2014 IEEE Workshop on Electronics, Computer and Applications最新文献

筛选
英文 中文
Two typical gaussianizing filters and their application in active signal detection 两种典型的高斯化滤波器及其在主动信号检测中的应用
2014 IEEE Workshop on Electronics, Computer and Applications Pub Date : 2014-05-08 DOI: 10.1109/IWECA.2014.6845706
Wang Pingbo, Liu Feng, Huang Jinhua, Wang Vu
{"title":"Two typical gaussianizing filters and their application in active signal detection","authors":"Wang Pingbo, Liu Feng, Huang Jinhua, Wang Vu","doi":"10.1109/IWECA.2014.6845706","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845706","url":null,"abstract":"For test definite signal in non-Gaussian interference background, the matched filter or the correlation test is no more optimal. The gaussianizing filter can weaken the bigger and strengthen the smaller samples in order to enhance the gaussianity of observed data, and to improve performance of subsequent matched filter or correlation test. Firstly, a widely applied non-Gaussian model, viz. Gaussian mixture, is described. Secondly, two typical gaussianizing filters, named U-filter and G-filter respectively, are studied. Thirdly, the matched filter with gaussianizing filter preposed is proposed and its detection performance is discussed. Finally, a numerical instance is illustrated.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122889224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying the intellectual structure of risk management studies 确定风险管理研究的知识结构
2014 IEEE Workshop on Electronics, Computer and Applications Pub Date : 2014-05-08 DOI: 10.1109/IWECA.2014.6845782
Cheng-Hua Wang, Yuan-Duen Lee, H. Chou, Jen-Hwa Kuo
{"title":"Identifying the intellectual structure of risk management studies","authors":"Cheng-Hua Wang, Yuan-Duen Lee, H. Chou, Jen-Hwa Kuo","doi":"10.1109/IWECA.2014.6845782","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845782","url":null,"abstract":"To explore the intellectual structure of risk management research in the last twelve years, the most crucial publications, most influential scholars, as well as the correlations among the publications of these scholars were identified. In this study, bibliometric techniques (citation analysis and cocitation analysis) were used to investigate the intellectual pillars of the risk management literature. By analyzing 28,415 citations of 815 articles regarding risk managment, published from 2002 to 2013 and obtained from the Science Citation Index and Social Sciences Citation Index databases, a knowledge network of risk management studies was mapped. The mapping results can be used to help identify the direction of risk management research and provide a valuable tool for researchers to access the literature in this field.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129143656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of information aggregation based on mobile and Bluetooth 基于手机和蓝牙的信息聚合的设计与实现
2014 IEEE Workshop on Electronics, Computer and Applications Pub Date : 2014-05-08 DOI: 10.1109/IWECA.2014.6845652
Wang Jian, Li Yan, Duan Xiaohu, B. Peng
{"title":"Design and implementation of information aggregation based on mobile and Bluetooth","authors":"Wang Jian, Li Yan, Duan Xiaohu, B. Peng","doi":"10.1109/IWECA.2014.6845652","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845652","url":null,"abstract":"Bluetooth is one of the most rapid growth wireless communication technology. According to the short distance communication requirements of the wireless sensor information fast, easy convergence to the network nodes, mobile phone is used for a network node, a new mobile phone information gathering method and a strategy to enhance the anti-jamming, frequency-hopping security based on the Bluetooth is proposed in this paper. The actual application effect is good, has potential military applications.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128435477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of solar tracking controller based on the STC12C5A32S2 基于STC12C5A32S2的太阳能跟踪控制器研究
2014 IEEE Workshop on Electronics, Computer and Applications Pub Date : 2014-05-08 DOI: 10.1109/IWECA.2014.6845804
Feng Zhang
{"title":"Research of solar tracking controller based on the STC12C5A32S2","authors":"Feng Zhang","doi":"10.1109/IWECA.2014.6845804","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845804","url":null,"abstract":"As people's concern about environmental pollution and fossil energy sources' drying up grows, the solar energy as a renewable clean energy is paid great attention by people gradually. But the current solar photoelectric conversion efficiency is generally low. The tracking control technology can effectively improve the conversion efficiency of solar energy, so the biaxial memory tracking controller is presented in this paper and carried on thorough research, memory tracking system based on the four quadrant location is designed in order to improve the conversion efficiency. The system is of high tracking precision, simple structure, convenient operation, etc.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116882118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data mining: The investment value analysis on China's bank stocks based on residual income model 数据挖掘:基于剩余收益模型的中国银行股投资价值分析
2014 IEEE Workshop on Electronics, Computer and Applications Pub Date : 2014-05-08 DOI: 10.1109/IWECA.2014.6845622
Zaiqiang Huo
{"title":"Data mining: The investment value analysis on China's bank stocks based on residual income model","authors":"Zaiqiang Huo","doi":"10.1109/IWECA.2014.6845622","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845622","url":null,"abstract":"This paper is to evaluate the investment value of China's bank stocks based on Olson's residual income model. This analysis is intended for providing experience evidence for making rational investment decisions in China's bank stocks. The experience analysis results show that the investment value of stocks of China's listed companies in finance and insurance sector remained relatively stable, while there were frequent sharp fluctuations in the stock price, which deviated hugely from its investment value. What's more, there were more bubbles in the market. But in the long run, short-term bank stocks market bubble will eventually burst. Most of time, China's bank stocks market is characterized by rational bubbles, the rest of time by rational bubbles.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117064854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of the network teaching management platform based on Cloud Computing 基于云计算的网络教学管理平台的设计
2014 IEEE Workshop on Electronics, Computer and Applications Pub Date : 2014-05-08 DOI: 10.1109/IWECA.2014.6845604
Da-wei Liu, Cong Yang, Li-juan Zhang, Jiang Zhu, You-wei Zhou, Xi Cheng
