2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)最新文献

筛选
英文 中文
A secure and energy balanced clustering protocol for underwater wireless sensor networks 一种安全且能量均衡的水下无线传感器网络聚类协议
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965617
Guang Yang, Lie Dai, Yanrui Lei
{"title":"A secure and energy balanced clustering protocol for underwater wireless sensor networks","authors":"Guang Yang, Lie Dai, Yanrui Lei","doi":"10.1109/SPAC46244.2018.8965617","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965617","url":null,"abstract":"In Underwater Wireless Sensor Networks (UWSNs), cluster-based network architectures are widely used, which can balance energy consumption and prolong the lifetime of network. Hence, existing protocols amid at election of the optimal cluster head(CH), which are mainly based on residual energy or minimum energy consumption. Constrained by the particularities and the harsh working environment, UWSNs are vulnerable to many kinds of attacks. The malicious attacker or compromised node may be selected as CH by forging residual energy, and then capture packets and disrupt operation of networks. Trust management mechanisms can detect and remove malicious nodes by detecting and evaluating behaviors of nodes. In this article, an overview of existing trust management mechanisms and clustering protocols is given. To secure UWSNs, a trust-based secure and energy balanced clustering protocol is proposed to enhance the security of UWSNs.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114139177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on Modeling Prediction Methods of Process Optimization for Thermoelectric Production 热电生产过程优化建模预测方法研究
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965630
Guodong Mou, Guochang Li, Tao Du
{"title":"Research on Modeling Prediction Methods of Process Optimization for Thermoelectric Production","authors":"Guodong Mou, Guochang Li, Tao Du","doi":"10.1109/SPAC46244.2018.8965630","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965630","url":null,"abstract":"In order to process massive historical data generated by heating steam boiler in thermoelectric production and assist in optimizing production process. To solve this problem, we propose a modeling method for coal boiler production process optimization. This method has designed optimized modeling algorithm flow. The fundamental steps of this method are: data processing, discovery of correlation chain, modeling and prediction by using the flexible neural tree algorithm. Finally, the trend function of data, namely the fitting function, is obtained. Through fitting function to predict and simulate the links in the boiler production process, we can obtain the implicit regularity knowledge in the data. We can be able to adjust the main steam pressure, oxygen content, rotational speed of blower and other production parameters. Through the design algorithm and experimental analysis, the better experimental results are obtained. By applying this method to thermoelectric production, the production efficiency is improved, energy saving and emission reduction are achieved, and the safety of production is guaranteed.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130655440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting the students with mental health risk by using Internet access logs 利用上网日志预测学生心理健康风险
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/spac46244.2018.8965518
Wenjun Quan, Qing Zhou
{"title":"Predicting the students with mental health risk by using Internet access logs","authors":"Wenjun Quan, Qing Zhou","doi":"10.1109/spac46244.2018.8965518","DOIUrl":"https://doi.org/10.1109/spac46244.2018.8965518","url":null,"abstract":"Nowadays, the mental health problems of college students in our country are becoming more and more prominent. The mental health problems of college students not only hinder their healthy growth, but also affect the social and economic development of our country. Predicting students' mental health is an important field in educational data mining (EDM). However, it is very difficult to predict students' mental health because of many complex factors that affect the students' mental health, so currently there is little research on this field. As the Internet has almost become an essential part of students' life, the students' Internet use can reflect the students' psychological situation to some extent. Therefore, this study analyzes the online log of the freshmen students majored in computer in a university, and proposed an effective method to estimate the students' online time. Then, predict the students with mental health risk by using the students' online time on different types of Internet as features. The experimental results show that the proposed method is with high effectiveness and can predict about 50% of the students with mental health risk.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133981610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic identification of vulnerable plaque based on flexible neural tree 基于柔性神经树的易损斑块自动识别
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965435
