{"title":"An Improved Fog-Degrading Image Enhancement Algorithm Based on the Fuzzy Contrast","authors":"Huiyan Liu, Wenzhang He, R. Liu","doi":"10.1109/CIS.2010.130","DOIUrl":"https://doi.org/10.1109/CIS.2010.130","url":null,"abstract":"This paper constructs a fuzzy contrast enhancement algorithm and then combination with mathematical morphology to improve the fog blurred images which captured in bad weather. In this algorithm, we improve the membership function of fuzzy domain and its inverse operation. Meanwhile, we define a new more effective function which can calculate the pixel gray membership function after enhanced. Experimental results show that the contrast and clarity of images are much improved after they are processed by the algorithm which proposed in this paper, and it effectively improves the gray and blocking effect which arises in the sky region and the visual quality of the whole image significantly.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117123533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"USB Key-Based Dual-Factor Dynamic Authentication Scheme","authors":"Lei Li, QUAN LIU, Xuemei Jiang","doi":"10.1109/CIS.2010.103","DOIUrl":"https://doi.org/10.1109/CIS.2010.103","url":null,"abstract":"In the Digital Rights Management (DRM) platform, the weak security of user authentication online and the digital content usage offline are analyzed, and a dual-factor dynamic authentication scheme is designed, which is based on the Personal Identity Number (PIN) authentication and the hardware USB Key digital certificate authentication. On this basis, the architecture of the dynamic certification scheme is discussed mainly, and the dual-factor security authentication protocol is elaborated in detail. The feasibility of this scheme in the DRM platform is analyzed. The scheme not only strengthens the security and dynamic of the identity authentication, but also enhances reliability against offline proliferation.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132512363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Study of Credit Risk Evaluation Based on DEA Method","authors":"Huaipeng Li, Sulin Pang","doi":"10.1109/CIS.2010.25","DOIUrl":"https://doi.org/10.1109/CIS.2010.25","url":null,"abstract":"Based on studying the KMV default distance model, the work of this paper is to calculate the default distance using BCC model in DEA methodology to quantify the credit risk. The principle idea is to use DEA value of the company to replace the market value of the company in KMV model, and use average DEA points of ST companies within the industry instead of default point, then get the Default Distance. The third part is an empirical analysis which using 17 Chinese textile companies in 2007 and 2008, the result shows that default distance calculated with the DEA method does not completely reflect the company's credit risk, but as a discussion of method, the default distance with the DEA method still have research value.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131315255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reputation Calculation Model in E-Shopping Websites","authors":"Shiyu Wang, Sulin Pang","doi":"10.1109/CIS.2010.146","DOIUrl":"https://doi.org/10.1109/CIS.2010.146","url":null,"abstract":"In this paper, with the combination of the latest research achievement of reputation calculation model, we improve the existing reputation calculation model in E-shopping websites. The improved model is applied to effective and accurate calculate seller’s reputation status in E-shopping websites. Experiments show that compared with the original reputation calculation model, the improved model is more stability and accuracy.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"1999 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123551692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probability Based Approach for Target Detection and Pose Estimation in Infrared Images","authors":"Weiguang Liu, Hailing Lai","doi":"10.1109/CIS.2010.132","DOIUrl":"https://doi.org/10.1109/CIS.2010.132","url":null,"abstract":"This paper presents the challenging issue of target detecting and pose estimation in Forward Looking Infrared (FLIR) sequences. Target detecting and pose estimation are formulated as one process. Specifically, a new mixture of Gaussians model is proposed to detect target appearances. A probability based method is used to estimate the target position and size, where the detected appearance plays an important role. Our probability-based algorithm is compared against the existing methods and experiments on the FLIR dataset validate its effectiveness.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122307189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient and Reliable Broadcast Protocol for Clustered Wireless Sensor Networks","authors":"J. Guo, Z. Zhong","doi":"10.1109/CIS.2010.112","DOIUrl":"https://doi.org/10.1109/CIS.2010.112","url":null,"abstract":"Broadcasting is an important method of communication in wireless sensor network, the reliability and security of broadcast should be satisfied. Also, due to the limited resources of sensors, reducing the energy consumption is a major consideration. In this paper, we proposed an efficient and reliable broadcast protocol for clustered WSN (ERBP). In ERBP, nodes need its 1-hop neighborhood information so that the cluster head could establish a small route table used to transmit message to neighbor cluster head. Only cluster heads perform signature verification and normal nodes in the cluster authenticate the message using key chain generated by a public one-way function. Analysis and simulation show that our protocol has better performances than many existing schemes in terms of reliability, scalability, security and efficiency.