2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration最新文献

筛选
英文 中文
Identify Stack Overflow Exploits with Dynamic Binary Instrumentation 用动态二进制工具识别堆栈溢出漏洞
Quanchen Zou, Wei Huang, Jing An, Wenqing Fan
{"title":"Identify Stack Overflow Exploits with Dynamic Binary Instrumentation","authors":"Quanchen Zou, Wei Huang, Jing An, Wenqing Fan","doi":"10.1109/ICIICII.2015.147","DOIUrl":"https://doi.org/10.1109/ICIICII.2015.147","url":null,"abstract":"This paper describes DStack, a dynamic binary instrumentation tool for identifying overflows in stack frames in C and C++ programs. This technique is designed for detecting if a particular stack value, namely a return address, was corrupted because of a stack overflow. Thus, DStack is useful for identifying intrusion attempts but also for checking the run-time robustness of applications. We implemented a proof-of-concept tool based on Pin, a popular dynamic binary instrumentation framework. We have evaluated the tool on two real-world CVE vulnerability and the results shown that it can help identify the root causes of stack overflow effectively.","PeriodicalId":349920,"journal":{"name":"2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116407741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel DS-GMR Coupled Primitive for Robotic Motion Skill Learning 一种用于机器人运动技能学习的DS-GMR耦合原语
Jian Fu, Li Ning, Sujuan Wei, Liyan Zhang
{"title":"A Novel DS-GMR Coupled Primitive for Robotic Motion Skill Learning","authors":"Jian Fu, Li Ning, Sujuan Wei, Liyan Zhang","doi":"10.1109/ICIICII.2015.112","DOIUrl":"https://doi.org/10.1109/ICIICII.2015.112","url":null,"abstract":"Imitation learning is a promising paradigm for enabling robots to autonomously perform new tasks, which is similar to the procedure of human's motion skill acquirement. In the paper, we present a novel DS-GMR coupled primitive (DGCP) for robotic motion skill learning based on imitation learning. DGCP comprises a dominated linear ordinary differential dynamic component and a GMR based forcing component. Furthermore, we carefully design the linkage mechanism of hyper parameters to achieve spatiotemporal coupling synchronically. In this way an intelligent trajectory planning in similar scenario (fulfilling target within different time and positon) could be generated spontaneously. Finally, simulation that robot perform a trajectory planning with min-jerk criteria in various duration demonstrates practical capability and efficiency of the presented method.","PeriodicalId":349920,"journal":{"name":"2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126296197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hybrid Redundancy Fault Tolerant Codec in Distributed Storage System 分布式存储系统中的混合冗余容错编解码器
Qiao Sun, Ling Nie, Lei Sun, Lan-mei Fu, Jiasong Sun
{"title":"Hybrid Redundancy Fault Tolerant Codec in Distributed Storage System","authors":"Qiao Sun, Ling Nie, Lei Sun, Lan-mei Fu, Jiasong Sun","doi":"10.1109/ICIICII.2015.93","DOIUrl":"https://doi.org/10.1109/ICIICII.2015.93","url":null,"abstract":"Reed-Solomon erasure codes is the most widely used multi-binary codes which could correct the random errors and unexpected errors. Its characteristics include: It has the strongest capability to correct random errors and burst errors under the same coding redundancy and larger coding gain under the same coding efficiency, Secondly, it is close to the limit in the case of short codes and medium codes and it can greatly improve the performance of the error correction when it is combined with the data interleaving technology, Finally, it has strict algebraic structure which is shown as the linear cyclic polynomials. This paper develops a new merge approach of nonlinear self-repairing code and Reed-Solomon codes. When the network condition is good, Reed-Solomon erasure codes is adopted, and in poor network conditions, nonlinear self-repairing codes is used. The efficiency of maintaining redundant data is improved by a few of damaged information. The experiments show that this method can reduce the amount of network transmission data, at the same time it can shorten the amount data of recovery operation and reconstruction time.","PeriodicalId":349920,"journal":{"name":"2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121393015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prediction of Traffic Flow Based on Cellular Automaton 基于元胞自动机的交通流预测
J. Bao, W. Chen, Zheng-tao Xiang
