2012 International Conference on Information Security and Intelligent Control最新文献

筛选
英文 中文
PI control design based on sensitivity analysis and genetic algorithms 基于灵敏度分析和遗传算法的PI控制设计
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449716
Shan-Chang Hsieh, J. Perng, Li-Shan Ma
{"title":"PI control design based on sensitivity analysis and genetic algorithms","authors":"Shan-Chang Hsieh, J. Perng, Li-Shan Ma","doi":"10.1109/ISIC.2012.6449716","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449716","url":null,"abstract":"In this paper, the application of PI control design is presented by use of the sensitivity function and the genetic algorithm. A systematic procedure is proposed to improve the result of the sensitivity function for PI control in the literature. By doing this, a certain gain margin (GM) and phase margin (PM) of PI control systems can be guaranteed. In order to obtain the stability boundary of the PI control systems in parameter space, the Tan's method is adopted here. In addition, the genetic algorithm is applied to fulfill the specifications of integral of absolute error (IAE). Moreover, this method is also utilized to design the PI controller of Kharitonov plants. Computer simulations show the effectiveness of the proposed method.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130679958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis on PHOTON hash function using cube attack 基于立方体攻击的光子哈希函数密码分析
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449760
Chia-Yu Lu, You Lin, S. Jen, J. Yang
{"title":"Cryptanalysis on PHOTON hash function using cube attack","authors":"Chia-Yu Lu, You Lin, S. Jen, J. Yang","doi":"10.1109/ISIC.2012.6449760","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449760","url":null,"abstract":"The lightweight hash function PHOTON has shown excellent hardware compactness which almost reaches the theoretical optimum and brings benefits for on-tag applications. Unlike cryptanalysis which tries to find collisions or build distinguishers on PHOTON, we apply cube attack for secret recovery of PHOTON. We focus on 1 to 3 round of PHOTON-128/16/16 in our experiments. Using cube attack, we show at least half of the message bits can be recovered. When more powerful computing capability is used, it is possible to recover more bits of the message in the same number of PHOTON rounds.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123401623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-level and group-based key management for mobile ad hoc networks 移动自组织网络的多级和基于组的密钥管理
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449732
Hsiao-Ching Lin, Ming-Kung Sun, Hui-Tang Lin, W. Kuo
{"title":"Multi-level and group-based key management for mobile ad hoc networks","authors":"Hsiao-Ching Lin, Ming-Kung Sun, Hui-Tang Lin, W. Kuo","doi":"10.1109/ISIC.2012.6449732","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449732","url":null,"abstract":"Mobile ad hoc networks have unique features, such as variable topology and lack of centralized management, therefore key management faces additional difficulty for deployed in this environment. In this paper, a (n, t, n) secret sharing method is applied towards a group-based mobile ad hoc networks architecture to provide authentication and key management services. All nodes participate in key pair generation as shareholders using a threshold secret sharing scheme. This group-based network consists of multi-level participants. The nodes in different levels have different identities. The node identity in a higher-level subset is different from the larger common group. In the subset, shared information is broadcast efficiently and securely without risk of eavesdropping from larger group.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121479605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved “bidirectional quantum secure communication protocol based on a shared private Bell state” 改进的“基于共享私有贝尔状态的双向量子安全通信协议”
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449726
Ching-Ying Lin, T. Hwang
{"title":"Improved “bidirectional quantum secure communication protocol based on a shared private Bell state”","authors":"Ching-Ying Lin, T. Hwang","doi":"10.1109/ISIC.2012.6449726","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449726","url":null,"abstract":"In 2009, Shi et al. [Opt. Commun. 282 (2009) 2460-2463] proposed a bidirectional quantum secure communication protocol based on a shared private Bell state. The protocol allows two legitimate users to exchange their secret messages simultaneously and is free from information leakage. This work tries to use random permutation on photons to reduce the communication cost and enhance the quantum bit efficiency on Shi et al.'s protocol.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122438641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting masses in digital mammograms based on texture analysis and neural classifier 基于纹理分析和神经分类器的数字乳房x光片肿块检测
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449746
Guo-Shiang Lin, Yu-Cheng Chang, Wei-Cheng Yeh, Kai-Che Liu, C. Yeh
{"title":"Detecting masses in digital mammograms based on texture analysis and neural classifier","authors":"Guo-Shiang Lin, Yu-Cheng Chang, Wei-Cheng Yeh, Kai-Che Liu, C. Yeh","doi":"10.1109/ISIC.2012.6449746","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449746","url":null,"abstract":"In the paper, we proposed a mass detection method based on texture analysis and neural classifier. The proposed mass detection method is composed of two parts: ROI selection, feature extraction, and neural classifier. ROI selection is used to reduce the computational complexity of the proposed scheme. In the texture analysis, the intensity and texture information extracted from spatial and wavelet domains are utilized to find the candidates of mass regions. These texture features are extracted and combined with a supervised neural network to be classifier. The experimental result shows that the average recall rate of our proposed scheme is more than 93%. The result demonstrates that our proposed method can achieve mass detection.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"885 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115792202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A hybrid intelligent protocol in sink-oriented wireless sensor networks 面向接收器的无线传感器网络中的混合智能协议
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449707
Hsung-Pin Chang, S. Hsu
