2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems最新文献

筛选
英文 中文
Compatability study on broadcasting system interfering with LTE system 广播系统对LTE系统干扰的兼容性研究
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664308
Xiaoyan Xu, Dexiang Meng, Yanming Chen, Jiwei He
{"title":"Compatability study on broadcasting system interfering with LTE system","authors":"Xiaoyan Xu, Dexiang Meng, Yanming Chen, Jiwei He","doi":"10.1109/CCIS.2012.6664308","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664308","url":null,"abstract":"DTMB is the Chinese TV standard for mobile and fixed terminals used. TD-LTE is a homegrown 4G mobile-telecommunications technology and standard developed by China. This paper evaluates the interference from TV stations to TD-LTE system when the two systems coexist in the UHF band. This paper adopts the Monte-Carlo simulation methodology, and provides the simulation results and analysis.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Face detection based on improved AdaBoost algorithm in E-Learning 基于改进AdaBoost算法的在线学习人脸检测
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664311
Wan-sen Wang, Huifang Niu
{"title":"Face detection based on improved AdaBoost algorithm in E-Learning","authors":"Wan-sen Wang, Huifang Niu","doi":"10.1109/CCIS.2012.6664311","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664311","url":null,"abstract":"This paper is based on the background of learners' expression recognition in emotion recognition interactive E-Learning. This paper aims at time-consuming of training samples and weights degradation two problems of traditional AdaBoost algorithm, proposes a decile eigenvalue AdaBoost algorithm and joins FPR (False Positive Rate) in this algorithm. The experiments use improved AdaBoost algorithm in E-Learning face detection achieved good effect, and the results provide good conditions for the follow-up E-Learning expression feature extraction.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125378262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Financial websites oriented heuristic anti-phishing research 面向金融网站的启发式反网络钓鱼研究
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664247
Yang Liu, Miao Zhang
{"title":"Financial websites oriented heuristic anti-phishing research","authors":"Yang Liu, Miao Zhang","doi":"10.1109/CCIS.2012.6664247","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664247","url":null,"abstract":"With the rapid development of Internet technology, phishing techniques are increasingly diversified and the Concealment is growing, so to prevent phishing technology is still urgent and important. In this paper, a heuristic anti-phishing technology against this increasingly prominent security issues is proposed. It will perform six checks in two rounds based on the key elements of the page, including domain name URL, the password field, pictures, links, etc. The effect is obvious, especially for the financial website which has special picture element and teeming-information form.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123364776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An adaptive localization algorithm based on RSSI in wireless sensor networks 无线传感器网络中基于RSSI的自适应定位算法
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664559
Haihui Zhang, Jiaming Zhang, Huarui Wu
{"title":"An adaptive localization algorithm based on RSSI in wireless sensor networks","authors":"Haihui Zhang, Jiaming Zhang, Huarui Wu","doi":"10.1109/CCIS.2012.6664559","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664559","url":null,"abstract":"Wireless sensor networks (WSN) have been used in various application areas and will be more prosperous in the future. The technology of localization, by which the position of blind node can be acquired, is a significant factor and one of the supporting technologies in WSN. Most of the existing localization algorithms in sensor networks mainly depend on one simple model and can only be used in a given condition, which cannot be adapted to the complex environment and thus restrict their application. In this paper, a novel adaptive scheme, based on the relationship between the RSSI (Received Signal Strength Indication) values and the spread distance of RF signal, is presented by fusing the experience model and the theoretical model in traditional RSSI-Based localization methods for improving the adaptability to different environments and enhances the pointing accuracy in WSN. The key method of this scheme is that through dividing the entire testing set into several pieces and placing characteristic node in every zone, one of the two models will be dynamically selected after comparing the error between the real distance the RF signal traveled and the distance computed from each of the two models by the characteristic node to minimize the positioning error.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121328921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Estimation of earnings manipulation in U.S. listed companies based on weighted discriminative model 基于加权判别模型的美国上市公司盈余操纵行为分析
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664619
Xiaoli Nan, Xiao Sun, Tieshan Hou
{"title":"Estimation of earnings manipulation in U.S. listed companies based on weighted discriminative model","authors":"Xiaoli Nan, Xiao Sun, Tieshan Hou","doi":"10.1109/CCIS.2012.6664619","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664619","url":null,"abstract":"The paper profiles sample of earnings manipulation in U.S. listed companies, identifies their distinguishing characteristics, and estimates a model for detecting manipulation. Compared with whole sample firm, there are small amount of firm engaging in earnings management and data are uneven for analysis, Weighted Discriminative Model (support vector machine) have been selected to solve this problem. SFS and several feature selection methods have been adopted to select proper feature sets for Weighted Discriminative Model. After feature selection and training, the trained Weighted Discriminative Model is suitable for supporting users such as investor and auditor to detect earnings manipulation. It is also helpful to make correct decision on earning judgment when anglicizing listed company's financial report.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126571062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling the interactions between cloud service providers 对云服务提供商之间的交互进行建模