{"title":"Prediction of Traffic Flow Based on Cellular Automaton","authors":"J. Bao, W. Chen, Zheng-tao Xiang","doi":"10.1109/ICIICII.2015.107","DOIUrl":"https://doi.org/10.1109/ICIICII.2015.107","url":null,"abstract":"Traffic flow forecasting is an important foundation for intelligent traffic system control and guidance, while microscopic traffic flow model plays an important role to reproduce the basic characteristics of traffic flow and to be an important part of traffic control. Based on the NS cellular automaton model, using grey model of Markov residual modification, and introducing the prediction theory of grey envelope, a new grey envelope prediction model has been established. Through simulation experiment, the predicted value of average speed of every minute has been obtained by the proposed model, and meanwhile compared with Kalman filtering model and traditional grey prediction, the results have shown that there is better precision in the proposed prediction model, which can solve problems of prediction accuracy, such as time series of strong randomness and volatile sequence.","PeriodicalId":349920,"journal":{"name":"2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131537270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research and Simulation of ADRC Based on the Heading of Unmanned Underwater Vehicle 基于航向的无人潜航器自抗扰控制器研究与仿真
Yao Zhang, Hejin Xiong
{"title":"Research and Simulation of ADRC Based on the Heading of Unmanned Underwater Vehicle","authors":"Yao Zhang, Hejin Xiong","doi":"10.1109/ICIICII.2015.123","DOIUrl":"https://doi.org/10.1109/ICIICII.2015.123","url":null,"abstract":"The navigation environment of unmanned underwater vehicle is becoming increasingly complex, thus the growing demand for complex tasks can't be meet by traditional PID controller and PI controller. Therefore ADRC algorithm is used to design the heading controller of unmanned underwater vehicle to replace the old PID controller and PI controller. The simulation result that the unmanned underwater vehicle using ADRC controller has significant advantages in speed, robustness, disturbance rejection and steering have been shown when the simulink in MATLAB have been used to compare ADRC controller with traditional controller. After comparing them, the ADRC controller can meet severe demands of unmanned underwater vehicle at present.","PeriodicalId":349920,"journal":{"name":"2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122867032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Adaboost Algorithm Based on Uncertain Functions 基于不确定函数的改进Adaboost算法
Xinqing Shu, Pan Wang
{"title":"An Improved Adaboost Algorithm Based on Uncertain Functions","authors":"Xinqing Shu, Pan Wang","doi":"10.1109/ICIICII.2015.117","DOIUrl":"https://doi.org/10.1109/ICIICII.2015.117","url":null,"abstract":"Boosting is one of the algorithms which can boost the accuracy of weak classifiers, and Adaboost has been widely and successfully applied to classification, detection and data mining problems. In this paper, a new method of calculating parameters, Adaboost-AC, which uses the accelerated good fitness function to acquire the weights of the weak classifiers is presented. The new algorithm is compared with the tradition Adaboost based on the UCI database and its promising performance is shown by the experimental results.","PeriodicalId":349920,"journal":{"name":"2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122818620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Method of the Feature Selection in Hierarchical Text Classification Based on the Category Discrimination and Position Information 一种基于类别识别和位置信息的分层文本分类特征选择方法
Jiapeng Song, Pengzhou Zhang, Sijun Qin, Junpeng Gong
{"title":"A Method of the Feature Selection in Hierarchical Text Classification Based on the Category Discrimination and Position Information","authors":"Jiapeng Song, Pengzhou Zhang, Sijun Qin, Junpeng Gong","doi":"10.1109/ICIICII.2015.116","DOIUrl":"https://doi.org/10.1109/ICIICII.2015.116","url":null,"abstract":"Feature dimension reduction is an important part in text categorization, and it even becomes more important for child classification in hierarchical text classification. It is presented that Chinese text feature selection method based on category distinction and feature location information in this paper. Experimental results show that the proposed method has a higher precision and recall rate than the others. Therefore the effect of the feature selection is better.","PeriodicalId":349920,"journal":{"name":"2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116394343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Research on and Realization of Interactive Wireless Monitoring and Management System of Processed Grain Based on Web3D 基于Web3D的加工粮食交互式无线监控管理系统的研究与实现
