2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing最新文献

筛选
英文 中文
Medical Image Feature Extraction and Fusion Algorithm Based on K-SVD 基于K-SVD的医学图像特征提取与融合算法
Hongli Chen, Zhaohua Huang
{"title":"Medical Image Feature Extraction and Fusion Algorithm Based on K-SVD","authors":"Hongli Chen, Zhaohua Huang","doi":"10.1109/3PGCIC.2014.142","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.142","url":null,"abstract":"In order to better fuse the CT and MR images, based on the classical image fusion method, an image feature extraction and fusion algorithm based on K-SVD is presented. The images are sparse representation. The images are divided into blocks via the sliding window. The dictionary is compiled the column vectors. The redundant dictionary is learned by the K-singular value decomposition (K-SVD) algorithm. Then we solve the sparse coefficient matrix for each original image. And combining sparse coefficient of nonzero elements realizes the image feature fusion. Finally, the reconstructed fusion image is obtained from the combined sparse coefficients and the overcomplete dictionary. The method in this paper is capable of extracting image features and the strong anti noise interference. Experiments show that this method better preserves the useful information in the original image and the fusion image details are clear. Compared with other fusion algorithms, the results show that the proposed method has better fusion performance in both noiseless and noisy situations and is superior.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126206758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance of Space Network Time Synchronization Protocol in Proximity Link 近距离链路中空间网络时间同步协议的性能研究
Xiang Lu, Jianxu Liu
{"title":"Performance of Space Network Time Synchronization Protocol in Proximity Link","authors":"Xiang Lu, Jianxu Liu","doi":"10.1109/3PGCIC.2014.135","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.135","url":null,"abstract":"In this work, we consider a space network time synchronization protocol which is based on time information exchanges similar to Network Time Protocol. Further, we analyze the performance of this time protocol due to relative motion with two spacecraft through using STK and Mat lab software jointly simulation. Regard the influencing factors such as relative distance between the two spacecraft, the relative distance changes rate and time synchronization error curve relative motion of spacecraft that impact on the time synchronization accuracy. Finally, under conditions known to spacecraft orbit, this paper utilizes a error curve fitting compensating method to reduce space network time synchronization protocol synchronization in the application of the relative movement state. It is significant improvement in time synchronization errors.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124064711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of WPF-based Mini OA System 基于wpf的小型OA系统的设计与实现
Cheng Wang, Zhixiao Lin, Fangsheng Guotang, Lixiao Zheng, Zhigang Zhu
{"title":"Design and Implementation of WPF-based Mini OA System","authors":"Cheng Wang, Zhixiao Lin, Fangsheng Guotang, Lixiao Zheng, Zhigang Zhu","doi":"10.1109/3PGCIC.2014.45","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.45","url":null,"abstract":"In order to build a practical mini OA system for small and medium enterprise, key business, overall requirement, functional requirements and non-functional requirements of Yardi Kooboo (Xiamen) Technology Co. Ltd. Are analyzed after understanding the company's specific workflow and management processes. Following software engineering, the entire progress of building a WPF-based OA system includes functional module design, database design, achievement of three-tier architecture, achievement of mail cache and so on. Deployment of this new OA system improves the level of information management and obtains good application effect. The development process provides good reference value for the development and research of similar systems.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120836531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Chinese Person Name Recognition Based on Naive Bayes 基于朴素贝叶斯的中国人姓名识别
Hui Zeng, J. Wang, Tao Wan
{"title":"Chinese Person Name Recognition Based on Naive Bayes","authors":"Hui Zeng, J. Wang, Tao Wan","doi":"10.1109/3PGCIC.2014.60","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.60","url":null,"abstract":"On the basis of the traditional Naive Bayesian classification algorithm that just considered character of Chinese person name, we brought person name's up and down boundary words in it. In order to overcome the difficulty of boundary defining, we counted Chinese name's character frequency and boundary templates' frequency from tagged corpus. Then these recognized person names are used to match the missed occurrence in the text. The method is easy and the final result is good. Experimental results show that the F-value for recognition of Chinese person name was increased.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123084995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Analysis of TAU Procedure in LTE Network LTE网络中TAU程序的安全性分析
Li Qiang, Wen’an Zhou, Baojiang Cui, Liu Na
{"title":"Security Analysis of TAU Procedure in LTE Network","authors":"Li Qiang, Wen’an Zhou, Baojiang Cui, Liu Na","doi":"10.1109/3PGCIC.2014.124","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.124","url":null,"abstract":"LTE has become a commercial communication technology worldwide, and its security issues are attracting more and more attention. Tracking Area Update (TAU) is a series of procedures performed by LTE system when users update Tracking Area (TA). The security of TAU procedure directly affects the whole system. This paper first analyzes the security of LTE core networks when the TA updates, then it puts forward a security enhancement scheme by borrowing the thoughts of denial of service (DoS). Therefore, it is important to protect Serving Gateway from overload problems. The proposed scheme is simple, and it also can prevent Serving Gateway from being attacked by malicious requests.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132601249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Survey of Chaos-Based Cryptography 基于混沌的密码学研究综述
