2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems最新文献

筛选
英文 中文
Word-level information extraction from science and technology announcements corpus based on CRF 基于CRF的科技公告语料库词级信息提取
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664640
Yushu Cao, Jun Wang, Lei Li
{"title":"Word-level information extraction from science and technology announcements corpus based on CRF","authors":"Yushu Cao, Jun Wang, Lei Li","doi":"10.1109/CCIS.2012.6664640","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664640","url":null,"abstract":"Conditional Random Field (CRF) has been applied widely in information extraction and natural language processing. However, according to corpus types, it has not been made much use of on corpus about science and technology declarations. In this paper, we extract word-level information from amounts of science and technology announcements corpus, and analyze the performance of CRF, comparing with Naïve Bayes as a baseline. According to our experiments, we show that CRF has much high precision except for a few unknown data. Also, Naïve Bayes model is satisfactory in closed domains, but it always makes mistakes when the data belong to a less weighted class.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134593645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved algorithm of RBF neural networks and its application RBF神经网络的改进算法及其应用
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664602
Dong Wei, Yiqing Liu, Ning Zhang, Minzhe Zhao
{"title":"Improved algorithm of RBF neural networks and its application","authors":"Dong Wei, Yiqing Liu, Ning Zhang, Minzhe Zhao","doi":"10.1109/CCIS.2012.6664602","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664602","url":null,"abstract":"In order to improve the predictive accuracy of RBF neural network in function approximation, an improved RBF neural network was proposed. In this new model, human experience was added to the last layer as the activation function. The model of improved algorithm was built in Simulink, and was used to approximate a 2-dimensional function. The simulation result showed that the improved network performed well in function approximation. At last, a neural network system which was based on the improved algorithm was used in license plate recognition. In this system, the first two layers of the network were implemented in hardware, and the last layer was achieved in software. Experimental results show that the predictive accuracy of network is improved after joining human experience to the output layer.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133871857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and implementation of social hot topic detection system based on mirco-blog 基于微博的社会热点话题检测系统的研究与实现
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664232
Lulin Jiao, Yan Peng
{"title":"Research and implementation of social hot topic detection system based on mirco-blog","authors":"Lulin Jiao, Yan Peng","doi":"10.1109/CCIS.2012.6664232","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664232","url":null,"abstract":"Micro-blog as an important part of the network media has become an important access to information for Netizens. Some hot topics have an immeasurable impact on the public opinion formation and dissemination, and also potential security risks are absolutely not underestimated. Collecting the relevant data in the micro-blog can provide data base for public opinion analysis. The study, social topic detection system based on micro-blog is mainly centered on the key technologies in the information capture and the Chinese handling of micro-blog. This study invokes the API of Sina micro-blog through three kinds of capture strategy, and then uses RMM reverse maximum matching algorithm to capture the information of microblog, after this using classification of self-build public opinion to do information classification of micro-blog for structured storage. At last this study finishes the research and implement of the system based on microblog. The system has realized the hot topics of timely capture, collection, classification, storage and retrieval which lay the foundation for further public opinion analysis.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127577652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and designed of a structured scalable robot control system based on real-time bus 研究设计了一种基于实时总线的结构化可扩展机器人控制系统
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664326
Lun Xie, S. Ni, Zhiliang Wang
{"title":"Research and designed of a structured scalable robot control system based on real-time bus","authors":"Lun Xie, S. Ni, Zhiliang Wang","doi":"10.1109/CCIS.2012.6664326","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664326","url":null,"abstract":"Aimed at the problems of poor transferring capabilities and maintainability in heterogeneous robot platforms, a structured scalable robot control system based on real-time bus, such as RS485bus is proposed, which can be adapted to a number of heterogeneous robot platform. The hardware and software design is elaborated and using this, a Guide Robot is developed to prove the interchangeability, adaptation and extensibility of the system.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132623331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public key encryption with keyword search based on factoring 基于因子分解的关键字搜索公钥加密
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664583
Wenjun Luo, Jianming Tan
{"title":"Public key encryption with keyword search based on factoring","authors":"Wenjun Luo, Jianming Tan","doi":"10.1109/CCIS.2012.6664583","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664583","url":null,"abstract":"Public key encryption with keyword search (PKES) enables senders to send encrypted data to a Freceiver like traditional public key encryption (PKE) schemes. The difference between PKES and PKE is that the receiver in PKES can search on the encrypted data which is stored on the third-party server (like a cloud storage server). As far as we know, most of the existed PKES schemes are based on bilinear map, so they are costly in computation and hard to be used in practice. In this paper, we construct a PKES scheme based on factoring, it's computational efficient and secure. The public parameters in our scheme is also short, we just need a public modules and a random element of the set of integers.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131161410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Semantic similarity calculation method in ontology mapping 本体映射中的语义相似度计算方法
