2010 International Conference on Computational Intelligence and Security最新文献

筛选
英文 中文
An Improved Fog-Degrading Image Enhancement Algorithm Based on the Fuzzy Contrast 一种改进的基于模糊对比度的降雾图像增强算法
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.130
Huiyan Liu, Wenzhang He, R. Liu
{"title":"An Improved Fog-Degrading Image Enhancement Algorithm Based on the Fuzzy Contrast","authors":"Huiyan Liu, Wenzhang He, R. Liu","doi":"10.1109/CIS.2010.130","DOIUrl":"https://doi.org/10.1109/CIS.2010.130","url":null,"abstract":"This paper constructs a fuzzy contrast enhancement algorithm and then combination with mathematical morphology to improve the fog blurred images which captured in bad weather. In this algorithm, we improve the membership function of fuzzy domain and its inverse operation. Meanwhile, we define a new more effective function which can calculate the pixel gray membership function after enhanced. Experimental results show that the contrast and clarity of images are much improved after they are processed by the algorithm which proposed in this paper, and it effectively improves the gray and blocking effect which arises in the sky region and the visual quality of the whole image significantly.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117123533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
USB Key-Based Dual-Factor Dynamic Authentication Scheme 基于USB密钥的双因素动态认证方案
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.103
Lei Li, QUAN LIU, Xuemei Jiang
{"title":"USB Key-Based Dual-Factor Dynamic Authentication Scheme","authors":"Lei Li, QUAN LIU, Xuemei Jiang","doi":"10.1109/CIS.2010.103","DOIUrl":"https://doi.org/10.1109/CIS.2010.103","url":null,"abstract":"In the Digital Rights Management (DRM) platform, the weak security of user authentication online and the digital content usage offline are analyzed, and a dual-factor dynamic authentication scheme is designed, which is based on the Personal Identity Number (PIN) authentication and the hardware USB Key digital certificate authentication. On this basis, the architecture of the dynamic certification scheme is discussed mainly, and the dual-factor security authentication protocol is elaborated in detail. The feasibility of this scheme in the DRM platform is analyzed. The scheme not only strengthens the security and dynamic of the identity authentication, but also enhances reliability against offline proliferation.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132512363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Study of Credit Risk Evaluation Based on DEA Method 基于DEA方法的信用风险评估研究
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.25
Huaipeng Li, Sulin Pang
{"title":"The Study of Credit Risk Evaluation Based on DEA Method","authors":"Huaipeng Li, Sulin Pang","doi":"10.1109/CIS.2010.25","DOIUrl":"https://doi.org/10.1109/CIS.2010.25","url":null,"abstract":"Based on studying the KMV default distance model, the work of this paper is to calculate the default distance using BCC model in DEA methodology to quantify the credit risk. The principle idea is to use DEA value of the company to replace the market value of the company in KMV model, and use average DEA points of ST companies within the industry instead of default point, then get the Default Distance. The third part is an empirical analysis which using 17 Chinese textile companies in 2007 and 2008, the result shows that default distance calculated with the DEA method does not completely reflect the company's credit risk, but as a discussion of method, the default distance with the DEA method still have research value.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131315255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Reputation Calculation Model in E-Shopping Websites 电子购物网站的信誉计算模型
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.146
Shiyu Wang, Sulin Pang
{"title":"A Reputation Calculation Model in E-Shopping Websites","authors":"Shiyu Wang, Sulin Pang","doi":"10.1109/CIS.2010.146","DOIUrl":"https://doi.org/10.1109/CIS.2010.146","url":null,"abstract":"In this paper, with the combination of the latest research achievement of reputation calculation model, we improve the existing reputation calculation model in E-shopping websites. The improved model is applied to effective and accurate calculate seller’s reputation status in E-shopping websites. Experiments show that compared with the original reputation calculation model, the improved model is more stability and accuracy.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"1999 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123551692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probability Based Approach for Target Detection and Pose Estimation in Infrared Images 基于概率的红外图像目标检测与姿态估计方法
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.132
Weiguang Liu, Hailing Lai
{"title":"Probability Based Approach for Target Detection and Pose Estimation in Infrared Images","authors":"Weiguang Liu, Hailing Lai","doi":"10.1109/CIS.2010.132","DOIUrl":"https://doi.org/10.1109/CIS.2010.132","url":null,"abstract":"This paper presents the challenging issue of target detecting and pose estimation in Forward Looking Infrared (FLIR) sequences. Target detecting and pose estimation are formulated as one process. Specifically, a new mixture of Gaussians model is proposed to detect target appearances. A probability based method is used to estimate the target position and size, where the detected appearance plays an important role. Our probability-based algorithm is compared against the existing methods and experiments on the FLIR dataset validate its effectiveness.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122307189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient and Reliable Broadcast Protocol for Clustered Wireless Sensor Networks 高效可靠的集群无线传感器网络广播协议
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.112
J. Guo, Z. Zhong