{"title":"Design of the network teaching management platform based on Cloud Computing","authors":"Da-wei Liu, Cong Yang, Li-juan Zhang, Jiang Zhu, You-wei Zhou, Xi Cheng","doi":"10.1109/IWECA.2014.6845604","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845604","url":null,"abstract":"The 21st century is the information age, the society benefits from the rapid development of high-speed broadband Internet. Of course not only society benefits, but also more multifarious technology platform derived from it. It also produced a new computing model - cloud computing, which is particularly important. Cloud computing refers to that cloud computing can deploy corresponding resources according to the actual needs of the user himself. While the use of cloud computing refers to the remote user who can directly go through the network connection, obtain the relevant stored data, database data and calculated data and a series of resources.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117077471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on rendering of 3D virtual campus of cloud computing 基于云计算的三维虚拟校园渲染研究
2014 IEEE Workshop on Electronics, Computer and Applications Pub Date : 2014-05-08 DOI: 10.1109/IWECA.2014.6845576
Shui Xiaoling
{"title":"Research on rendering of 3D virtual campus of cloud computing","authors":"Shui Xiaoling","doi":"10.1109/IWECA.2014.6845576","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845576","url":null,"abstract":"For there was a part of the traditional three-dimensional scene rendering scene shows delay, physical exercise can sometimes appear stiff and not too real and interaction problem of poor ability. In this paper, a three-dimensional scene rendering based on cloud computing platform to solve the load imbalance in the traditional rendering and single machine efficiency is low, and heavy and complicated problems such as file system. This article mainly is to use the optimization of ray tracing algorithm based on cloud computing is to achieve higher rendering efficiency and rendering quality, achieve more realistic 3D scene.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117189130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identification method of Ordovician ancestral river system in Halahatang area, North Tarim Basin 塔北哈拉哈塘地区奥陶系古河流系识别方法
2014 IEEE Workshop on Electronics, Computer and Applications Pub Date : 2014-05-08 DOI: 10.1109/IWECA.2014.6845709
Wei Yang, Mingyi Hu, Lai Zhang
{"title":"Identification method of Ordovician ancestral river system in Halahatang area, North Tarim Basin","authors":"Wei Yang, Mingyi Hu, Lai Zhang","doi":"10.1109/IWECA.2014.6845709","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845709","url":null,"abstract":"Ancestral river system played an important role in controlling karst carbonate reservoir development. Combinating fine recognition of ancestral river can predict the advantageous Karst reservoir distribution regions. In the actual research, firstly, identifying the ancestral river which possess the characteristic of “incised valley” through the seismic profiles, and makes clear the two main growth stages of ancestral river are Lianglitage formation and Sangtamu formation. Then calculate the 3D seismic data with eigenvalue coherence algorithm, make coherent stratal slices of the two stages channel, and the results showed that two stages channel development and location has a certain inheritance character. In the period of Lianglitage formation, the Channel width is large and low-sinuosit, while in the period of Sangtamu formation, the Channel width is small and high-sinuosity. Closeness to the channel Karst carbonate reservoir developed with moniliforme reflection characters.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114151436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the security of a certificateless signcryption scheme 无证书签名加密方案的安全性
2014 IEEE Workshop on Electronics, Computer and Applications Pub Date : 2014-05-08 DOI: 10.1109/IWECA.2014.6845707
Yueying Huang, Jingang Zhang, Houyan Chen
{"title":"On the security of a certificateless signcryption scheme","authors":"Yueying Huang, Jingang Zhang, Houyan Chen","doi":"10.1109/IWECA.2014.6845707","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845707","url":null,"abstract":"Signcryption is a cryptographic primitive that simultaneously realizes both the functions of public key encryption and digital signature in a logically single step, and with a cost significantly lower than that required by the traditional “signature and encryption” approach. Recently, an efficient certificateless signcryption scheme without using bilinear pairings was proposed by Zhu et al., which is claimed secure based on the assumptions that the compute Diffie-Hellman problem and the discrete logarithm problem are difficult. Although some security arguments were provided to show the scheme is secure, in this paper, we find that the signcryption construction due to Zhu et al. is not as secure as claimed. Specifically, we describe an adversary that can break the IND-CCA2 security of the scheme without any Unsigncryption query. Moreover, we demonstrate that the scheme is insecure against key replacement attack by describing a concrete attack approach.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116257261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Distributed symbolic execution for binary software testing 用于二进制软件测试的分布式符号执行
2014 IEEE Workshop on Electronics, Computer and Applications Pub Date : 2014-05-08 DOI: 10.1109/IWECA.2014.6845695
Bo Wu, Mengjun Li, Bin Zhang, Quan Zhang, Chaojing Tang
{"title":"Distributed symbolic execution for binary software testing","authors":"Bo Wu, Mengjun Li, Bin Zhang, Quan Zhang, Chaojing Tang","doi":"10.1109/IWECA.2014.6845695","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845695","url":null,"abstract":"Despite more than three decades of independent, academic, and industry-related research on symbolic execution, it is still difficult applying symbolic execution to real-world software testing, especially to binary software. The emergence of more and more cloud computing platforms makes it feasible to scale this technique using the concept of distributed computing. In this paper, we proposed a distributed symbolic execution approach, which is a novel schema for scaling symbolic execution to real-world binary software testing. We design our method in peer-to-peer way,that is to say, the work node can do the task alone or together, so it can make full use of the elasticity of cloud computing. Also a prototype system is implemented, which is built based on the S2E platform using its plug-in structure. The evaluation shows that our method can be used to test real-world binary software more efficiently.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114371515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信