2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)最新文献

筛选
英文 中文
Study of Lyapunov Exponent Spectra for Axial-Flow Compression System 轴流压缩系统的Lyapunov指数谱研究
Jiangming Yu, J. Zhang, W. Ding, Youli Wu
{"title":"Study of Lyapunov Exponent Spectra for Axial-Flow Compression System","authors":"Jiangming Yu, J. Zhang, W. Ding, Youli Wu","doi":"10.1109/CIS.WORKSHOPS.2007.231","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.231","url":null,"abstract":"The Lyapunov exponent spectra of the axial-flow compression system's Moore-Greitzer model were researched with chaos theory. When the parameter B of the MG model is greater (surge) or smaller (stall), the system's Lyapunov exponent spectra are all (0, -). So the compressor's working points are all on a limit circle, when the compressor is in the state of surge or stall. When the compressor is surge, it can come into a full limit circle, but in the stall, it can not. The conclusion was applied to detect the stall of the compressor. The numerical experimentation results demonstrate that the method can exactly detect the stage of the first stall before the start of deep rotating stall.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128249687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Neural Networks in Wireless Sensor Network Routing Algorithm 神经网络在无线传感器网络路由算法中的应用
Wenhui Zhao, Daxin Liu, Yu Jiang
{"title":"Application of Neural Networks in Wireless Sensor Network Routing Algorithm","authors":"Wenhui Zhao, Daxin Liu, Yu Jiang","doi":"10.1109/CIS.WORKSHOPS.2007.131","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.131","url":null,"abstract":"The paper proposes a new routing algorithm in wireless sensor network. The main idea and the implementing approaches of the algorithm are introduced. The algorithm doesn't require any extra hardware. Simulations show that the algorithm can accomplish routing process correctly and quickly and increase the wireless sensor network's life obviously.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120961162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fuzzy-Dominance and Its Application in Evolutionary Many Objective Optimization 模糊优势及其在进化多目标优化中的应用
Gaoping Wang, Huawei Jiang
{"title":"Fuzzy-Dominance and Its Application in Evolutionary Many Objective Optimization","authors":"Gaoping Wang, Huawei Jiang","doi":"10.1109/CIS.WORKSHOPS.2007.184","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.184","url":null,"abstract":"This paper studies the fuzzification of the Pareto dominance relation and its application to the design of Evolutionary Many-Objective Optimization algorithms. A generic ranking scheme is presented that assigns dominance degrees to any set of vectors in a scale- independent, nonsymmetric and set-dependent manner. Different fuzzy-based definitions of optimality and dominated solution are introduced. The corresponding extension of the Standard Genetic Algorithm, so-called Fuzzy-Dominance GA (FDGA), will be presented as well. To verify the usefulness of such an approach, the approach is tested on analytical test cases in order to show its validity.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121366962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Trusted Computing Enabled Access Control for Virtual Organizations 基于可信计算的虚拟组织访问控制
Jing Zhan, Huanguo Zhang
{"title":"Trusted Computing Enabled Access Control for Virtual Organizations","authors":"Jing Zhan, Huanguo Zhang","doi":"10.1109/CIS.WORKSHOPS.2007.214","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.214","url":null,"abstract":"Grid computing is becoming the prominent paradigm for resource exchange and collaboration, which are supported by dynamic, multi-institutional virtual organizations (VOs) overcoming limitations of time or space. As the de-facto standard for grid security, grid security infrastructure provides no effective mechanism to protect both resource providers and users from access of malicious entities. The trusted computing (TC) technology adopted by the trusted computing group (TCG) defines that an entity can be trusted as long as it always behaves in the expected manner. Specifically, the TC uses a hardware module called trusted platform module (TPM) to ensure the tamper-proof attestative behavior by integrity measurement, logging and report. In this paper, we propose and design a TC enabled system based on Linux and TPM hardware to enforce access control policy for the VO.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121233240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multi-objective Evaluation Strategy for Evolvable Analog Circuit 可进化模拟电路的多目标评价策略
Xia Xue-wen, Li Yuan-xiang
{"title":"Multi-objective Evaluation Strategy for Evolvable Analog Circuit","authors":"Xia Xue-wen, Li Yuan-xiang","doi":"10.1109/CIS.WORKSHOPS.2007.28","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.28","url":null,"abstract":"The researches of evolvable hardware (EHW) have obtained much attention during the past decade. An effective evaluation-function is a crucial problem while searching a correct circuit. The emphasis of majority researchers' experiments, however, was only circuit's function, and little attention had been paid to circuit's validity and practicality such as its complexity and stability. In this paper, an evaluation strategy based on multi-objective is proposed during the progress of evolvable analog circuit, in which many factors have been taken into account during the experiments besides the function. The results of experiments in the paper and practical lessons have indicated that only a circumspect circuit could meet the practical needs.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125834567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Quick Algorithm for Aligning DNA/RNA Sequences 一种改进的DNA/RNA序列快速比对算法