Wei Tian, Yishen Pang, Sijie Niu, Haochen Yang, Jiwen Dong, Jin Zhou, Yuehui Chen
{"title":"Automatic identification of vulnerable plaque based on flexible neural tree","authors":"Wei Tian, Yishen Pang, Sijie Niu, Haochen Yang, Jiwen Dong, Jin Zhou, Yuehui Chen","doi":"10.1109/SPAC46244.2018.8965435","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965435","url":null,"abstract":"Identification of vulnerable plaque plays an important role in coronary heart disease diagnosis for clinicians. In this paper we propose a novel method based on flexible neural tree (FNT) to identify vulnerable plaques in intravascular optical coherence tomography (IVOCT) images. First, a flexible neural tree classifier is constructed by selecting features of the image. Then, the probabilistic incremental program evolution (PIPE) algorithm optimizes the flexible neural tree structure and uses particle swarm optimization (PSO) to optimize the parameters. Experimental results show that this method can effectively identify vulnerable plaques in IVOCT images.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132327371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
People Counting Based on Head Detection and Reidentification in Overlapping Cameras System 基于重叠摄像机系统中头部检测与再识别的人员计数
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965468
Shengke Wang, Rui Li, Xin Lv, Xiaoyan Zhang, Jianlin Zhu, Junyu Dong
{"title":"People Counting Based on Head Detection and Reidentification in Overlapping Cameras System","authors":"Shengke Wang, Rui Li, Xin Lv, Xiaoyan Zhang, Jianlin Zhu, Junyu Dong","doi":"10.1109/SPAC46244.2018.8965468","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965468","url":null,"abstract":"People counting is one of the key tasks in video surveillance system. Usually, one camera cannot cover all the area for a big room or plaza, so multiple cameras will be used. For overlapping cameras system, the overlapped area should be marked for people counting. To get the area, an easy way is to calibrate the cameras. But in real practical system there are hundreds of cameras, it’s impracticable to calibrate all the cameras. A practicable way is to get the overlapping area is to applying image mosaic algorithm. Using local features such as SIFT cannot to find the overlapping area due to corresponding low quality and repeated similarity (such as seats and tables) in most surveillance environment. In this paper, we are committed to finding repetitive people to improve the accuracy of the population statistics. First, a person head detector is trained to detect the human head in the frame taken by each camera video and then cut it, and the images of the head pair taken by each camera are taken as a database which belongs to this camera. Then, we select one database as Gallery, image from another database as the Probe, we use a Siamese networks to match a probe with Gallery, repeating the above process until all the iterations of the probe in the database are completed, so that we find all the recurring people between the two cameras. Finally, the median of the total number of people in all video frame image counts is calculated, and the median result is taken as the final statistical result of the scene.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128272609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transfer Learning for Entropy-Weighted Fuzzy Clustering 熵加权模糊聚类的迁移学习
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965458
Bozhan Dang, Jin Zhou, Yingxu Wang, Guangmei Xu, Dong Wang, Lin Wang, Shiyuan Han, Yuehui Chen
{"title":"Transfer Learning for Entropy-Weighted Fuzzy Clustering","authors":"Bozhan Dang, Jin Zhou, Yingxu Wang, Guangmei Xu, Dong Wang, Lin Wang, Shiyuan Han, Yuehui Chen","doi":"10.1109/SPAC46244.2018.8965458","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965458","url":null,"abstract":"The traditional clustering algorithms can not effectively deal with the clustering when the data for current task are not enough. In this paper, we utilize transfer learning to assist the entropy-weighted fuzzy c-means clustering. The clustering centers and corresponding weights of dimensions learned from the known data domain are used in the new objective function to assist the unknown data clustering. Experiments on synthetic data sets have demonstrated the superiority of the new algorithm.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114442741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Text Classification for Identifying Fake News 基于文本分类的假新闻识别研究
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965536
Shenhao Zhang, Yihui Wang, Chengxiang Tan