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664246
D. Kyriazis
{"title":"Modeling the interactions between cloud service providers","authors":"D. Kyriazis","doi":"10.1109/CCIS.2012.6664246","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664246","url":null,"abstract":"Cloud computing is becoming a widely adopted underlying technology for the provision of different types of services. As a paradigm building on a set of combined technologies, it enables service provision through the commoditization of IT assets and on-demand usage patterns. Within the application domain, services move away from the monolithic approach into an Internet-scale composite one by exploiting data, atomic services and infrastructures. In this paper an approach is presented for identifying and modeling the interactions between service providers. The presented approach can be exploited during the selection process for composite services based on various metrics that define the corresponding end-to-end Quality of Service (QoS).","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and implementation of Ethernet topology discovery algorithm 以太网拓扑发现算法的设计与实现
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664279
Wei Xiao, Ruixing Wang, Xiaohong Huang
{"title":"Design and implementation of Ethernet topology discovery algorithm","authors":"Wei Xiao, Ruixing Wang, Xiaohong Huang","doi":"10.1109/CCIS.2012.6664279","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664279","url":null,"abstract":"Ethernet topology discovery refers to entities discovery in the actual physical network connection (corresponding to the second OSI layer devices). That is, the relation of switches and switches, switches and routers, switches and the hosts. The purpose of Topology Discovery in multi-VLAN Ethernet is to obtain and maintain the existence of network nodes and connections between them and on this basis to map out the entire network topology. This paper proposes an Ethernet data link layer topology discovery algorithm base on MAC Address Table. The algorithm can compute the relation of switches in target network.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116671208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An improved AODV protocol based on extension lifetime of the Ad Hoc networks 一种基于Ad Hoc网络生存期扩展的改进AODV协议
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664534
Jian Kuang, Xianqing Meng, Jiali Bian
{"title":"An improved AODV protocol based on extension lifetime of the Ad Hoc networks","authors":"Jian Kuang, Xianqing Meng, Jiali Bian","doi":"10.1109/CCIS.2012.6664534","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664534","url":null,"abstract":"AODV routing protocol makes least hops as a principle when establishing routes. Nodes in Ad Hoc networks have limited energy. Node will exit the network and cannot provide service when its energy is depleted. In recent years, many works have been taken to save energy of ad hoc networks. This paper presents a method which can prolong network lifetime. In this paper, we take node load, remaining energy and moving speed into account to establish more stable routing and avoid excessive consumption of every node. This method can save energy and balance the energy consumption of each node. At the end of paper, we use ns-2 to test the performance of the improved protocol and the results of simulation show that the improved AODV routing protocol can prolong Ad Hoc network lifetime.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124907394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A method of recognizing the root of an improved dependency tree for the Chinese patent literature 中文专利文献依赖树根的一种改进识别方法
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664638
Yun Zhu, Yaohong Jin
{"title":"A method of recognizing the root of an improved dependency tree for the Chinese patent literature","authors":"Yun Zhu, Yaohong Jin","doi":"10.1109/CCIS.2012.6664638","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664638","url":null,"abstract":"Compared with ordinary text, patent text in Chinese often has more complex sentence structure and more ambiguity of multiple verbs, which brings more difficulties in patent machine translation. To deal with these problems, this paper presents an improved dependency tree and a method to recognize the root of this tree for Chinese-English patent machine translation. Based on the theory of Hierarchical Network of Concepts (the HNC theory), some semantic features are used in the recognition. Experiments show that the precision of the recognition is close to 85%.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121476044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation to coordinating degree of systematic battle forces based on DEA 基于DEA的系统作战力量协调度评价
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664594
Yanbiao Chen, Wen-yuan Sun, Yi Zhang
{"title":"Evaluation to coordinating degree of systematic battle forces based on DEA","authors":"Yanbiao Chen, Wen-yuan Sun, Yi Zhang","doi":"10.1109/CCIS.2012.6664594","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664594","url":null,"abstract":"Systematic battle troop (SBT) is a complex system composed of its systematic battle forces based on system theory. This paper discussed the systematic battle forces constitutions of the SBT and based on data envelopment analysis (DEA) method, proposed the Systematic battle forces coordinating degree models. Using the models, the one-way state coordinating degree and dynamic coordinating degree of the two sub modules were researched, and on the basis of this, the whole coordinating degree was calculated to evaluate the whole coordinating development results of the SBT among the operation processes. From this, the evaluation to the systematic battle forces of army tactics modules has been solved comparatively and also supplied the scientific method for quickly coordinating grouping of the SBT under the condition of operation.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121491656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信