{"title":"Two typical gaussianizing filters and their application in active signal detection","authors":"Wang Pingbo, Liu Feng, Huang Jinhua, Wang Vu","doi":"10.1109/IWECA.2014.6845706","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845706","url":null,"abstract":"For test definite signal in non-Gaussian interference background, the matched filter or the correlation test is no more optimal. The gaussianizing filter can weaken the bigger and strengthen the smaller samples in order to enhance the gaussianity of observed data, and to improve performance of subsequent matched filter or correlation test. Firstly, a widely applied non-Gaussian model, viz. Gaussian mixture, is described. Secondly, two typical gaussianizing filters, named U-filter and G-filter respectively, are studied. Thirdly, the matched filter with gaussianizing filter preposed is proposed and its detection performance is discussed. Finally, a numerical instance is illustrated.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122889224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cheng-Hua Wang, Yuan-Duen Lee, H. Chou, Jen-Hwa Kuo
{"title":"Identifying the intellectual structure of risk management studies","authors":"Cheng-Hua Wang, Yuan-Duen Lee, H. Chou, Jen-Hwa Kuo","doi":"10.1109/IWECA.2014.6845782","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845782","url":null,"abstract":"To explore the intellectual structure of risk management research in the last twelve years, the most crucial publications, most influential scholars, as well as the correlations among the publications of these scholars were identified. In this study, bibliometric techniques (citation analysis and cocitation analysis) were used to investigate the intellectual pillars of the risk management literature. By analyzing 28,415 citations of 815 articles regarding risk managment, published from 2002 to 2013 and obtained from the Science Citation Index and Social Sciences Citation Index databases, a knowledge network of risk management studies was mapped. The mapping results can be used to help identify the direction of risk management research and provide a valuable tool for researchers to access the literature in this field.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129143656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of information aggregation based on mobile and Bluetooth","authors":"Wang Jian, Li Yan, Duan Xiaohu, B. Peng","doi":"10.1109/IWECA.2014.6845652","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845652","url":null,"abstract":"Bluetooth is one of the most rapid growth wireless communication technology. According to the short distance communication requirements of the wireless sensor information fast, easy convergence to the network nodes, mobile phone is used for a network node, a new mobile phone information gathering method and a strategy to enhance the anti-jamming, frequency-hopping security based on the Bluetooth is proposed in this paper. The actual application effect is good, has potential military applications.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128435477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of solar tracking controller based on the STC12C5A32S2","authors":"Feng Zhang","doi":"10.1109/IWECA.2014.6845804","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845804","url":null,"abstract":"As people's concern about environmental pollution and fossil energy sources' drying up grows, the solar energy as a renewable clean energy is paid great attention by people gradually. But the current solar photoelectric conversion efficiency is generally low. The tracking control technology can effectively improve the conversion efficiency of solar energy, so the biaxial memory tracking controller is presented in this paper and carried on thorough research, memory tracking system based on the four quadrant location is designed in order to improve the conversion efficiency. The system is of high tracking precision, simple structure, convenient operation, etc.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116882118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data mining: The investment value analysis on China's bank stocks based on residual income model","authors":"Zaiqiang Huo","doi":"10.1109/IWECA.2014.6845622","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845622","url":null,"abstract":"This paper is to evaluate the investment value of China's bank stocks based on Olson's residual income model. This analysis is intended for providing experience evidence for making rational investment decisions in China's bank stocks. The experience analysis results show that the investment value of stocks of China's listed companies in finance and insurance sector remained relatively stable, while there were frequent sharp fluctuations in the stock price, which deviated hugely from its investment value. What's more, there were more bubbles in the market. But in the long run, short-term bank stocks market bubble will eventually burst. Most of time, China's bank stocks market is characterized by rational bubbles, the rest of time by rational bubbles.