2008 The 9th International Conference for Young Computer Scientists最新文献

筛选
英文 中文
Prediction of Vessel Traffic Accident Based on Chaotic Theory 基于混沌理论的船舶交通事故预测
2008 The 9th International Conference for Young Computer Scientists Pub Date : 2008-11-18 DOI: 10.1109/ICYCS.2008.221
Jinyong Zhou, Lan Gao, Qing Hua
{"title":"Prediction of Vessel Traffic Accident Based on Chaotic Theory","authors":"Jinyong Zhou, Lan Gao, Qing Hua","doi":"10.1109/ICYCS.2008.221","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.221","url":null,"abstract":"It is well known that the vessel traffic accident is a quite complex event induced by many kinds of factors, which can be concluded as persons, ships, and environment. As a result of interaction and intercoupling of these factors, the whole system has highly nonlinear characteristics. Due to the limitation of traditional linear prediction, it is significant to put the chaotic theory into the vessel traffic accident prediction. As a new attempt this paper at first analyzes chaotic characteristics appeared in vessel traffic accident, and then presents the chaotic adaptive prediction model based on wavelet de-noising. In theory this model is suitable for the vessel traffic accident prediction whose history record contains only small data sets but with much noise. In practice the following simulation results on MATLAB software platform show the effectiveness of the model described which has high prediction accuracy and can meet the actual need.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124339522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Security Evaluation Algorithm Based on Access Level Vectors 基于访问级别向量的网络安全评估算法
2008 The 9th International Conference for Young Computer Scientists Pub Date : 2008-11-18 DOI: 10.1109/ICYCS.2008.333
Kai Li, Naijie Gu, Kun Bi, Hongzhu Ji
{"title":"Network Security Evaluation Algorithm Based on Access Level Vectors","authors":"Kai Li, Naijie Gu, Kun Bi, Hongzhu Ji","doi":"10.1109/ICYCS.2008.333","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.333","url":null,"abstract":"The attack graph, a typical model-based method, is widely used in the field of network security evaluation. The biggest disadvantage of attack graph method is its exponential growth of the state space. This paper presents an efficient algorithm based on the malefactorpsilas access level vector in every host of the network to generate a reduced attack graph in polynomial compute complexity. In this algorithm, the state space is reduced to O(nm), where n is the number of nodes and m is the whole number of vulnerabilities in the network. We also present a standard method to generate attack templates from the vulnerabilities.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126255357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An XSL Analysis on BES BES的XSL分析
2008 The 9th International Conference for Young Computer Scientists Pub Date : 2008-11-18 DOI: 10.1109/ICYCS.2008.367
Buyun Qu, Lianhao Liu
{"title":"An XSL Analysis on BES","authors":"Buyun Qu, Lianhao Liu","doi":"10.1109/ICYCS.2008.367","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.367","url":null,"abstract":"Since the proposal of the XSL cryptanalysis and the construction of the big encryption system (BES), the potential for algebraic attacks against the advanced encryption system (AES), especially over GF(28), has attracted a lot of attention from the cryptographic community. This paper presents an analysis of the compact XSL attack applied to the BES with the key schedule involved. We introduce a new strategy to reduce the number of S-boxes which is used to multiply the equations derived from the cipher linear layer. Then the scale of the expanded equation system can be reduced and it, in theory, leads to a better result than exhaustive key search: for BES corresponding to 128-bit key size AES, the complexity estimate is about 297.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126375706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transferring Landmarks to Individual Foot Using Deformable Template Models 使用可变形模板模型将地标转移到个人脚
2008 The 9th International Conference for Young Computer Scientists Pub Date : 2008-11-18 DOI: 10.1109/ICYCS.2008.388
Bin Liu, Ning Shangguan, Junyi Lin, Kaiyong Jiang