{"title":"Research on Text Classification for Identifying Fake News","authors":"Shenhao Zhang, Yihui Wang, Chengxiang Tan","doi":"10.1109/SPAC46244.2018.8965536","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965536","url":null,"abstract":"In the big data environment, massive news can always lead people to make their own judgments about events happening in society. The wrong guidance of fake news will lead to a negative effect on society. It is necessary to distinguish between real and fake news. In the traditional text categorization method, using the TF-IDF information of the words in the document as the weight matrix and applying it to the classifier. Inevitably, TF-IDF contains limited information, limiting the effect of classification. This paper proposed a method based on TF-IDF and Word2vec for identifying fake news, using SVM to verify its validity.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Non-local similarity edge-guided based semi-coupled dictionary learning super resolution 基于非局部相似边缘引导的半耦合字典学习超分辨率
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965473
Weifang Wang, Jiwen Dong, Sijie Niu, Yuehui Chen
{"title":"Non-local similarity edge-guided based semi-coupled dictionary learning super resolution","authors":"Weifang Wang, Jiwen Dong, Sijie Niu, Yuehui Chen","doi":"10.1109/SPAC46244.2018.8965473","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965473","url":null,"abstract":"In this paper, we propose a novel edge preserving and noise adaption for retina image superresolution (SR) reconstruction. The proposed method incorporates non-local similarity and edge difference into semicoupled dictionary learning (NSED-SCDL). Firstly, in order to suppress speckle noise during reconstructing, non-local similarity is utilized to construct the denoising constraint. Secondly, for preserving the edge information of the reconstructed image, the edge difference between the observed low-resolution (LR) image and degraded version of the reconstructed image is employed to construct regularization term. Thirdly, we explore the adaptive coefficients of edge constraint to find the optimal edge information during optimizing the objective function. Experiments on retina images demonstrate that the proposed algorithm outperforms other state-of-the-art methods, especially for the noise retina images with weak edges.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124905302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Ideological and Political Education System Based on the Basic Element Correlation Theory 基于基本要素关联理论的思想政治教育系统分析
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965620
Xiaohu Yin, Zhiyi Zhang, Haiyan Liu, Lu Zhang, Xinghai Yang, Changzhi Wei
{"title":"Analysis of Ideological and Political Education System Based on the Basic Element Correlation Theory","authors":"Xiaohu Yin, Zhiyi Zhang, Haiyan Liu, Lu Zhang, Xinghai Yang, Changzhi Wei","doi":"10.1109/SPAC46244.2018.8965620","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965620","url":null,"abstract":"In view of the shortcomings of traditional ideological and political education system analysis, a new system analysis model of Ideological and political education is studied based on the basic element correlation theory and the organizational characteristics of Ideological and political education.The multidimensional matter element is used to express the elements of the ideological and political education system, which enriches the practical meaning of the nodes. The multidimensional relation element is used to express the relationship between nodes, which fully embodies the multiplicity of the relationship in the system. The multidimensional matter element is used to express the details of the structural changes of the ideological and political education system. Based on this, the multidimensional basic element correlation analysis model of the ideological and political education system is constructed.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130380395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive NN leader-following consensus control of second-order nonlinear multi-agent systems with unknown control gains 具有未知控制增益的二阶非线性多智能体系统的自适应NN前导-跟随共识控制
2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC) Pub Date : 2018-12-01 DOI: 10.1109/SPAC46244.2018.8965464
Guilu Li, Chang-E. Ren, Z. Ding, Zhi-Cheng Shi
{"title":"Adaptive NN leader-following consensus control of second-order nonlinear multi-agent systems with unknown control gains","authors":"Guilu Li, Chang-E. Ren, Z. Ding, Zhi-Cheng Shi","doi":"10.1109/SPAC46244.2018.8965464","DOIUrl":"https://doi.org/10.1109/SPAC46244.2018.8965464","url":null,"abstract":"This thesis investigate the consensus tracking control problem for second-order MAS with unknown control gains, unknown non-linear dynamics and external disturbance. Only part of followers can acquire the state information of the leader. RBFNNs are introduced to estimate the unknown non-linear function of agents dynamics. Based on Lyapunov theory and Nussbaum type function, a new consensus tracking control strategy is proposed by using only the communication of each agent and its vicinages. In this paper, it also proves that the second-order MAS can obtain consensus tracking control by selecting the appropriate parameters. Finally, simulation results verify the accuracy of the proposed consensus control method.","PeriodicalId":360369,"journal":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129772791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信