2012 International Conference on Information Security and Intelligent Control最新文献

筛选
英文 中文
Motion estimation of depth map based on perceptual attention region 基于感知注意区域的深度图运动估计
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449742
Pei-Jun Lee, Chun-Yuan Cheng
{"title":"Motion estimation of depth map based on perceptual attention region","authors":"Pei-Jun Lee, Chun-Yuan Cheng","doi":"10.1109/ISIC.2012.6449742","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449742","url":null,"abstract":"This paper proposes a new solution to improve the coding efficiency of depth map in 2D plus depth map of 3D video coding. The proposed algorithm is achieved to reduce coding time on using H.264 encoding for both color image and depth map and to enhance the encoding quality for 2D MV sharing to depth encoding. The method uses 3D perceptual attention regions to determine re-motion estimation MBs in depth map. Moreover, to reduce the coding time for the remotion estimation, the proposed algorithm achives a fast mode decision MBs by motion activity to select coding mode. Experimental results show that the entire encoding time is reduced by about 41.09% compared with the exhaustive full mode decision approach, and the SSIM is increased by about 0.0764 and the PSNR is increased by about 6.7685dB compared with the MV sharing approach.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123095714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust H∞ switching control for uncertain discrete switched time-delay systems 不确定离散切换时滞系统的鲁棒H∞切换控制
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449767
C. Lien, K. Yu, Hao‐Chin Chang
{"title":"Robust H∞ switching control for uncertain discrete switched time-delay systems","authors":"C. Lien, K. Yu, Hao‐Chin Chang","doi":"10.1109/ISIC.2012.6449767","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449767","url":null,"abstract":"In this paper, some delay-dependent LMI stabilization criteria are proposed to design H∞ switching control and switching signal for discrete switched system with interval time-varying delay. Some nonnegative inequalities are used to improve the conservativeness of the proposed results. Finally, a numerical example is illustrated to show the main proposed result.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127991252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy-based target tracking on “Vehicular Grid Sensor Networks” 基于模糊的“车载网格传感器网络”目标跟踪
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449724
Yih-Fuh Wang, Chan Wu
{"title":"Fuzzy-based target tracking on “Vehicular Grid Sensor Networks”","authors":"Yih-Fuh Wang, Chan Wu","doi":"10.1109/ISIC.2012.6449724","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449724","url":null,"abstract":"In Vehicular Grid Sensor Network (VGSN), because the operation of individual vehicles and mobile speed and direction, contact between them fragile and unstable. It has multicast links suddenly fail to overcome the problems, so that the message flows to each node, and increase the volume of traffic control. In this paper, we propose a fuzzy-based target tracking scheme that will re-route the link path when the link becomes weak so as to maintain the vehicle-to-vehicle connections to make the whole VSN more stable. In addition, due to the arbitrary speeds of vehicles, the sensors installed in different vehicles may have different reaction times. We also take into account a suitable alarm range as the moving speed changes, although this action increases the control overhead. Despite this reduction in average latency, this intelligent approach enables higher survivability and more effective on re-routing.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124385283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient delegation protocol in mobile RFID networks 移动RFID网络中一种高效的授权协议
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449731
Jia-Ning Luo, Ming-Hour Yang
{"title":"An efficient delegation protocol in mobile RFID networks","authors":"Jia-Ning Luo, Ming-Hour Yang","doi":"10.1109/ISIC.2012.6449731","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449731","url":null,"abstract":"In this paper, we propose a new protocol to allow delegation transfer between offline mobile readers in the mobile RFID (Radio Frequency Identification) environment. A mobile reader can grant the access rights of a specific tag from another reader. Besides, our protocol is efficient and secure against most current network threats, such as replay attacks, Man-in-the-Middle (MITM) attacks, denial of service (DoS) attacks caused by asynchronous update, guessing attacks, and counterfeit tags. It also guarantees forward/backward secrecy, data privacy, and location privacy.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"26 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130753922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face recognition based on collaborative image similarity assessment 基于协同图像相似度评估的人脸识别
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449754
Deng-Yuan Huang, T. Lin, Wu-Chih Hu, Mu-Song Chen
{"title":"Face recognition based on collaborative image similarity assessment","authors":"Deng-Yuan Huang, T. Lin, Wu-Chih Hu, Mu-Song Chen","doi":"10.1109/ISIC.2012.6449754","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449754","url":null,"abstract":"In this paper, we propose an innovative approach for face recognition based on collaborative image similarity assessment (CISA). In the proposed method, the test sample is first represented by a linear combination of all the training samples for each face class. The classification task is then conducted using the similarity measures including structure similarity index measure (SSIM), root mean square (RMS), and similarity assessment value (SAV). Since CISA is only one phase, it is computationally efficient when comparing with the method of two-phase test sample sparse representation (TPTSR). To verify the performance of face classification, two popular face databases of the ORL and FERET are used. Results show that CISA is comparable with TPTSR on the classification rates for ORL database. However, CISA greatly outperforms TPTSR on the evaluation of the FERET database. Moreover, only 276.4ms on an average is required for CISA in the classification of each test sample but it needs 800.8ms for TPTSR.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132224256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Online transductive support vector machines for classification 用于分类的在线转换支持向量机
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449755
Mu-Song Chen, Tze-Yee Ho, D. Huang