{"title":"Transferring Landmarks to Individual Foot Using Deformable Template Models","authors":"Bin Liu, Ning Shangguan, Junyi Lin, Kaiyong Jiang","doi":"10.1109/ICYCS.2008.388","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.388","url":null,"abstract":"An efficient and novel method is presented to automatically mark foot shape anatomical landmarks in human body. 3D digital foot shape including anatomical landmarks is taken as deformation template. PCA and ICP algorithms are applied to make sample foot shape and template foot shape align and registration in the least-squares sense. Then initial corresponding point set between sample foot shape and template foot shape is found. Sample point set is obtained in the template foot shape by using method that combining uniform sampling and sampling based on distribution of curvature. Points in sample point set corresponding to template foot shape are taken as position constrained condition. Discrete Laplacian mesh deformation is used to make standard foot shape fit sample foot shape. Template foot shape is approached to sample foot shape in error range via iteration. Therefor, the mapping relation between template foot shape points and the corresponding points on sample foot shape is built. So the corresponding points of anatomical landmarks on template foot shape, on the sample foot shape, can be treated as anatomical landmarks on sample foot shape.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128106193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Approach to Cooperative Multi-Robot Map Building in Complex Environments 复杂环境下多机器人协同地图构建方法
2008 The 9th International Conference for Young Computer Scientists Pub Date : 2008-11-18 DOI: 10.1109/ICYCS.2008.412
Wei Pan, Zixing Cai, Limei Liu, Baifan Chen
{"title":"An Approach to Cooperative Multi-Robot Map Building in Complex Environments","authors":"Wei Pan, Zixing Cai, Limei Liu, Baifan Chen","doi":"10.1109/ICYCS.2008.412","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.412","url":null,"abstract":"A novel approach to multi-robot cooperative map-building in complex environments is presented in this paper. The approach lets all robots operate individually and then tries to merge the different local grid maps into a single global one. Without using any pose information of the robots, the process of map merging is performed by measuring the similarity between grid maps. A distance transform and an improved genetic algorithm are used to effectively search the maximum overlap at which the local maps can be joined together. Experimental results show the feasibility and effectiveness of our approach in complex environments.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125427444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP 基于IP语音最小有效位隐写的隐蔽通信模型
2008 The 9th International Conference for Young Computer Scientists Pub Date : 2008-11-18 DOI: 10.1109/ICYCS.2008.394
H. Tian, Ke Zhou, Yongfeng Huang, D. Feng, Jin Liu
{"title":"A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP","authors":"H. Tian, Ke Zhou, Yongfeng Huang, D. Feng, Jin Liu","doi":"10.1109/ICYCS.2008.394","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.394","url":null,"abstract":"Steganography, as one of alternative techniques for secure communications, has drawn more and more attentions. This paper presents a covert communication model based on least significant bits (LSB) steganography in Voice over IP (VoIP). The model aims at providing nice security of secret messages and real-time performance that is vital for VoIP. Therefore, we employ a simple encryption of secret messages before embedding them. This encryption strikes a good balance between adequate short-term protection for secret messages and low latency for VoIP. Furthermore, we design a structure of embedded messages. It can provide flexible length and avoid effectually both extraction attack and deceptive attack. We evaluate the model with ITU-T G.729a as the codec of the cover speech in StegTalk, our platform for study on covert communications theory in VoIP. In this case, the proposed model can provide two optional covert transmission speeds, i.e. 0.8 kb/s and 2.6 kb/s, where the maximum payload ratio is 99.98%. The experimental results show that our method has negligible effects on speech quality and well meets the real-time requirement of VoIP.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121949616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Performance Investigation of Backoff Algorithms in Multihop Wireless Networks 多跳无线网络退避算法的性能研究
2008 The 9th International Conference for Young Computer Scientists Pub Date : 2008-11-18 DOI: 10.1109/ICYCS.2008.289
J. Li, Xian-quan Zeng, Qinggang Su
{"title":"Performance Investigation of Backoff Algorithms in Multihop Wireless Networks","authors":"J. Li, Xian-quan Zeng, Qinggang Su","doi":"10.1109/ICYCS.2008.289","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.289","url":null,"abstract":"In a multihop wireless network, the throughput performance decreases seriously because of inter-flow and intra-flow collision. The backoff algorithm is the de facto function to resolve collision in 802.11 networks. In this paper we study the impact of five back-off algorithms on the performance of 802.11-based multihop wireless networks with different network topology and flow patterns. Simulations show that the backoff algorithms have big influence on the performance of both UDP and TCP flows. But none of the current backoff algorithms can improve the throughput and fairness performance in multihop wireless networks efficiently. It shows that the traditional random backoff algorithms are no longer suitable for collision resolution in distributed multihop wireless networks.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122228973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Face Recognition Using Scale Invariant Feature Transform and Support Vector Machine 基于尺度不变特征变换和支持向量机的人脸识别
