it forms classical conditioning reflex through associative learning. Then, giving US or CS alone to the aplysia californica after the learning, it will forget the classical conditioning reflex gradually. The proposed circuit is simulated on PSPICE to demonstrate the effectiveness.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124394411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement of the Variable Universe of Discourse Control by Hammersley Sequence-Based TP Model Transformation","authors":"Guoliang Zhao, Wei Wu, Degang Wang","doi":"10.1109/ICIST.2018.8426173","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426173","url":null,"abstract":"The main results of the paper concern the enhanced tensor product model transformation-based variable universe of discourse controller (EHTPVUD) design, which uses Hammersley sampling method to generate hyper-cube grid for higher order singular value decomposition. Moreover, Hammersley sampling method-based parallel distributed compensation is also proposed as a comparison to the newly proposed variable universe of discourse controller. Error and error derivative are synthesized by the gains which are generated by Hammersley sampling method-based parallel distributed compensation. Then, EHTPVUD is designed based on the error universe of discourse and error derivative universe of discourse. Finally, EHTPVUD is tested by the gantry crane stabilization control problem and gantry crane tracking control problem.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115547640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dongcheng Peng, Tie-shan Li, Yang Wang, C. L. Philip Chen
{"title":"Research on Information Collection Method of Shipping Job Hunting Based on Web Crawler","authors":"Dongcheng Peng, Tie-shan Li, Yang Wang, C. L. Philip Chen","doi":"10.1109/ICIST.2018.8426183","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426183","url":null,"abstract":"In recent years, with the increasing development of Artificial Intelligence, Big Data and Cloud computing, etc., the information on the Internet has been booming, so how to obtain target information efficiently and quickly has become an urgent problem to be solved. This article aims at the data collection and acquisition problem of shipping job hunting information under the network environment. In this study, two kinds of information collection methods for shipping job hunting based on web crawler are proposed. Based on the Python standard libraries and Scrapy crawl framework, corresponding web crawler program is designed and implemented to scrape the target information from target website and store the collected data into local file eventually. Through the amount of data crawled and time consuming comparative analysis, the result demonstrates that the data collection method based on the Scrapy crawler framework is simple to operate, easily extensible, featuring being targeted, with high efficiency and fast speed in collecting shipping job hunting information. Fortunately, the collected data can not only help researchers conduct subsequent data mining analysis, but also can provide data support for the follow-up shipping job hunting information database.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115832200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}