{"title":"A secure and energy balanced clustering protocol for underwater wireless sensor networks","authors":"Guang Yang, Lie Dai, Yanrui Lei","doi":"10.1109/SPAC46244.2018.8965617","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965617","url":null,"abstract":"In Underwater Wireless Sensor Networks (UWSNs), cluster-based network architectures are widely used, which can balance energy consumption and prolong the lifetime of network. Hence, existing protocols amid at election of the optimal cluster head(CH), which are mainly based on residual energy or minimum energy consumption. Constrained by the particularities and the harsh working environment, UWSNs are vulnerable to many kinds of attacks. The malicious attacker or compromised node may be selected as CH by forging residual energy, and then capture packets and disrupt operation of networks. Trust management mechanisms can detect and remove malicious nodes by detecting and evaluating behaviors of nodes. In this article, an overview of existing trust management mechanisms and clustering protocols is given. To secure UWSNs, a trust-based secure and energy balanced clustering protocol is proposed to enhance the security of UWSNs.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114139177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Modeling Prediction Methods of Process Optimization for Thermoelectric Production","authors":"Guodong Mou, Guochang Li, Tao Du","doi":"10.1109/SPAC46244.2018.8965630","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965630","url":null,"abstract":"In order to process massive historical data generated by heating steam boiler in thermoelectric production and assist in optimizing production process. To solve this problem, we propose a modeling method for coal boiler production process optimization. This method has designed optimized modeling algorithm flow. The fundamental steps of this method are: data processing, discovery of correlation chain, modeling and prediction by using the flexible neural tree algorithm. Finally, the trend function of data, namely the fitting function, is obtained. Through fitting function to predict and simulate the links in the boiler production process, we can obtain the implicit regularity knowledge in the data. We can be able to adjust the main steam pressure, oxygen content, rotational speed of blower and other production parameters. Through the design algorithm and experimental analysis, the better experimental results are obtained. By applying this method to thermoelectric production, the production efficiency is improved, energy saving and emission reduction are achieved, and the safety of production is guaranteed.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130655440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting the students with mental health risk by using Internet access logs","authors":"Wenjun Quan, Qing Zhou","doi":"10.1109/spac46244.2018.8965518","DOIUrl":"https://doi.org/10.1109/spac46244.2018.8965518","url":null,"abstract":"Nowadays, the mental health problems of college students in our country are becoming more and more prominent. The mental health problems of college students not only hinder their healthy growth, but also affect the social and economic development of our country. Predicting students' mental health is an important field in educational data mining (EDM). However, it is very difficult to predict students' mental health because of many complex factors that affect the students' mental health, so currently there is little research on this field. As the Internet has almost become an essential part of students' life, the students' Internet use can reflect the students' psychological situation to some extent. Therefore, this study analyzes the online log of the freshmen students majored in computer in a university, and proposed an effective method to estimate the students' online time. Then, predict the students with mental health risk by using the students' online time on different types of Internet as features. The experimental results show that the proposed method is with high effectiveness and can predict about 50% of the students with mental health risk.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133981610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic identification of vulnerable plaque based on flexible neural tree","authors":"Wei Tian, Yishen Pang, Sijie Niu, Haochen Yang, Jiwen Dong, Jin Zhou, Yuehui Chen","doi":"10.1109/SPAC46244.2018.8965435","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965435","url":null,"abstract":"Identification of vulnerable plaque plays an important role in coronary heart disease diagnosis for clinicians. In this paper we propose a novel method based on flexible neural tree (FNT) to identify vulnerable plaques in intravascular optical coherence tomography (IVOCT) images. First, a flexible neural tree classifier is constructed by selecting features of the image. Then, the probabilistic incremental program evolution (PIPE) algorithm optimizes the flexible neural tree structure and uses particle swarm optimization (PSO) to optimize the parameters. Experimental results show that this method can effectively identify vulnerable plaques in IVOCT images.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132327371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"People Counting Based on Head Detection and Reidentification in Overlapping Cameras System","authors":"Shengke Wang, Rui Li, Xin Lv, Xiaoyan Zhang, Jianlin Zhu, Junyu Dong","doi":"10.1109/SPAC46244.2018.8965468","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965468","url":null,"abstract":"People counting is one of the key tasks in video surveillance system. Usually, one camera cannot cover all the area for a big room or plaza, so multiple cameras will be used. For overlapping cameras system, the overlapped area should be marked for people counting. To get the area, an easy way is to calibrate the cameras. But in real practical system there are hundreds of cameras, it’s impracticable to calibrate all the cameras. A practicable way is to get the overlapping area is to applying image mosaic algorithm. Using local features such as SIFT cannot to find the overlapping area due to corresponding low quality and repeated similarity (such as seats and tables) in most surveillance environment. In this paper, we are committed to finding repetitive people to improve the accuracy of the population statistics. First, a person head detector is trained to detect the human head in the frame taken by each camera video and then cut it, and the images of the head pair taken by each camera are taken as a database which belongs to this camera. Then, we select one database as Gallery, image from another database as the Probe, we use a Siamese networks to match a probe with Gallery, repeating the above process until all the iterations of the probe in the database are completed, so that we find all the recurring people between the two cameras. Finally, the median of the total number of people in all video frame image counts is calculated, and the median result is taken as the final statistical result of the scene.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128272609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bozhan Dang, Jin Zhou, Yingxu Wang, Guangmei Xu, Dong Wang, Lin Wang, Shiyuan Han, Yuehui Chen