{"title":"Efficient and Reliable Broadcast Protocol for Clustered Wireless Sensor Networks","authors":"J. Guo, Z. Zhong","doi":"10.1109/CIS.2010.112","DOIUrl":"https://doi.org/10.1109/CIS.2010.112","url":null,"abstract":"Broadcasting is an important method of communication in wireless sensor network, the reliability and security of broadcast should be satisfied. Also, due to the limited resources of sensors, reducing the energy consumption is a major consideration. In this paper, we proposed an efficient and reliable broadcast protocol for clustered WSN (ERBP). In ERBP, nodes need its 1-hop neighborhood information so that the cluster head could establish a small route table used to transmit message to neighbor cluster head. Only cluster heads perform signature verification and normal nodes in the cluster authenticate the message using key chain generated by a public one-way function. Analysis and simulation show that our protocol has better performances than many existing schemes in terms of reliability, scalability, security and efficiency.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"57 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114113424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Hybrid Approach for Solving Nonlinear Bilevel Programming Problems Using Genetic Algorithms 用遗传算法求解非线性双层规划问题的混合方法
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.29
Hecheng Li, Yuping Wang
{"title":"A Hybrid Approach for Solving Nonlinear Bilevel Programming Problems Using Genetic Algorithms","authors":"Hecheng Li, Yuping Wang","doi":"10.1109/CIS.2010.29","DOIUrl":"https://doi.org/10.1109/CIS.2010.29","url":null,"abstract":"The paper focuses on a special nonlinear bilevel programming problem(BLPP), and its characteristic is that the follower's programming is convex and quadratic, whereas there are no any additional requirements for the leader's functions. In order to solve the complex problem efficiently, it is first converted into an equivalent single-level programming by using Karush-Kuhn-Tucher (K-K-T) conditions, and then a hybrid genetic algorithm(HGA), combined with an enumeration technique of the bases, is proposed to solve the equivalent problem. At first, a mixed encoding scheme is given, involving the leader's variables and the bases of the follower's linear complementarity system, In addition, we present a fitness function which consists of the leader's objective and a penalty term, and by which the feasible and infeasible individuals can be identified. In order to illustrate the efficiency of HGA, 10 test problems selected from literature are solved, and the computational results show that the proposed algorithm is efficient and robust.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121850144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive Evaluation Model of Web Service Based on Artificial Immune Network 基于人工免疫网络的Web服务自适应评价模型
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.107
Weitao Ha, Liping Chen
{"title":"An Adaptive Evaluation Model of Web Service Based on Artificial Immune Network","authors":"Weitao Ha, Liping Chen","doi":"10.1109/CIS.2010.107","DOIUrl":"https://doi.org/10.1109/CIS.2010.107","url":null,"abstract":"There will be many Web services in the future, which have the similar or same functions, the optimization selection for these Web services is difficult for user. To solve the problem, this paper presents an adaptive evaluation model of Web service based on artificial immune network. Evaluation tree is established that is adaptive for different services. According leaves of evaluation tree, vectors of Qos attributes are acquired form performance monitoring module. AiNet immune algorithm with new mechanism of antibody promotion and suppression is used by which vectors of Qos attributes are clustered. Using a cluster with maximum sample number, average value of Qos is gotten. According to average value Web service level is defined. When values of Qos outweigh average value, these Web service will be considered to have high quality, and they can satisfy the needs of users. It is proved by experiment results that the model is effective and able to overcome the localization of the existing methods which are only based on function-optimized selection for Web services.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117006677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Outward Foreign Direct Investment and Industry Structural Optimization: Analysis and Testing on Data of Republic of Korea 对外直接投资与产业结构优化:韩国数据的分析与检验
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1109/CIS.2010.140
Renfang Liang, Ling Bing
{"title":"Outward Foreign Direct Investment and Industry Structural Optimization: Analysis and Testing on Data of Republic of Korea","authors":"Renfang Liang, Ling Bing","doi":"10.1109/CIS.2010.140","DOIUrl":"https://doi.org/10.1109/CIS.2010.140","url":null,"abstract":"This paper uses the data of Korea and analyzes its outward foreign direct investment and its domestic industry structural optimization. The Granger causality test results indicate that Korea’s outward FDI does help explain the changes of the proportion of Korea’s second industry and the tertiary industry, but couldn’t help explain the changes of the proportion of the first industry. The cointegration test results indicate that there are long term equilibrium relationship existing between Korea’s outward investment and its second and tertiary industry respectively. Vector Error Correction estimates indicates that the short term correction will be conducted with a stable speed to draw back any diversion of the cointegration equilibrium. This shows that there is a long term relationship between Korea’s outward FDI and its industrial structural optimization, and there is a correction mechanism functioning well in the process. From the analysis, it is clear that Chinese government should greatly encourage its enterprises’ outward investment and thus optimize the domestic industry.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115120732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Neural Network Clustering Based Algorithm for Privacy Preserving Data Mining 基于神经网络聚类的隐私保护数据挖掘算法
2010 International Conference on Computational Intelligence and Security Pub Date : 2010-12-11 DOI: 10.1007/978-3-642-17625-8_27
Stergios G. Tsiafoulis, V. Zorkadis
{"title":"A Neural Network Clustering Based Algorithm for Privacy Preserving Data Mining","authors":"Stergios G. Tsiafoulis, V. Zorkadis","doi":"10.1007/978-3-642-17625-8_27","DOIUrl":"https://doi.org/10.1007/978-3-642-17625-8_27","url":null,"abstract":"","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124823718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信