{"title":"A dual operating frequency band periodic half-width microstrip leaky-wave antenna","authors":"Yi Ding, Yuanxin Li, Hongzhou Tan, Y. Long","doi":"10.1109/ICIST.2013.6747785","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747785","url":null,"abstract":"The dual operating frequency band periodic half-width microstrip leaky wave antenna (LWA) is presented in this paper. The proposed antenna consists of a series of half-width microstrip LWA with two different sizes. The radiating periods are placed on different sides of the transmission line. The radiating period works in the slow-wave region of the first higher-order mode, and the periodic construction radiates the power out along the edges. The experimental results show that the main lobe scans twice, electronically and continuously, from 131° to 95° in H-plane(y-z plane) when the operating frequency increases from 4.2 GHz to 5.1 GHz, and from 6.7 GHz to 8 GHz. The main lobe directs at the same angle when the antenna works at a different frequency.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"17 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114037230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A dynamic trust updating model based on multiple constraints in wireless mesh networks","authors":"Sancheng Peng, Aimin Yang, Hui Zhong, Ziyuan Feng","doi":"10.1109/ICIST.2013.6747666","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747666","url":null,"abstract":"Due to their distributed nature, wireless mesh networks (WMNs) are vulnerable to various attacks, resulting in untrusted communications. To achieve trusted communications, it is important to build a trust model for executions in a self-organizing and decentralized network environment. However, due to high dynamic and low stability of the nodes, such model is difficult to build for WMNs. In this paper, we propose a new dynamic trust updating model (DTUM) in WMNs, taking into consideration of multiple constraints. Our contributions are in two folds: (1) to ensure that the increase of trust should be slow and the drop of trust should be fast, similar to the trust building process in the real human society; (2) to ensure that the trust fades with time, describing the nature of trust. The effectiveness of our approach is validated through quantitative evaluation analysis.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122424713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huixiang Lv, Xianglin Huang, Lifang Yang, Tao Liu, Ping Wang
{"title":"A k-means clustering algorithm based on the distribution of SIFT","authors":"Huixiang Lv, Xianglin Huang, Lifang Yang, Tao Liu, Ping Wang","doi":"10.1109/ICIST.2013.6747776","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747776","url":null,"abstract":"Bag-of-Words based Image retrieval recently became the research hotspot. To improve the performance of visual word training in Bag-of-Words based image retrieval system, a k-means clustering algorithm based on the distribution of SIFT (Scale Invariant Feature Transform) feature data on each dimension is proposed. The initial clustering centers are obtained by analyzing the distribution of SIFT feature data on each dimension, and combing the iDistance method which is used to partition the data space in high-dimensional indexing according to the data distribution adaptively. Then the AKM (Approximate k-means) is used to do cluster on the sample feature data, train the visual words and get the visual vocabulary finally. In AKM, the k-d tree is built on the cluster centers at the beginning of each iteration to increase speed. The image retrieval system is constructed to verify the performance of our proposed method. Experiments are carried out on the oxford buildings 5k datasets which have 11 landmarks and the mAP (mean Average Precision) is used to evaluate the performance of image retrieval. Our proposed method achieves 31.9% compared to the AKM's 29.8%, so it is clear that our proposed method optimizes the visual words training process and finally improves the bag-of-words based image retrieval performance.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122978737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The effect of coarticulation in disyllabic sequences in Chinese","authors":"Maolin Wang, Guangling Zi, Yisi Liu, Wei Xiong, Ziyu Xiong","doi":"10.1109/ICIST.2013.6747734","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747734","url":null,"abstract":"In this study, the Vowel-to-Vowel (V-to-V) coarticulatory effect in the Vowel-Consonant-Vowel (VCV) sequences is investigated. The stimuli are in the form of C<sub>1</sub>V<sub>1</sub>.C<sub>2</sub>V<sub>2</sub>, which is designed for V<sub>1</sub> to affect V<sub>2</sub>. The subjects are twelve native speakers of standard Chinese, and the F<sub>2</sub> onset value, as well as the F<sub>2</sub> delta value, is analyzed. Results show that, due to long temporal separation between vowels for the aspirated stops relative to the unaspirated ones, the effect of aspiration is obvious, and in the contexts of aspirated stops, the effect of place of articulation is restrained.