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664586
Bin Ye, Hongyu Chai, Weiping He, Xiaoting Wang, Guangwei Song
{"title":"Semantic similarity calculation method in ontology mapping","authors":"Bin Ye, Hongyu Chai, Weiping He, Xiaoting Wang, Guangwei Song","doi":"10.1109/CCIS.2012.6664586","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664586","url":null,"abstract":"In the view of semantic heterogeneity among ontologies, this paper presents a semantic similarity calculation method based on the grammar itself and the structure of concept in order to achieve inter-ontology mapping efficiently and gives an example to validate the mapping process. The results show that the algorithm can get semantic similarity between the two concepts in different ontologies and find the mapping relationship. The mapping method can help solve the problems of semantic heterogeneity, strengthen interoperability between ontologies, and contribute to the standardization establishment of knowledge systems.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133138400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Stability analysis of software networks 软件网络稳定性分析
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664261
Yang Gao, Yong Peng, Tieshan Guan, Feng Xie, Zhonghua Dai, Guoai Xu
{"title":"Stability analysis of software networks","authors":"Yang Gao, Yong Peng, Tieshan Guan, Feng Xie, Zhonghua Dai, Guoai Xu","doi":"10.1109/CCIS.2012.6664261","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664261","url":null,"abstract":"This paper considers the stability of software networks, about which we employ a novel scheme about network division to treat the situation of multiple edges. The division principles is followed based on different types of coupling between classes, the whole software network is divided into several subnets. And then, a model of the multiple edges software networks has been established. After that, the stability analysis of the model with three types of coupling is conducted. The sufficient conditions for ensuring the stability of the networks are derived based on the Lyapunov-Krasovskii functional approach. The simulation example is provided to demonstrate the effectiveness of the presented method.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123175897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed agent based cooperative differential evolution: A master-slave model 基于分布式智能体的协同差分进化:一个主从模型
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664431
Yujun Zheng, Xinli Xu, Shengyong Chen, Wanliang Wang
{"title":"Distributed agent based cooperative differential evolution: A master-slave model","authors":"Yujun Zheng, Xinli Xu, Shengyong Chen, Wanliang Wang","doi":"10.1109/CCIS.2012.6664431","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664431","url":null,"abstract":"The paper proposes a distributed computing framework that integrates parallel differential evolution (DE) and multi-agents. Given a complex high-dimensional optimization problem, our approach decomposes the problem into a set of subcomponents, which are evolved by a set of Slave agents concurrently, and the results are synthesized and further evolved by a Master agent. As top-level agents of the framework, the Master and Slave agents can be divided into asynchronous teams of sub-agents including Constructors for solution initialization, Improvers for solution evolution, Repairers for constraint handling, Destroyers for keeping the quality and size of the population, etc., which share populations of solution vectors and cooperate to solve the problem efficiently. The proposed approach is highly parallelized, flexible, and scalable, and its efficiency is demonstrated by comparison with some state-of-the-art approaches.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127820548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Mandarin isolated words recognition method based on pitch contour 基于音高轮廓的汉语孤立词识别方法
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664385
Chunming Wei, Yingchun Yang
{"title":"Mandarin isolated words recognition method based on pitch contour","authors":"Chunming Wei, Yingchun Yang","doi":"10.1109/CCIS.2012.6664385","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664385","url":null,"abstract":"In this paper, we attempt to use pitch contour in Mandarin isolated words recognition by matching candidate pitch contour with a set of templates. To apply it in speaker-independent speech recognition, we propose a remedy algorithm to weaken speaker information in pitch contour. Speaker-dependent and - independent speech recognition experiments are carried out to evaluate performance of pitch contour and MFCC. Score fusion of MFCC and revised pitch contour are implemented. Experimental results demonstrate that pitch contour performs comparably with MFCC in speaker-dependent speech recognition. Through score fusion, the revised pitch contour helps in improving performance in speaker-independent speech recognition.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115504868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Encryption algorithm based on higher degree residues oriented to semantic security 面向语义安全的基于高次残数的加密算法
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664604
Yongdan Liu
{"title":"Encryption algorithm based on higher degree residues oriented to semantic security","authors":"Yongdan Liu","doi":"10.1109/CCIS.2012.6664604","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664604","url":null,"abstract":"Encryption algorithm based on higher degree residues is presented in this paper, including both deterministic and probabilistic. Since the algorithms have homomorphic properties, i.e., the ability to perform algebraic operations such as additions or subtractions directly on ciphertext, they can be applied in several specific fields. Except for ensuring semantic security, compared with the other probabilistic version, the algorithm in this paper has relatively smaller expansion rate.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124362533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信