{"title":"Online transductive support vector machines for classification","authors":"Mu-Song Chen, Tze-Yee Ho, D. Huang","doi":"10.1109/ISIC.2012.6449755","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449755","url":null,"abstract":"Transductive support vector machine (TSVM) is one kind of transductive inference process, which combines labeled samples with unlabelled samples to derive the decision rules for classification tasks. Compared with the classical SVM, the transductive SVM is more robust and can achieve better performance. However, there are some disadvantages still being explored. One of the vital drawbacks is its computational costs. Usually, the SVM and TSVM models need to be retrained from scratch for parameter variations whenever any new samples become available. This problem has hindered the use of transduction learning in many real world applications. To resolve these problems, the online transductive support vector machine (OTSVM) is present to improve the generalization performance of the TSVM model. The OTSVM integrates the incremental learning/decremental unlearning to learn new incoming unlabeled samples one by one and modifies its model parameters at the same time. In addition to this, the OTSVM also dynamically adjusts the labels of unmatched samples. Simulation results illustrate that the OTSVM can improve classification performance and increase its computational efficiency.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"350 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133047378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Efficient Fine-grained Access Control mechanism for database outsourcing service 面向数据库外包服务的高效细粒度访问控制机制
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449709
T. Hue, G. N. Luyen, N. D. Kha, S. Wohlgemuth, I. Echizen, D. Thuc, T. B. D. Thuy
{"title":"An Efficient Fine-grained Access Control mechanism for database outsourcing service","authors":"T. Hue, G. N. Luyen, N. D. Kha, S. Wohlgemuth, I. Echizen, D. Thuc, T. B. D. Thuy","doi":"10.1109/ISIC.2012.6449709","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449709","url":null,"abstract":"In database outsourcing service, the data owners store their databases at the servers which belong to potentially untrusted service providers. It is necessary to protect outsourced data from unauthorized access. However, by using existing access control mechanisms, data owners are incapable of controlling access to individual sensitive attributes of their data. In this paper, we propose an Efficient Fine-grained Access Control mechanism, named EFGAC, which can restrict access to the more sensitive columns of the shared relation. EFGAC can handle most of dynamic updates on users or dataset or access rights efficiently without the need of the systematic reconstruction or database re-keying. Experimental results show that EFGAC can save a worthy amount of key derivation time of users and reduce the number of keys held by each user in the system. Especially, we suggest strategies which are useful for the data owner in deciding the necessary number of keys in both static and dynamic cases of outsourcing.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117156631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The design of P2P-based VoD system with VCR functionality 基于p2p的具有VCR功能的VoD系统的设计
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449728
Ching-Lung Chang, Sih-Ping Huang
{"title":"The design of P2P-based VoD system with VCR functionality","authors":"Ching-Lung Chang, Sih-Ping Huang","doi":"10.1109/ISIC.2012.6449728","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449728","url":null,"abstract":"Peer-to-Peer (P2P) network structure is widely employed for video streaming applications due to its high stability, flexible extensibility and ability to share data stream loading among different peer nodes. This paper proposes an interleaved video frame distribution (IVFD) scheme to resourcefully support full VCR functionalities in P2P environment without searching new source. Instead of acquiring video stream data from a single parent peer, each client peer in the IVFD scheme can simultaneously acquire interleaved video data from multiple parent peers. When a client peer carries out arbitrary VCR operations, such as jumps, fast forward/rewind, those parent peers will be able to provide un-continued video stream data for the client peer. As a result, no video source searching is necessary. Simulation results reveal an excellent load distribution performance and a closed to zero response latency for VCR operations.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"225 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120928524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on address shortage in a tree based ZigBee network 基于树的ZigBee网络地址短缺问题研究
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449710
Y. Lv
{"title":"Research on address shortage in a tree based ZigBee network","authors":"Y. Lv","doi":"10.1109/ISIC.2012.6449710","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449710","url":null,"abstract":"This paper reports the development of a mobile health profile which dedicates to mobile applications. Since mobile sensors have to be carried by patients, the mobile health profile must facilitate mobility. In this investigation, a ZigBee fixed-mobile network (ZFMN) is defined and developed to supplement the Zigbee Health Care Profile for patient monitoring. The mobility study of ZigBee is performed using a random waypoint ΟΡΝΈΤ simulation model In a ZFMN, the critical issue of address shortage is identified and discussed. It is analyzed that the problematic address shortage in a ZFMN may generate a huge amount of orphaned end devices and thus the packet drop percentage may potentially rise to 70%, rendering the network unable to function properly. Without introducing additional governing schemes, it is evaluated that the communication of the entire ZigBee network may paralyze. Further vigorous test are performed (by OPNET) on the communication capability of ZFMN when devices are randomly moving and sending data in Is. It is vital to point out that under the adverse condition of address shortage, the performance of a ZFMN is still encouraging as long as the packet drop percentage has been kept below 3% before running out of address.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124380058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A high coherent utility fuzzy itemsets mining algorithm 一种高相干实用模糊项集挖掘算法
2012 International Conference on Information Security and Intelligent Control Pub Date : 2012-08-01 DOI: 10.1109/ISIC.2012.6449720
Chun-Hao Chen, Ai-Fang Li, Yeong-Chyi Lee
{"title":"A high coherent utility fuzzy itemsets mining algorithm","authors":"Chun-Hao Chen, Ai-Fang Li, Yeong-Chyi Lee","doi":"10.1109/ISIC.2012.6449720","DOIUrl":"https://doi.org/10.1109/ISIC.2012.6449720","url":null,"abstract":"In this paper, we propose an algorithm for mining high coherent utility fuzzy itemsets (HCUFI) from quantitative transactions with the properties of propositional logic. It first transforms quantitative transactions into fuzzy sets. Then, utility of each fuzzy itemsets is then calculated according to the given external utility table. If the value is large than or equals to the minimum utility ratio, it will be considered as a High Utility Fuzzy Itemset (HUFI). Finally, contingency tables are calculated and used for checking those HUFI satisfy specific four criteria or not. If yes, it is a High Coherent Utility Fuzzy Itemsets (HCUFI). Experiments on the foodmart dataset are also made to show the effectiveness of the proposed algorithm.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信