{"title":"Word-level information extraction from science and technology announcements corpus based on CRF","authors":"Yushu Cao, Jun Wang, Lei Li","doi":"10.1109/CCIS.2012.6664640","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664640","url":null,"abstract":"Conditional Random Field (CRF) has been applied widely in information extraction and natural language processing. However, according to corpus types, it has not been made much use of on corpus about science and technology declarations. In this paper, we extract word-level information from amounts of science and technology announcements corpus, and analyze the performance of CRF, comparing with Naïve Bayes as a baseline. According to our experiments, we show that CRF has much high precision except for a few unknown data. Also, Naïve Bayes model is satisfactory in closed domains, but it always makes mistakes when the data belong to a less weighted class.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134593645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved algorithm of RBF neural networks and its application","authors":"Dong Wei, Yiqing Liu, Ning Zhang, Minzhe Zhao","doi":"10.1109/CCIS.2012.6664602","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664602","url":null,"abstract":"In order to improve the predictive accuracy of RBF neural network in function approximation, an improved RBF neural network was proposed. In this new model, human experience was added to the last layer as the activation function. The model of improved algorithm was built in Simulink, and was used to approximate a 2-dimensional function. The simulation result showed that the improved network performed well in function approximation. At last, a neural network system which was based on the improved algorithm was used in license plate recognition. In this system, the first two layers of the network were implemented in hardware, and the last layer was achieved in software. Experimental results show that the predictive accuracy of network is improved after joining human experience to the output layer.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133871857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and implementation of social hot topic detection system based on mirco-blog","authors":"Lulin Jiao, Yan Peng","doi":"10.1109/CCIS.2012.6664232","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664232","url":null,"abstract":"Micro-blog as an important part of the network media has become an important access to information for Netizens. Some hot topics have an immeasurable impact on the public opinion formation and dissemination, and also potential security risks are absolutely not underestimated. Collecting the relevant data in the micro-blog can provide data base for public opinion analysis. The study, social topic detection system based on micro-blog is mainly centered on the key technologies in the information capture and the Chinese handling of micro-blog. This study invokes the API of Sina micro-blog through three kinds of capture strategy, and then uses RMM reverse maximum matching algorithm to capture the information of microblog, after this using classification of self-build public opinion to do information classification of micro-blog for structured storage. At last this study finishes the research and implement of the system based on microblog. The system has realized the hot topics of timely capture, collection, classification, storage and retrieval which lay the foundation for further public opinion analysis.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127577652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and designed of a structured scalable robot control system based on real-time bus","authors":"Lun Xie, S. Ni, Zhiliang Wang","doi":"10.1109/CCIS.2012.6664326","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664326","url":null,"abstract":"Aimed at the problems of poor transferring capabilities and maintainability in heterogeneous robot platforms, a structured scalable robot control system based on real-time bus, such as RS485bus is proposed, which can be adapted to a number of heterogeneous robot platform. The hardware and software design is elaborated and using this, a Guide Robot is developed to prove the interchangeability, adaptation and extensibility of the system.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132623331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Public key encryption with keyword search based on factoring","authors":"Wenjun Luo, Jianming Tan","doi":"10.1109/CCIS.2012.6664583","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664583","url":null,"abstract":"Public key encryption with keyword search (PKES) enables senders to send encrypted data to a Freceiver like traditional public key encryption (PKE) schemes. The difference between PKES and PKE is that the receiver in PKES can search on the encrypted data which is stored on the third-party server (like a cloud storage server). As far as we know, most of the existed PKES schemes are based on bilinear map, so they are costly in computation and hard to be used in practice. In this paper, we construct a PKES scheme based on factoring, it's computational efficient and secure. The public parameters in our scheme is also short, we just need a public modules and a random element of the set of integers.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131161410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bin Ye, Hongyu Chai, Weiping He, Xiaoting Wang, Guangwei Song
{"title":"Semantic similarity calculation method in ontology mapping","authors":"Bin Ye, Hongyu Chai, Weiping He, Xiaoting Wang, Guangwei Song","doi":"10.1109/CCIS.2012.6664586","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664586","url":null,"abstract":"In the view of semantic heterogeneity among ontologies, this paper presents a semantic similarity calculation method based on the grammar itself and the structure of concept in order to achieve inter-ontology mapping efficiently and gives an example to validate the mapping process. The results show that the algorithm can get semantic similarity between the two concepts in different ontologies and find the mapping relationship. The mapping method can help solve the problems of semantic heterogeneity, strengthen interoperability between ontologies, and contribute to the standardization establishment of knowledge systems.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133138400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stability analysis of software networks","authors":"Yang Gao, Yong Peng, Tieshan Guan, Feng Xie, Zhonghua Dai, Guoai Xu","doi":"10.1109/CCIS.2012.6664261","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664261","url":null,"abstract":"This paper considers the stability of software networks, about which we employ a novel scheme about network division to treat the situation of multiple edges. The division principles is followed based on different types of coupling between classes, the whole software network is divided into several subnets. And then, a model of the multiple edges software networks has been established. After that, the stability analysis of the model with three types of coupling is conducted. The sufficient conditions for ensuring the stability of the networks are derived based on the Lyapunov-Krasovskii functional approach. The simulation example is provided to demonstrate the effectiveness of the presented method.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123175897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yujun Zheng, Xinli Xu, Shengyong Chen, Wanliang Wang
{"title":"Distributed agent based cooperative differential evolution: A master-slave model","authors":"Yujun Zheng, Xinli Xu, Shengyong Chen, Wanliang Wang","doi":"10.1109/CCIS.2012.6664431","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664431","url":null,"abstract":"The paper proposes a distributed computing framework that integrates parallel differential evolution (DE) and multi-agents. Given a complex high-dimensional optimization problem, our approach decomposes the problem into a set of subcomponents, which are evolved by a set of Slave agents concurrently, and the results are synthesized and further evolved by a Master agent. As top-level agents of the framework, the Master and Slave agents can be divided into asynchronous teams of sub-agents including Constructors for solution initialization, Improvers for solution evolution, Repairers for constraint handling, Destroyers for keeping the quality and size of the population, etc., which share populations of solution vectors and cooperate to solve the problem efficiently. The proposed approach is highly parallelized, flexible, and scalable, and its efficiency is demonstrated by comparison with some state-of-the-art approaches.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127820548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mandarin isolated words recognition method based on pitch contour","authors":"Chunming Wei, Yingchun Yang","doi":"10.1109/CCIS.2012.6664385","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664385","url":null,"abstract":"In this paper, we attempt to use pitch contour in Mandarin isolated words recognition by matching candidate pitch contour with a set of templates. To apply it in speaker-independent speech recognition, we propose a remedy algorithm to weaken speaker information in pitch contour. Speaker-dependent and - independent speech recognition experiments are carried out to evaluate performance of pitch contour and MFCC. Score fusion of MFCC and revised pitch contour are implemented. Experimental results demonstrate that pitch contour performs comparably with MFCC in speaker-dependent speech recognition. Through score fusion, the revised pitch contour helps in improving performance in speaker-independent speech recognition.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115504868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encryption algorithm based on higher degree residues oriented to semantic security","authors":"Yongdan Liu","doi":"10.1109/CCIS.2012.6664604","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664604","url":null,"abstract":"Encryption algorithm based on higher degree residues is presented in this paper, including both deterministic and probabilistic. Since the algorithms have homomorphic properties, i.e., the ability to perform algebraic operations such as additions or subtractions directly on ciphertext, they can be applied in several specific fields. Except for ensuring semantic security, compared with the other probabilistic version, the algorithm in this paper has relatively smaller expansion rate.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124362533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}