2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)最新文献

筛选
英文 中文
Research on relay node placement algorithm based on its capacity limitation in WSN 基于容量限制的WSN中继节点布局算法研究
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965482
Shouqiang Wang, Zengxiao Chi, S. Zhang
{"title":"Research on relay node placement algorithm based on its capacity limitation in WSN","authors":"Shouqiang Wang, Zengxiao Chi, S. Zhang","doi":"10.1109/SPAC46244.2018.8965482","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965482","url":null,"abstract":"Energy consumption problem is one of the key issues in Wireless Sensor Network (WSN). Usually sensor nodes are far from one or more sink nodes. In such a case, it calls for deploying some relay nodes as the interval nodes to transmit data from sensor nodes to sink nodes. A relay node placement algorithm in two-tiered WSN model is proposed in this thesis. This algorithm first constructs an optimum spanning tree for unlimited number of relay nodes. Then, a greedy strategy was put forward to remove some relay nodes from the tree. Under the restriction that each relay node must satisfy its communication capacity limitation, the greedy strategy aims to minimize the total energy consumption to prolong the lifetime of whole network.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125534080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Competition Code And LBP Palm Vein Feature-Level Fusion Using Canonical Correlation Analysis 基于典型相关分析的竞争码与LBP掌静脉特征级融合
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965461
Xiyu Wang, Hengjian Li, Jian Qiu, Changzhi Yu
{"title":"Competition Code And LBP Palm Vein Feature-Level Fusion Using Canonical Correlation Analysis","authors":"Xiyu Wang, Hengjian Li, Jian Qiu, Changzhi Yu","doi":"10.1109/SPAC46244.2018.8965461","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965461","url":null,"abstract":"Biometrics is a discipline in computer science that uses biometrics to identify people and control access. With the development of technology, a variety of biometric recognition technologies are widely used, such as palm vein recognition technology. However, there are deficiencies in the feature extraction of the palm vein in one way. It is difficult to classify and identify. Therefore, the palm vein features are extracted in two different ways to obtain two different feature sets. And the two feature sets have complementary characteristics when expressing the palm vein features. Then, to improve the classification effect, we used the Canonical Correlation Analysis (CCA) to fuse the two feature sets. The palm vein features are extracted using a Competition Code and a Local Binary Pattern (LBP) to obtain two different palm vein features sets in this paper. The Competition Code uses the local orientation information of the image to extract the palm vein feature, and the LBP utilizes the local texture feature of the image to extract the palm vein feature. These two features can achieve complementarity. CCA is a feature-level fusion technique. CCA projects two feature sets into the same spatial domain through linear transformation, and achieves effective feature fusion in the same spatial domain. A good classification effect can be achieved by the two feature sets of the CCA fusion palm vein. Our experiments are carried out in a public database of Hong Kong Polytechnic University. Compared with the single palm vein competition code feature or LBP feature, the palm vein feature after CCA fusion shortens the classification time in some degree. And the recognition rate is increased to 98.14% when the ratio of the training sample to the test sample is 9:3.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"59 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129507637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effective Distance based Low Rank Representation for Image Classification 基于有效距离的图像分类低秩表示
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965492
Tianzeng Tao, De-Yun Yang, Lin-Lin Wang, Ming-Xia Liu
{"title":"Effective Distance based Low Rank Representation for Image Classification","authors":"Tianzeng Tao, De-Yun Yang, Lin-Lin Wang, Ming-Xia Liu","doi":"10.1109/SPAC46244.2018.8965492","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965492","url":null,"abstract":"Low-rank representation (LRR) has recently attracted a great deal of attention due to its pleasing efficacy in exploring low-dimensional subspace structures embedded in data. However, conventional LRR methods simply use Euclidean distance to measure the similarity of samples, ignoring the dynamic structure information of data. Meanwhile, recent studies have shown that a probabilistically motivated distance measurement (called effective distance) can model the dynamic structure information of data. In this paper, we propose an effective distance based LRR (EDLRR)method for representation learning. The proposed EDLRR method can not only represent the dynamic structure of data, but also capture the geometric information in the inherent nonlinear data. Our method mainly uses Effective Distance Computation and Effective Distance based Low-Rank Representation. We evaluate our method on datasets in the task of image classification, with results demonstrating the effectiveness of the method.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128569611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nuclear Clustering Algorithm on State Grid's IT Operation Log 国家电网IT运行日志的核聚类算法
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965496
Feng Yao, Angwei Li, Ping Ding, Lei Li