Q. Zou, Maozu Guo, Yang Liu, Taotao Zhang
{"title":"An Improved Quick Algorithm for Aligning DNA/RNA Sequences","authors":"Q. Zou, Maozu Guo, Yang Liu, Taotao Zhang","doi":"10.1109/CIS.WORKSHOPS.2007.58","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.58","url":null,"abstract":"Biology sequence database search is an important problem for bioinformatics research. The main search software BLAST is based on the BYP algorithm. In BYP, if the length of hit region is set long, it may lose similar appearance. Otherwise, there may be too many r-length regions from Aho-Corasik algorithm. Checking where exists any approximate alignments for the DNA or RNA sequence always spends much time, although the expected running time of BYP is linear. A new algorithm is proposed from the viewpoint of shorting the length and increasing the number of the regions, which can make most of the false r-length regions excluded. Thus the algorithm can align the DNA or RNA sequences quickly since the rate of real r- length regions is increased. Experimental results show that the proposed algorithm is computational efficient and achieves good performance.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124123908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptanalysis of MAJE4 MAJE4的密码分析
M. A. Orumiehchiha, E. Shakour
{"title":"Cryptanalysis of MAJE4","authors":"M. A. Orumiehchiha, E. Shakour","doi":"10.1109/CIS.WORKSHOPS.2007.161","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.161","url":null,"abstract":"In this paper, some weak points in design of MAJE4 algorithm are probed and by exploiting them, two cryptographic attacks are proposed for both versions (128-bit, 256-bit). It is proved that MAJE4 is vulnerable against key recovery attack with complexity less than exhaustive search. We show the security of MAJE4-128, -256 are not greater than 296 and 2106 respectively. And also, a distinguish attack is examined that can recognize the output running keys from a truly random stream with data complexity of 278.8 and 284.8 output words for MAJE4-128 and MAJE4-256 respectively.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134300576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Speech Quality of IEEE 802.11b and 802.11g Wireless LANs IEEE 802.11b和802.11g无线局域网的语音质量
Yuanfeng Liu, Minghui Du
{"title":"Speech Quality of IEEE 802.11b and 802.11g Wireless LANs","authors":"Yuanfeng Liu, Minghui Du","doi":"10.1109/CIS.WORKSHOPS.2007.11","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.11","url":null,"abstract":"As 802.11g devices develop, it is possible for WLANs to support heavy voice communications. In this paper, an improved evaluation model which presents more detail on voice communications is introduced. The best and acceptable speech quality speech quality of 802.11b and 802.11g WLANs are obtained and compared to the theoretical results. The effect of playout algorithms are compared which come to conclusion that the playout algorithms play a more important role as the network condition getting worse.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133115579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Expert System of Product Design Based on CBR and GA 基于CBR和遗传算法的产品设计专家系统
Lai Chaoan
{"title":"The Expert System of Product Design Based on CBR and GA","authors":"Lai Chaoan","doi":"10.1109/CIS.WORKSHOPS.2007.43","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.43","url":null,"abstract":"This paper presents a simultaneous optimization method of a case-based reasoning (CBR) system using a genetic algorithm (GA) for product designing. Prior research proposed many hybrid models of CBR and the GA for product design. However, those models were not good at aiding at creative designing. In this study, CBR and GA combine with a algorithm process for simulation of directed similarity association according to human being's thought models. Experimental results show that the new hybrid model outperforms other conventional approaches for creative design.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133814071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Research of Broken Filaments Detection Device on Viscose Filament Yarn 粘胶长丝断丝检测装置的研究
L. Jun
{"title":"The Research of Broken Filaments Detection Device on Viscose Filament Yarn","authors":"L. Jun","doi":"10.1109/CIS.WORKSHOPS.2007.223","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.223","url":null,"abstract":"In this paper, on the basis of researching several methods for broken filaments detecting in-depth, we have designed a real-time broken filaments detection device in the process of viscose filament yarn winding. The detection device is used for detecting broken filaments by illuminating broken filaments on viscose filament yarn. The broken filaments will become an enlargement image on the sensitive surface of the photoelectric sensor. The image will cause luminous flux of photoelectric cell to weaken, by monitoring the signal, and the system can detect and count the broken filaments. The accuracy of the viscose filament measurement system is reliable and low cost.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122394951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信