2008 The 9th International Conference for Young Computer Scientists Pub Date : 2008-11-18 DOI: 10.1109/ICYCS.2008.481
Lichun Zhang, Junwei Chen, Yue Lu, P. Wang
{"title":"Face Recognition Using Scale Invariant Feature Transform and Support Vector Machine","authors":"Lichun Zhang, Junwei Chen, Yue Lu, P. Wang","doi":"10.1109/ICYCS.2008.481","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.481","url":null,"abstract":"Face recognition has received significant attention in the last decades for many potential applications. Recently, the scale invariant feature transform (SIFT) becomes an interesting technique for the task of object recognition. This paper investigated the application of the SIFT approach to the face recognition and proposed a new method based on SIFT and support vector machine (SVM) for the face recognition problem. First the SIFT features are generated and then SVM is used for the classification. The presented method has been tested with the ORL database and the Yale face database, and the recognition results demonstrate its robust performance under different expression conditions.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"2021 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121783587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
An Adaptive QoS-Supported Backoff Mechanism for IEEE 802.11 IEEE 802.11支持qos的自适应回退机制
2008 The 9th International Conference for Young Computer Scientists Pub Date : 2008-11-18 DOI: 10.1109/ICYCS.2008.536
Zhihui Ge, Taoshen Li
{"title":"An Adaptive QoS-Supported Backoff Mechanism for IEEE 802.11","authors":"Zhihui Ge, Taoshen Li","doi":"10.1109/ICYCS.2008.536","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.536","url":null,"abstract":"Although the existing QoS-supported MAC Protocols can provide QoS guarantee at some degree, most of them sacrifice the performance of best-effort traffic. An adaptive QoS-supported backoff mechanism for MAC Protocol is proposed, in which nodes can adjust their backoff algorithm according to the network load state they measured. So the proposed adaptive backoff algorithm can improve the link utility while at the same time meeting the QoS demand of real-time traffic. In simulation study, our algorithm shows better performance improvement over IEEE 802.11e in QoS guarantee and link utility under various scenarios.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131391199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Runtime-Monitoring-Based Dependable Software Construction Method 基于运行时监控的可靠软件构建方法
2008 The 9th International Conference for Young Computer Scientists Pub Date : 2008-11-18 DOI: 10.1109/ICYCS.2008.298
Jun Zhu, Changguo Guo, Quan-jun Yin, Jianlu Bo, Quanyuan Wu
{"title":"A Runtime-Monitoring-Based Dependable Software Construction Method","authors":"Jun Zhu, Changguo Guo, Quan-jun Yin, Jianlu Bo, Quanyuan Wu","doi":"10.1109/ICYCS.2008.298","DOIUrl":"https://doi.org/10.1109/ICYCS.2008.298","url":null,"abstract":"Software runtime monitoring mechanisms can be used to increase the dependability of software systems. However, it is a complex and burdensome job for developers to rebuild existing software systems by adding software runtime monitoring mechanism. Meanwhile, current software runtime monitoring mechanisms are mainly restricted to monitor centralized software systems. This paper presents a novel method, in which distributed software runtime monitoring mechanism is applied to construct dependable software systems, by using AOP technique. This method can satisfy users' changeful monitoring requirements, and decrease the development pressure of developers. Distributed software runtime monitoring mechanism, the kernel of which is a monitoring Web service that can collect runtime monitoring information and provide constant online monitoring information access service, can be repeatedly reused in software systems as a non-functional aspect that has been modeled in this paper. Then we implement a construction platform, which can automatically generate monitoring code and monitoring Web service according to users' monitoring requirements, automatically instrument monitoring code and service into the source code of software system, and then remotely monitor the instrumented software system through monitoring Web service, in terms of this essential idea. We choose a typical multi-thread program as a case study to demonstrate the practicability and feasibility of the approach.","PeriodicalId":370660,"journal":{"name":"2008 The 9th International Conference for Young Computer Scientists","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132235883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信