{"title":"Nuclear Clustering Algorithm on State Grid's IT Operation Log","authors":"Feng Yao, Angwei Li, Ping Ding, Lei Li","doi":"10.1109/SPAC46244.2018.8965496","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965496","url":null,"abstract":"With the continuous evolution of the IT infrastructure of State Grid Data Center and the growing operational data in the electric power system, how to quickly and automatically cluster the operation log in the data center of State Grid has become a key issue in the IT operation and maintenance of the data center. As the most commonly used algorithms in data mining, a clustering algorithm from data mining is adopted to handle the operational log data of State Grid IT data center, which can be used to effectively discover the changes of the topology structure during the operation of the IT infrastructure. Specifically, because the traditional sequential clustering algorithm lacks the ability to discover potential links in logs, this paper proposes a self-destructive nuclear clustering algorithm SDN-means, which aims at the business and data characteristics of the IT infrastructure system of State Grid data center, in order to effectively classify the operational log data of State Grid IT data center during the operation of State Grid. Through the analysis of the running logs of State Grid data center with obvious time series characteristics, the proposed SDN-means algorithm can effectively outperform the existing approaches on the operation of the data center of State Grid.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129924438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Combined Satellite Selection Algorithm* 一种组合卫星选择算法*
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965575
Miaomiao Wei, Zhoufeng Liu, Chunlei Li, Ruimin Yang, Bicao Li, Qingwei Xu
{"title":"A Combined Satellite Selection Algorithm*","authors":"Miaomiao Wei, Zhoufeng Liu, Chunlei Li, Ruimin Yang, Bicao Li, Qingwei Xu","doi":"10.1109/SPAC46244.2018.8965575","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965575","url":null,"abstract":"Based on the principle of the quasi-optimal satellite selection algorithm and the fast satellite selection algorithm, this paper gives a combined satellite selection algorithm. The algorithm introduces a new satellite selection strategy by considering different distributions of the similar satellite group. The computation amount of the combined algorithm is lower than quasi-optimal satellite selection algorithm. The experiment results show this algorithm can get a lower GDOP value than quasi-optimal satellite selection algorithm and close to the minimal GDOP.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124225328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Impurity and Bubble Defects in Tire X-Ray Image Based on Improved Extremum Filter and Locally Adaptive-threshold Binaryzation 基于改进极值滤波和局部自适应阈值二值化的轮胎x射线图像杂质和气泡缺陷检测
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965439
Xiunan Zheng, Jianpei Ding, Zengzhi Pang, Jinping Li
{"title":"Detection of Impurity and Bubble Defects in Tire X-Ray Image Based on Improved Extremum Filter and Locally Adaptive-threshold Binaryzation","authors":"Xiunan Zheng, Jianpei Ding, Zengzhi Pang, Jinping Li","doi":"10.1109/SPAC46244.2018.8965439","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965439","url":null,"abstract":"The manufacturing technology of all steel radial tire is complex. Some defects will inevitably appear in the tire due to the complex production process. Impurity and bubble are two typical kinds of defects in the tire. In this study, a unified detection of impurity and bubble defects in tire X-ray images is proposed by means of improved extremum filter and improved locally adaptive-threshold binaryzation . Firstly, the tire image is divided into cords and background by extremum filter. Secondly, an improved locally adaptive-threshold binaryzation is used to separate defects from the background. Finally, image denoising and marking are processed. In the experiment, we tested the proposed approach by using 280 tires with various types of defects from a tire factory. For the detection of clear and blur impurities and clear bubbles, the precision of our method can reach 97%, and the recall is 95.7%. It is to be noted that the proposed method can only be used to detect those two defects in sidewall and shoulder of the tire which we refer as the carcass.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127994139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Visual Positioning Method of Substation Robot Busbars fittings 变电站机器人母线配件的视觉定位方法
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965606
Chang Tan, Weihua Cao, Xin Chen, Min Wu, Zhentao Liu, Jinbin Li
{"title":"The Visual Positioning Method of Substation Robot Busbars fittings","authors":"Chang Tan, Weihua Cao, Xin Chen, Min Wu, Zhentao Liu, Jinbin Li","doi":"10.1109/SPAC46244.2018.8965606","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965606","url":null,"abstract":"This paper analyzes the disassembly and installation of busbar fittings bolts for substation robots in 110 kv environment, and proposes image self-correction, template segmentation fitting arc and panel pose correction for visual positioning of busbar fittings. The image self-correction solves the quality problem of the fitting image acquisition of the complex illumination condition by rectifying the overall of dark images and the local of bright images. The template segmentation fitting arc method performs multiple segmentation and arc fitting techniques on the fitting template image to accurately calculate the centroid of the fitting, thereby completing the visual positioning of installing bolt. The panel pose is solved by disparity map. Through the panel pose correction, the binocular camera can take photo vertically and use template segmentation to locate the bolt, thereby completing the visual positioning of removing bolt. The appeal method is based on the specific conditions of the disassembly and assembly of the busbar fittings, which solves the problem of large changes in ambient illumination during the visual positioning of the busbar fittings and the uncertainty of the shooting pose.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130038224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clustering based Image Segmentation via Weighted Fusion of Non-local and Local Information 基于非局部和局部信息加权融合的聚类图像分割