Huiling Zhou, Ke Han, Xin Wei
{"title":"Research on and Realization of Interactive Wireless Monitoring and Management System of Processed Grain Based on Web3D","authors":"Huiling Zhou, Ke Han, Xin Wei","doi":"10.1109/ICIICII.2015.131","DOIUrl":"https://doi.org/10.1109/ICIICII.2015.131","url":null,"abstract":"In order to improve fineness and visualization of processed grain storage monitoring and management process, this paper proposes and realizes an interactive monitoring system based on Web3D. With Web3D, database and user's instructions, the system can vividly achieve interactive three-dimensional virtual scene of processed grain storage monitoring, rendering scenes including the spatial location of grain and wireless sensor nodes, relevant storage and monitoring information, and wireless sensor network state information in real time dynamically. The system can also show the three-dimensional scene from multi-perspective realizing 3D visualization of monitoring process. In addition, the system provides a tool capable of combining the heat and mass transfer mathematical model of grain bulk with the actual measurement data from the backend storage to simulate the temperature and humidity field of processed grain in different colors in the three-dimensional monitoring scenario with view to help regulators accurately assess food safety status, and test the accuracy and compatibility of the heat and mass transfer mathematical model in actual storage applications. This system provides customizable 3D model library. By using the unified data interface and adding the appropriate 3D model, the user may establish environment monitoring systems applicable to storage of vegetables, fruits and medicine, etc. This new monitoring system will represent the development trend of storage monitoring system.","PeriodicalId":349920,"journal":{"name":"2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127968681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improvements and New Algorithms for Laterateion-Based Positioning and Fingerprinting-Based Positioning 基于侧向定位和基于指纹定位的改进与新算法
Min Li, Yutong Zhang, Yuxuan Zhang, Jiwei Liu
{"title":"Improvements and New Algorithms for Laterateion-Based Positioning and Fingerprinting-Based Positioning","authors":"Min Li, Yutong Zhang, Yuxuan Zhang, Jiwei Liu","doi":"10.1109/ICIICII.2015.129","DOIUrl":"https://doi.org/10.1109/ICIICII.2015.129","url":null,"abstract":"Distance measuring and fingerprinting are two popular position determination methods in indoor positioning. In this paper, implementing principles and steps of the two methods are deeply discussed, and improvements are proposed. To increase the reliability of lateration-based positioning, a new weighted centroid positioning algorithm of trilateration is proposed, and a new positioning method, the quadrilateration positioning method, is proposed based on that. In terms of the fingerprinting method, sparse representation is introduced to match fingerprints for the first time, and sparse representation is proved useful to guarantee the positioning accuracy when the wireless field intensity fluctuates. Experiment results are presented to verify the effectiveness of proposed algorithms.","PeriodicalId":349920,"journal":{"name":"2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123686282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Evolutionary Algorithm to Allocate Devices in Switched Industrial Ethernet 基于进化算法的交换工业以太网设备分配
Y. Y. Yuan, B. Y. Chen, H. Deng, L. Li
{"title":"Using Evolutionary Algorithm to Allocate Devices in Switched Industrial Ethernet","authors":"Y. Y. Yuan, B. Y. Chen, H. Deng, L. Li","doi":"10.1109/ICIICII.2015.106","DOIUrl":"https://doi.org/10.1109/ICIICII.2015.106","url":null,"abstract":"This paper aims at achieving the optimum allocation of communication load in switched industrial Ethernet. Optimization problem is formulated and two critical optimization indices together with the objective function are proposed. Then evolutionary algorithm is implemented to solve the multi-object problem. Simulation test shows that the performance of the proposed strategy is superior on all indices when compared with other three allocation strategies.","PeriodicalId":349920,"journal":{"name":"2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122767897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信