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"541 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127649834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fast dark channel prior-based depth map approximation method for dehazing single images","authors":"Ting Han, Y. Wan","doi":"10.1109/ICIST.2013.6747789","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747789","url":null,"abstract":"Images of outdoor scenes lose visiblity and contrast due to the presence of atmospheric haze, fog and smoke. The recently proposed dark channel prior-based approach appears to be the most successful solution and produces the best result in most cases. However, this approach suffers from a complex depth map refinement process, which consumes much computational time. In this paper, we propose a novel fast depth map approximation method using the dark channel prior. This approximation makes use of the pixel-wise depth map and the observation that most dehazing artifacts occur in the area in which the original estimated depth map has large difference from its pixel-wise depth map. For fast implementation, we simply replace these edge area depth information by the newly estimated depth information. Experiments show that comparing with the original dark channel approach, the proposed new method has a speedup gain of about 50 or more while at the same time produces similar or better results.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127797723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"External attack of a quantum secret sharing scheme","authors":"Jian-Hong Shi, Shengli Zhang, Zheng-Gang Chang","doi":"10.1109/ICIST.2013.6747680","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747680","url":null,"abstract":"This paper analyzes the security of a quantum secret sharing protocol between multiparty and multiparty, which was proposed by Yan and Gao. We show that this protocol is not secure because an external attacker can obtain the secret message shared by the two groups, making use of entanglement swapping. There are two reasons leading to this result. Firstly, the messages, which are transmitted on the quantum and classical channels, are not protected by message authentication. Secondly, the last participant in group 1 knows more information about the shared secret by the two groups. This result shows that there are some hidden security loopholes in this kind of quantum secret sharing protocols.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127797828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A clustering protocol based on Virtual Area Partition Using Double Cluster Heads scheme for wireless sensor networks","authors":"Dexin Ma, Jian Ma, Pengmin Xu","doi":"10.1109/ICIST.2013.6747810","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747810","url":null,"abstract":"A number of multifunction sensors deployed randomly with limited energy is one character of wireless sensor networks, so energy efficient is a critical factor in sensor network design. In this literature, we present a clustering protocol based on Virtual Area Partition using Double Cluster Heads scheme (VAP-DCH) for wireless sensor networks, which partitions the network and selects a Main Cluster Head (MCH) and a Vice Cluster Head (VCH) in each cluster adaptively. The simulation results show that the protocol we presented improves the system performance, prolongs the network lifetime and transfers more data to the base station..","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129149679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vision control system for quadcopter","authors":"Runfeng Yang, Xi Wang","doi":"10.1109/ICIST.2013.6747547","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747547","url":null,"abstract":"This paper proposes a novel solution for incline detection of UAVs. To investigate the intelligent behavior for a quadcopter, a special robot vision camera is coupled together with a present inclinometer. The purpose of the sensor is to provide sufficiently quick and accurate information to the onboard control system so that it can maintain level attitude for a prolonged period of time. With the contribution of this camera based inclinometer, effectively, the speed of DC motors of blade can be regulated automatically in the corresponding cases to realize the balancing act.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129224976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bottom-up hierarchical real-time risk assessment for information system","authors":"Wan Li, Shengfeng Tian","doi":"10.1109/ICIST.2013.6747693","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747693","url":null,"abstract":"In this paper a bottom-up hierarchical real-time risk assessment approach based on risk propagation is presented. The approach calculates risks of services, hosts and network caused by attack processes in real-time. Risk index and risk status are used to quantify the risk situation. These two concepts are involved with three aspects of attacks: severity, certainty and successful possibility, and with the importance of the assets. Algorithms to calculate the risk index and risk status are proposed, and implementation is briefly introduced. Risk status decay is also proposed, which is important to adaptive response.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129352442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of variable length code decoder for AVS based on FPGA","authors":"Shenghong Li, Zuqiang Wang, Xia Jiang","doi":"10.1109/ICIST.2013.6747741","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747741","url":null,"abstract":"Aiming at the AVS standard which is the audio and video standard of China, an optimized variable length code decoder is proposed for the AVS standard. The design uses an innovative circular shifter to improve decoding parallelism. It optimizes the VLC tables and uses combinational look-up table circuit to avoid memory access. Self-adaptive pipeline technique is adopted to improve decoding speed. The design has been described in Verilog HDL at RTL level, simulated and tested in ModelSim, synthesized and validated on the FPGA chip. The simulation and verification indicates that the decoder can reach the requirement of AVS video decoding.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"52 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129381011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}