P. Zhen, Geng Zhao, L. Min, Xiaodong Li
{"title":"A Survey of Chaos-Based Cryptography","authors":"P. Zhen, Geng Zhao, L. Min, Xiaodong Li","doi":"10.1109/3PGCIC.2014.69","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.69","url":null,"abstract":"As an offshoot of dynamical systems, chaos is highly sensitive to initial conditions and exhibits seemingly random behavior. From the perspective of cryptography and information security, randomness generated from entirely deterministic systems is a very appealing property. Chaotic cryptography has experienced significant developments since its birth in the early 90's. During these years, numerous research achievements have been obtained. This paper will present an overview about chaos-based cryptography and relevant progress that covers the main techniques used in this field.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131800322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Digital Watermarking Algorithm of Color Image based on Visual Cryptography and Discrete Cosine Transform 基于视觉密码和离散余弦变换的彩色图像数字水印算法
Yan-yan Han, Wen-cai He, Shuai Ji, Qing Luo
{"title":"A Digital Watermarking Algorithm of Color Image based on Visual Cryptography and Discrete Cosine Transform","authors":"Yan-yan Han, Wen-cai He, Shuai Ji, Qing Luo","doi":"10.1109/3PGCIC.2014.103","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.103","url":null,"abstract":"In this paper, we propose a new digital watermarking algorithm of color image. We process the watermark to generate two shares based on visual cryptography. And one of the shares is embedded into a color image and another is protected by the copyright. The scheme is easy to implement and highly feasible. In addition, the embedding capacity of watermarks and robustness are improved to effectively.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114203062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Photon Pulses based Heterodyne Detection Precision Ranging System 基于光子脉冲的外差探测精密测距系统
Li-Xia Lei, Yuejin Zhang
{"title":"Photon Pulses based Heterodyne Detection Precision Ranging System","authors":"Li-Xia Lei, Yuejin Zhang","doi":"10.1109/3PGCIC.2014.120","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.120","url":null,"abstract":"A system architecture design photon pulses heterodyne detection system, using the photon pulse photon detection heterodyne principle and statistical theory, based on the establishment of a photon pulses theoretical models ranging accuracy heterodyne detection system. The use of square-wave approximation, based on photon pulses heterodyne detection system typical parameters, mainly to study the effects of noise and temperature parameters ranging accuracy of simulation experiments show that the system can achieve high-precision ranging.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126286405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Reliability and Security in Knowledge Grids 知识网格的可靠性与安全性研究
C. Esposito, M. Ficco, F. Palmieri, V. Loia
{"title":"On Reliability and Security in Knowledge Grids","authors":"C. Esposito, M. Ficco, F. Palmieri, V. Loia","doi":"10.1109/3PGCIC.2014.131","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.131","url":null,"abstract":"Proper knowledge management and advanced semantic reasoning are of pivotal importance in promoting innovation and productivity in a cooperative team and opening new opportunities in commerce, science, and computing applications. To address such a requirements a series of solutions for distributed knowledge management have been proposed over the last decade, among which the most promising is the so-called knowledge grid. Such infrastructures have been traditionally designed for science and educational applications, but they are starting to be progressively used in more critical scenarios, such as disaster management and recovery, or financial services. This imposes the need of providing reliability and security within the context of knowledge grids. The goal of this paper is to define such needs and to describe the correspondence of the available solutions to these needs. Last, we highlight possible space for research opportunities within the topics of reliability and security in knowledge grids.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125956326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
GMCR: A Novel Scheme for Improving Quality of Service of Live Streaming GMCR:一种提高直播服务质量的新方案
Guomin Zhang, Chao Hu, Na Wang, Xianglin Wei, Chang-you Xing
{"title":"GMCR: A Novel Scheme for Improving Quality of Service of Live Streaming","authors":"Guomin Zhang, Chao Hu, Na Wang, Xianglin Wei, Chang-you Xing","doi":"10.1109/3PGCIC.2014.93","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.93","url":null,"abstract":"P2P live streaming system is one of the most popular Internet applications which develop rapidly in the past decade. However, some common problems, such as long startup delay and unsmooth playback, seriously restrict user's experience on live streaming. In this paper, we propose a novel but simple scheme, namely guarantee mechanism of contingency resource (GMCR), which can improve the quality of service (QoS) of live streaming by deploying a contingency server to provide contingency service for those chunks whose playback deadlines are urgent. Then we establish a queuing model to analyze the quantitative relation between the amount of contingency server resources and the level of user's QoS. Finally, we simulate our scheme in a P2P live streaming simulation platform, and obtain the optimal value of some critical parameters. The results of theoretical analysis and simulation experiment present the feasibility and validity of GMCR scheme.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130186344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信