{"title":"Transfer Learning for Entropy-Weighted Fuzzy Clustering","authors":"Bozhan Dang, Jin Zhou, Yingxu Wang, Guangmei Xu, Dong Wang, Lin Wang, Shiyuan Han, Yuehui Chen","doi":"10.1109/SPAC46244.2018.8965458","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965458","url":null,"abstract":"The traditional clustering algorithms can not effectively deal with the clustering when the data for current task are not enough. In this paper, we utilize transfer learning to assist the entropy-weighted fuzzy c-means clustering. The clustering centers and corresponding weights of dimensions learned from the known data domain are used in the new objective function to assist the unknown data clustering. Experiments on synthetic data sets have demonstrated the superiority of the new algorithm.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114442741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Text Classification for Identifying Fake News","authors":"Shenhao Zhang, Yihui Wang, Chengxiang Tan","doi":"10.1109/SPAC46244.2018.8965536","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965536","url":null,"abstract":"In the big data environment, massive news can always lead people to make their own judgments about events happening in society. The wrong guidance of fake news will lead to a negative effect on society. It is necessary to distinguish between real and fake news. In the traditional text categorization method, using the TF-IDF information of the words in the document as the weight matrix and applying it to the classifier. Inevitably, TF-IDF contains limited information, limiting the effect of classification. This paper proposed a method based on TF-IDF and Word2vec for identifying fake news, using SVM to verify its validity.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-local similarity edge-guided based semi-coupled dictionary learning super resolution","authors":"Weifang Wang, Jiwen Dong, Sijie Niu, Yuehui Chen","doi":"10.1109/SPAC46244.2018.8965473","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965473","url":null,"abstract":"In this paper, we propose a novel edge preserving and noise adaption for retina image superresolution (SR) reconstruction. The proposed method incorporates non-local similarity and edge difference into semicoupled dictionary learning (NSED-SCDL). Firstly, in order to suppress speckle noise during reconstructing, non-local similarity is utilized to construct the denoising constraint. Secondly, for preserving the edge information of the reconstructed image, the edge difference between the observed low-resolution (LR) image and degraded version of the reconstructed image is employed to construct regularization term. Thirdly, we explore the adaptive coefficients of edge constraint to find the optimal edge information during optimizing the objective function. Experiments on retina images demonstrate that the proposed algorithm outperforms other state-of-the-art methods, especially for the noise retina images with weak edges.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124905302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Ideological and Political Education System Based on the Basic Element Correlation Theory","authors":"Xiaohu Yin, Zhiyi Zhang, Haiyan Liu, Lu Zhang, Xinghai Yang, Changzhi Wei","doi":"10.1109/SPAC46244.2018.8965620","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965620","url":null,"abstract":"In view of the shortcomings of traditional ideological and political education system analysis, a new system analysis model of Ideological and political education is studied based on the basic element correlation theory and the organizational characteristics of Ideological and political education.The multidimensional matter element is used to express the elements of the ideological and political education system, which enriches the practical meaning of the nodes. The multidimensional relation element is used to express the relationship between nodes, which fully embodies the multiplicity of the relationship in the system. The multidimensional matter element is used to express the details of the structural changes of the ideological and political education system. Based on this, the multidimensional basic element correlation analysis model of the ideological and political education system is constructed.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130380395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive NN leader-following consensus control of second-order nonlinear multi-agent systems with unknown control gains","authors":"Guilu Li, Chang-E. Ren, Z. Ding, Zhi-Cheng Shi","doi":"10.1109/SPAC46244.2018.8965464","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965464","url":null,"abstract":"This thesis investigate the consensus tracking control problem for second-order MAS with unknown control gains, unknown non-linear dynamics and external disturbance. Only part of followers can acquire the state information of the leader. RBFNNs are introduced to estimate the unknown non-linear function of agents dynamics. Based on Lyapunov theory and Nussbaum type function, a new consensus tracking control strategy is proposed by using only the communication of each agent and its vicinages. In this paper, it also proves that the second-order MAS can obtain consensus tracking control by selecting the appropriate parameters. Finally, simulation results verify the accuracy of the proposed consensus control method.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129772791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}