{"title":"A hybrid intelligent protocol in sink-oriented wireless sensor networks","authors":"Hsung-Pin Chang, S. Hsu","doi":"10.1109/ISIC.2012.6449707","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449707","url":null,"abstract":"We propose a hybrid intelligent protocol named as CEEP which results in a cross-layered style without creating any extra interfaces for information to provide energy efficiency in sink-oriented wireless sensor networks. Congestion mitigating can serve as a basis for such an efficient protocol on the sensor nodes which are designated to collect and transmit information toward the base station. At the mean time, the entire network life time is extended by improving the energy consumption on each sensor node over the network. The results show that CEEP can boost network fidelity by adapting proactive and reactive routing protocols under heavy traffic and achieve power efficiency for mobile communications under light traffic by determining the smart sleep-wakeup schedules of the sensor nodes. Thereafter, communications with such embedded operation have provided sensor devices an integrated technology to efficiently transceive data packets in sink-oriented wireless sensor networks.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125968902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Simulation-based meta-heuristic approach for booking limits problem at a hotel baby 基于模拟的元启发式方法在酒店婴儿预订限制问题
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449729
S. Horng, Feng-Yi Yang
{"title":"Simulation-based meta-heuristic approach for booking limits problem at a hotel baby","authors":"S. Horng, Feng-Yi Yang","doi":"10.1109/ISIC.2012.6449729","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449729","url":null,"abstract":"In this work, a meta-heuristic approach integrated the genetic algorithm (GA) with ranking and selection (R&S) is proposed to solve for a good enough solution of the hard stochastic simulation optimization problem (SSOP) with huge solution space. First, a rough model is used as a fitness evaluation in the GA to select N roughly good solutions from entire solution space. Then, we proceed with the R&S policy to search for a good enough solution from the N roughly good solutions. Finally, the meta-heuristic approach is applied to a booking limits problem at a hotel baby, which is formulated as a hard SSOP that consists of a huge solution space comprised by the vector of booking limits. The vector of good enough booking limits obtained by the proposed approach is promising in the aspects of solution quality and computational efficiency.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130716564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic quality assessment and preprocessing for three-dimensional face recognition 三维人脸识别的自动质量评估和预处理
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449757
Wei-Yang Lin, Ming-Yang Chen
{"title":"Automatic quality assessment and preprocessing for three-dimensional face recognition","authors":"Wei-Yang Lin, Ming-Yang Chen","doi":"10.1109/ISIC.2012.6449757","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449757","url":null,"abstract":"The quality of biometric samples plays an important role in biometric authentication systems because it has a direct impact on verification or identification performance. In this paper, we present a novel 3D face recognition system which performs quality assessment on input images prior to recognition. More specifically, a reject option is provided to allow the system operator to eliminate the incoming images of poor quality, e.g. failure acquisition of 3D image, exaggerated facial expressions, etc. Furthermore, a fully automatic preprocessing method is presented in this paper. The experimental results show that the 3D face recognition performance is significantly improved by taking the quality of 3D facial images into account. The proposed system achieves the verification rate of 97.09% on the FRGC v2.0 data set.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132616262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Access-controlled video/voice over IP in Hadoop system with BPNN intelligent adaptation Hadoop系统中基于IP的访问控制视频/语音,采用BPNN智能适配
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449772
B. Chang, H. Tsai, Zih-Yao Lin, Chi-Ming Chen
{"title":"Access-controlled video/voice over IP in Hadoop system with BPNN intelligent adaptation","authors":"B. Chang, H. Tsai, Zih-Yao Lin, Chi-Ming Chen","doi":"10.1109/ISIC.2012.6449772","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449772","url":null,"abstract":"In this paper a real-time video/voice over IP (VVoIP) applications has implemented in Hadoop cloud computing system and it is denoted CLC-IHU. It really outperforms the previous VVoIP using P2P connection (called SCTP-IHU) due to the easy-to-use and high-performance on video phone call. User does not need to know what is a real IP and web interface achieves interaction by adopt TCP-based RMTP instead of PR-SCTP so that CLC-IHU scheme reduces computation load and power consumption dramatically at thin clients. We employed a back-propagation neural network (BPNN) to tune key factors appropriately for adapting handoff and analyzing network traffic at any time. As a result it takes about 1.631 sec for the seamless handoff between base stations under mobile wireless network. In access control for preventing illegal intrusions from the outside of the cloud, the rapid facial recognition and fingerprint identification via cloud computing has been done successfully within 2.2 seconds to identify the exact subject.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131132989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An overkill detection system for improving the testing quality of semiconductor 一种提高半导体检测质量的超压检测系统
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449700
Hsin-Wen Ting, Chin-Ming Hsu
{"title":"An overkill detection system for improving the testing quality of semiconductor","authors":"Hsin-Wen Ting, Chin-Ming Hsu","doi":"10.1109/ISIC.2012.6449700","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449700","url":null,"abstract":"The advance in semiconductor testing technology have improved the device quality and reliability. The testing strategy applied to dies at the wafer is definitely an important topic. The wafer-level testing scribes the wafer and selects the good dies for packaging. However, it has become increasingly difficult to identify outliers from the intrinsic distribution at test. The disagreeable overkill is also an issue addressed. In testing house, the common way to judge defects of integrated circuit (IC) is highly related to the empirical knowledge of test engineer. As a result, a systematic testing method is proposed to improve the testing quality in this paper. Applying the system to a real semiconductor product, about 50-% testing time reduction and 99-% testing correctness are achieved.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114465134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信