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117064854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of the network teaching management platform based on Cloud Computing","authors":"Da-wei Liu, Cong Yang, Li-juan Zhang, Jiang Zhu, You-wei Zhou, Xi Cheng","doi":"10.1109/IWECA.2014.6845604","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845604","url":null,"abstract":"The 21st century is the information age, the society benefits from the rapid development of high-speed broadband Internet. Of course not only society benefits, but also more multifarious technology platform derived from it. It also produced a new computing model - cloud computing, which is particularly important. Cloud computing refers to that cloud computing can deploy corresponding resources according to the actual needs of the user himself. While the use of cloud computing refers to the remote user who can directly go through the network connection, obtain the relevant stored data, database data and calculated data and a series of resources.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117077471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on rendering of 3D virtual campus of cloud computing","authors":"Shui Xiaoling","doi":"10.1109/IWECA.2014.6845576","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845576","url":null,"abstract":"For there was a part of the traditional three-dimensional scene rendering scene shows delay, physical exercise can sometimes appear stiff and not too real and interaction problem of poor ability. In this paper, a three-dimensional scene rendering based on cloud computing platform to solve the load imbalance in the traditional rendering and single machine efficiency is low, and heavy and complicated problems such as file system. This article mainly is to use the optimization of ray tracing algorithm based on cloud computing is to achieve higher rendering efficiency and rendering quality, achieve more realistic 3D scene.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117189130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification method of Ordovician ancestral river system in Halahatang area, North Tarim Basin","authors":"Wei Yang, Mingyi Hu, Lai Zhang","doi":"10.1109/IWECA.2014.6845709","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845709","url":null,"abstract":"Ancestral river system played an important role in controlling karst carbonate reservoir development. Combinating fine recognition of ancestral river can predict the advantageous Karst reservoir distribution regions. In the actual research, firstly, identifying the ancestral river which possess the characteristic of “incised valley” through the seismic profiles, and makes clear the two main growth stages of ancestral river are Lianglitage formation and Sangtamu formation. Then calculate the 3D seismic data with eigenvalue coherence algorithm, make coherent stratal slices of the two stages channel, and the results showed that two stages channel development and location has a certain inheritance character. In the period of Lianglitage formation, the Channel width is large and low-sinuosit, while in the period of Sangtamu formation, the Channel width is small and high-sinuosity. Closeness to the channel Karst carbonate reservoir developed with moniliforme reflection characters.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114151436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the security of a certificateless signcryption scheme","authors":"Yueying Huang, Jingang Zhang, Houyan Chen","doi":"10.1109/IWECA.2014.6845707","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845707","url":null,"abstract":"Signcryption is a cryptographic primitive that simultaneously realizes both the functions of public key encryption and digital signature in a logically single step, and with a cost significantly lower than that required by the traditional “signature and encryption” approach. Recently, an efficient certificateless signcryption scheme without using bilinear pairings was proposed by Zhu et al., which is claimed secure based on the assumptions that the compute Diffie-Hellman problem and the discrete logarithm problem are difficult. Although some security arguments were provided to show the scheme is secure, in this paper, we find that the signcryption construction due to Zhu et al. is not as secure as claimed. Specifically, we describe an adversary that can break the IND-CCA2 security of the scheme without any Unsigncryption query. Moreover, we demonstrate that the scheme is insecure against key replacement attack by describing a concrete attack approach.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116257261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bo Wu, Mengjun Li, Bin Zhang, Quan Zhang, Chaojing Tang
{"title":"Distributed symbolic execution for binary software testing","authors":"Bo Wu, Mengjun Li, Bin Zhang, Quan Zhang, Chaojing Tang","doi":"10.1109/IWECA.2014.6845695","DOIUrl":"https://doi.org/10.1109/IWECA.2014.6845695","url":null,"abstract":"Despite more than three decades of independent, academic, and industry-related research on symbolic execution, it is still difficult applying symbolic execution to real-world software testing, especially to binary software. The emergence of more and more cloud computing platforms makes it feasible to scale this technique using the concept of distributed computing. In this paper, we proposed a distributed symbolic execution approach, which is a novel schema for scaling symbolic execution to real-world binary software testing. We design our method in peer-to-peer way,that is to say, the work node can do the task alone or together, so it can make full use of the elasticity of cloud computing. Also a prototype system is implemented, which is built based on the S2E platform using its plug-in structure. The evaluation shows that our method can be used to test real-world binary software more efficiently.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114371515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}