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"57 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114113424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Approach for Solving Nonlinear Bilevel Programming Problems Using Genetic Algorithms","authors":"Hecheng Li, Yuping Wang","doi":"10.1109/CIS.2010.29","DOIUrl":"https://doi.org/10.1109/CIS.2010.29","url":null,"abstract":"The paper focuses on a special nonlinear bilevel programming problem(BLPP), and its characteristic is that the follower's programming is convex and quadratic, whereas there are no any additional requirements for the leader's functions. In order to solve the complex problem efficiently, it is first converted into an equivalent single-level programming by using Karush-Kuhn-Tucher (K-K-T) conditions, and then a hybrid genetic algorithm(HGA), combined with an enumeration technique of the bases, is proposed to solve the equivalent problem. At first, a mixed encoding scheme is given, involving the leader's variables and the bases of the follower's linear complementarity system, In addition, we present a fitness function which consists of the leader's objective and a penalty term, and by which the feasible and infeasible individuals can be identified. In order to illustrate the efficiency of HGA, 10 test problems selected from literature are solved, and the computational results show that the proposed algorithm is efficient and robust.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121850144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Evaluation Model of Web Service Based on Artificial Immune Network","authors":"Weitao Ha, Liping Chen","doi":"10.1109/CIS.2010.107","DOIUrl":"https://doi.org/10.1109/CIS.2010.107","url":null,"abstract":"There will be many Web services in the future, which have the similar or same functions, the optimization selection for these Web services is difficult for user. To solve the problem, this paper presents an adaptive evaluation model of Web service based on artificial immune network. Evaluation tree is established that is adaptive for different services. According leaves of evaluation tree, vectors of Qos attributes are acquired form performance monitoring module. AiNet immune algorithm with new mechanism of antibody promotion and suppression is used by which vectors of Qos attributes are clustered. Using a cluster with maximum sample number, average value of Qos is gotten. According to average value Web service level is defined. When values of Qos outweigh average value, these Web service will be considered to have high quality, and they can satisfy the needs of users. It is proved by experiment results that the model is effective and able to overcome the localization of the existing methods which are only based on function-optimized selection for Web services.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117006677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Outward Foreign Direct Investment and Industry Structural Optimization: Analysis and Testing on Data of Republic of Korea","authors":"Renfang Liang, Ling Bing","doi":"10.1109/CIS.2010.140","DOIUrl":"https://doi.org/10.1109/CIS.2010.140","url":null,"abstract":"This paper uses the data of Korea and analyzes its outward foreign direct investment and its domestic industry structural optimization. The Granger causality test results indicate that Korea’s outward FDI does help explain the changes of the proportion of Korea’s second industry and the tertiary industry, but couldn’t help explain the changes of the proportion of the first industry. The cointegration test results indicate that there are long term equilibrium relationship existing between Korea’s outward investment and its second and tertiary industry respectively. Vector Error Correction estimates indicates that the short term correction will be conducted with a stable speed to draw back any diversion of the cointegration equilibrium. This shows that there is a long term relationship between Korea’s outward FDI and its industrial structural optimization, and there is a correction mechanism functioning well in the process. From the analysis, it is clear that Chinese government should greatly encourage its enterprises’ outward investment and thus optimize the domestic industry.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115120732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Neural Network Clustering Based Algorithm for Privacy Preserving Data Mining","authors":"Stergios G. Tsiafoulis, V. Zorkadis","doi":"10.1007/978-3-642-17625-8_27","DOIUrl":"https://doi.org/10.1007/978-3-642-17625-8_27","url":null,"abstract":"","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124823718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}