{"title":"Study of Lyapunov Exponent Spectra for Axial-Flow Compression System","authors":"Jiangming Yu, J. Zhang, W. Ding, Youli Wu","doi":"10.1109/CIS.WORKSHOPS.2007.231","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.231","url":null,"abstract":"The Lyapunov exponent spectra of the axial-flow compression system's Moore-Greitzer model were researched with chaos theory. When the parameter B of the MG model is greater (surge) or smaller (stall), the system's Lyapunov exponent spectra are all (0, -). So the compressor's working points are all on a limit circle, when the compressor is in the state of surge or stall. When the compressor is surge, it can come into a full limit circle, but in the stall, it can not. The conclusion was applied to detect the stall of the compressor. The numerical experimentation results demonstrate that the method can exactly detect the stage of the first stall before the start of deep rotating stall.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128249687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Neural Networks in Wireless Sensor Network Routing Algorithm","authors":"Wenhui Zhao, Daxin Liu, Yu Jiang","doi":"10.1109/CIS.WORKSHOPS.2007.131","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.131","url":null,"abstract":"The paper proposes a new routing algorithm in wireless sensor network. The main idea and the implementing approaches of the algorithm are introduced. The algorithm doesn't require any extra hardware. Simulations show that the algorithm can accomplish routing process correctly and quickly and increase the wireless sensor network's life obviously.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120961162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy-Dominance and Its Application in Evolutionary Many Objective Optimization","authors":"Gaoping Wang, Huawei Jiang","doi":"10.1109/CIS.WORKSHOPS.2007.184","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.184","url":null,"abstract":"This paper studies the fuzzification of the Pareto dominance relation and its application to the design of Evolutionary Many-Objective Optimization algorithms. A generic ranking scheme is presented that assigns dominance degrees to any set of vectors in a scale- independent, nonsymmetric and set-dependent manner. Different fuzzy-based definitions of optimality and dominated solution are introduced. The corresponding extension of the Standard Genetic Algorithm, so-called Fuzzy-Dominance GA (FDGA), will be presented as well. To verify the usefulness of such an approach, the approach is tested on analytical test cases in order to show its validity.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121366962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trusted Computing Enabled Access Control for Virtual Organizations","authors":"Jing Zhan, Huanguo Zhang","doi":"10.1109/CIS.WORKSHOPS.2007.214","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.214","url":null,"abstract":"Grid computing is becoming the prominent paradigm for resource exchange and collaboration, which are supported by dynamic, multi-institutional virtual organizations (VOs) overcoming limitations of time or space. As the de-facto standard for grid security, grid security infrastructure provides no effective mechanism to protect both resource providers and users from access of malicious entities. The trusted computing (TC) technology adopted by the trusted computing group (TCG) defines that an entity can be trusted as long as it always behaves in the expected manner. Specifically, the TC uses a hardware module called trusted platform module (TPM) to ensure the tamper-proof attestative behavior by integrity measurement, logging and report. In this paper, we propose and design a TC enabled system based on Linux and TPM hardware to enforce access control policy for the VO.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121233240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-objective Evaluation Strategy for Evolvable Analog Circuit","authors":"Xia Xue-wen, Li Yuan-xiang","doi":"10.1109/CIS.WORKSHOPS.2007.28","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.28","url":null,"abstract":"The researches of evolvable hardware (EHW) have obtained much attention during the past decade. An effective evaluation-function is a crucial problem while searching a correct circuit. The emphasis of majority researchers' experiments, however, was only circuit's function, and little attention had been paid to circuit's validity and practicality such as its complexity and stability. In this paper, an evaluation strategy based on multi-objective is proposed during the progress of evolvable analog circuit, in which many factors have been taken into account during the experiments besides the function. The results of experiments in the paper and practical lessons have indicated that only a circumspect circuit could meet the practical needs.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125834567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Quick Algorithm for Aligning DNA/RNA Sequences","authors":"Q. Zou, Maozu Guo, Yang Liu, Taotao Zhang","doi":"10.1109/CIS.WORKSHOPS.2007.58","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.58","url":null,"abstract":"Biology sequence database search is an important problem for bioinformatics research. The main search software BLAST is based on the BYP algorithm. In BYP, if the length of hit region is set long, it may lose similar appearance. Otherwise, there may be too many r-length regions from Aho-Corasik algorithm. Checking where exists any approximate alignments for the DNA or RNA sequence always spends much time, although the expected running time of BYP is linear. A new algorithm is proposed from the viewpoint of shorting the length and increasing the number of the regions, which can make most of the false r-length regions excluded. Thus the algorithm can align the DNA or RNA sequences quickly since the rate of real r- length regions is increased. Experimental results show that the proposed algorithm is computational efficient and achieves good performance.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124123908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of MAJE4","authors":"M. A. Orumiehchiha, E. Shakour","doi":"10.1109/CIS.WORKSHOPS.2007.161","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.161","url":null,"abstract":"In this paper, some weak points in design of MAJE4 algorithm are probed and by exploiting them, two cryptographic attacks are proposed for both versions (128-bit, 256-bit). It is proved that MAJE4 is vulnerable against key recovery attack with complexity less than exhaustive search. We show the security of MAJE4-128, -256 are not greater than 296 and 2106 respectively. And also, a distinguish attack is examined that can recognize the output running keys from a truly random stream with data complexity of 278.8 and 284.8 output words for MAJE4-128 and MAJE4-256 respectively.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134300576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speech Quality of IEEE 802.11b and 802.11g Wireless LANs","authors":"Yuanfeng Liu, Minghui Du","doi":"10.1109/CIS.WORKSHOPS.2007.11","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.11","url":null,"abstract":"As 802.11g devices develop, it is possible for WLANs to support heavy voice communications. In this paper, an improved evaluation model which presents more detail on voice communications is introduced. The best and acceptable speech quality speech quality of 802.11b and 802.11g WLANs are obtained and compared to the theoretical results. The effect of playout algorithms are compared which come to conclusion that the playout algorithms play a more important role as the network condition getting worse.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133115579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Expert System of Product Design Based on CBR and GA","authors":"Lai Chaoan","doi":"10.1109/CIS.WORKSHOPS.2007.43","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.43","url":null,"abstract":"This paper presents a simultaneous optimization method of a case-based reasoning (CBR) system using a genetic algorithm (GA) for product designing. Prior research proposed many hybrid models of CBR and the GA for product design. However, those models were not good at aiding at creative designing. In this study, CBR and GA combine with a algorithm process for simulation of directed similarity association according to human being's thought models. Experimental results show that the new hybrid model outperforms other conventional approaches for creative design.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133814071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research of Broken Filaments Detection Device on Viscose Filament Yarn","authors":"L. Jun","doi":"10.1109/CIS.WORKSHOPS.2007.223","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.223","url":null,"abstract":"In this paper, on the basis of researching several methods for broken filaments detecting in-depth, we have designed a real-time broken filaments detection device in the process of viscose filament yarn winding. The detection device is used for detecting broken filaments by illuminating broken filaments on viscose filament yarn. The broken filaments will become an enlargement image on the sensitive surface of the photoelectric sensor. The image will cause luminous flux of photoelectric cell to weaken, by monitoring the signal, and the system can detect and count the broken filaments. The accuracy of the viscose filament measurement system is reliable and low cost.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122394951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}