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965644
Li Guo, Long Chen, C. L. P. Chen, Tianjun Li, Jin Zhou
{"title":"Clustering based Image Segmentation via Weighted Fusion of Non-local and Local Information","authors":"Li Guo, Long Chen, C. L. P. Chen, Tianjun Li, Jin Zhou","doi":"10.1109/SPAC46244.2018.8965644","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965644","url":null,"abstract":"In this paper, we introduce a novel and effective clustering model combining the non-local and local information for the image segmentation. Recently, the non-local information has attracted much attention in the area of image processing for its excellent ability to handle the noise. Specifically, in this new model, we do an automatically weighted fusion of the non-local and local information of the image in the objective function of K-means. Thus, in the smoothing areas, the non-local information reduce the impact of noise in the region; and in the edge of regions, the local information help to keep the image details. The proposed model is a general optimization problem which can be solved by the iterative refinement technique like fuzzy c-means or K-means, and it can automatically balance the contribution of non-local and local information. Verified by the experimental results on image segmentation, the proposed model is effective to improve the performance of clustering.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133964015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Modal Medical Volume Registration Using a New Information Theoretic Measure 基于新信息理论测度的多模态医疗量登记
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965598
Bicao Li, Chunlei Li, Zhoufeng Liu, Zhuhong Shao, Miaomiao Wei, Jie Huang
{"title":"Multi-Modal Medical Volume Registration Using a New Information Theoretic Measure","authors":"Bicao Li, Chunlei Li, Zhoufeng Liu, Zhuhong Shao, Miaomiao Wei, Jie Huang","doi":"10.1109/SPAC46244.2018.8965598","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965598","url":null,"abstract":"This work presented a new 3D registration approach for multi-modal medical volumes. Our approach employed a generalized entropy called Arimoto entropy, which is a generalization of Shannon entropy. Our method proposed in this article applies the Jensen Arimoto divergence as a registration criterion and measures the similarity between the 3D medical volumes acquired from various modalities using this new criterion. The goal of this work is to obtain the maximum value of the new registration criteria by exploiting the quasi-Newton optimization scheme. Simultaneously, two volumes are completely registered, along with the final spatial transformation obtained. In order to evaluate our presented algorithm, the experiments on real three-dimensional medical volumes are designed and performed. Results of registration experiments illustrated that our approach is more effective and proves better registration accuracy. Additionally, a comparison with two classic measures based on information theory, cross-cumulative residual entropy and normalized mutual information, is carried out.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130827478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Broad Learning System for Container Number Identification 广义学习系统在集装箱编号识别中的应用
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965520
Yeong-Geun Han, Tie-shan Li, Y. Zuo, Ye Tian, Yuchi Cao, C. L. P. Chen
{"title":"Application of Broad Learning System for Container Number Identification","authors":"Yeong-Geun Han, Tie-shan Li, Y. Zuo, Ye Tian, Yuchi Cao, C. L. P. Chen","doi":"10.1109/SPAC46244.2018.8965520","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965520","url":null,"abstract":"Due to the Information Technologies (ITs) and Computer Technologies (CTs) have been dramatically developed in recent years, harbor cities pay more attentions on implementing the smart ports. In such kind of ports, the containers loading and uploading are almost autonomous, this can sufficiently enhance throughput ability and improve the management efficiency. To address this issue, automatic and correct identification of containers number is the bottleneck, and also the key technology. The container number characters are usually deformed or missing due to influences caused by rain, fog, oil stains, and creases on the surface of the containers, which would influence the recognition accuracy rate. Therefore, this study introduces a novel method named Broad Learning System (BLS) for identification of the container number characters. To compare with other methods, our algorithm presents fast training speed and high testing accuracy, which makes it more suitable for container number identification in practice.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130057257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信