{"title":"An Executable File Encryption Based Scheme for Malware Defense","authors":"Chengua Yan, Min Wu","doi":"10.1109/IWISA.2009.5072713","DOIUrl":"https://doi.org/10.1109/IWISA.2009.5072713","url":null,"abstract":"This paper proposes a scheme for malware defense by encrypting executable files. It is backed by the idea that if an executable file was encrypted, the format of it will become unknown. In order to run such a program, the program loader should be able to access and use the decryption key. And only files decrypted correctly can't be launched. Based on this idea, security rules that make sure only trusted programs can be launched by subjects are defined. Then implementation of the scheme for Windows NT/2000/XP is illustrated, which doesn't require any kinds of modifications to the commercial-off-the-shelf Windows OS with the help of kernel mode file system filter driver and on-the-fly decryption technologies.","PeriodicalId":6327,"journal":{"name":"2009 International Workshop on Intelligent Systems and Applications","volume":"18 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2009-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84998281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research in Role-Enabled and Cooperation Model in Distributed Environment","authors":"Yangfeng Qian, Chun-hua Ju","doi":"10.1109/IWISA.2009.5073039","DOIUrl":"https://doi.org/10.1109/IWISA.2009.5073039","url":null,"abstract":"The paper, in line with the defects of low efficiency and high consumption of resources in interaction process between the existing agents, proposes the idea of separation agent from power logic and the concept of role assignment under the distributed environment and constructs a distributing role assignment and cooperation model DRAC. This model can adjust dynamically its expectation according to its own interests through the mechanism of role assignment and cooperation, which can achieve efficient collaboration through expectation-optimal function based on orthogonal-radix description.","PeriodicalId":6327,"journal":{"name":"2009 International Workshop on Intelligent Systems and Applications","volume":"64 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2009-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85025190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generalized Possibilistic C-Means Clustering Based on Differential Evolution Algorithm","authors":"Fuheng Qu, Siliang Ma, Yating Hu","doi":"10.1109/IWISA.2009.5072884","DOIUrl":"https://doi.org/10.1109/IWISA.2009.5072884","url":null,"abstract":"In this paper, a new clustering model called generalized possibilistic c-means (GPCM) is proposed, and an efficient global optimization technique-differential evolution algorithm is used to optimize the proposed model. GPCM modifies possibilistic c-means (PCM) by limiting each cluster center in a fixed feasible region respectively. The feasible region is determined by the fuzzy c-means clustering algorithms, and then the optimal solution of GPCM model is searched by the differential evolution algorithm within the determined feasible region. GPCM inherits the noise robustness property of PCM, and it eliminates the coincident clusters problem of PCM by limiting different cluster centers in disjoint feasible regions. Experiments on the synthetic and real world data sets illustrate the effectiveness of GPCM.","PeriodicalId":6327,"journal":{"name":"2009 International Workshop on Intelligent Systems and Applications","volume":"33 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2009-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85132447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Control on Work-in-Progress Inventory Based on Biological Modulation Mechanism","authors":"Jiang Wei","doi":"10.1109/IWISA.2009.5072920","DOIUrl":"https://doi.org/10.1109/IWISA.2009.5072920","url":null,"abstract":"Aiming at work-in-progress (WIP) inventory control in manufacturing system, Based on biological modulation mechanism of neuro-endocrine system (NES), a two-level intelligent controller which includes the master controller and the secondary one is presented. The master controller can adjust dynamically the given input value of the secondary one according to the real-time control error. Consequently, the controller can eliminate the control error quickly and stably. Finally, the proposed two-level controller is adopted to control a WIP inventory model, and the simulation results show that the control performance and adaptation of the proposed controller are better than that of the general PED controller.","PeriodicalId":6327,"journal":{"name":"2009 International Workshop on Intelligent Systems and Applications","volume":"78 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2009-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85915012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Arm-Lever Effect Error Based Large Initial Misalignment Transfer Alignment Technology Study","authors":"Guoqiang Ding, Wei-dong Zhou, Yanling Hao, F. Sun","doi":"10.1109/IWISA.2009.5073189","DOIUrl":"https://doi.org/10.1109/IWISA.2009.5073189","url":null,"abstract":"Proceeding from actual needs of AINS initial alignment technology, this paper is specific to rigidity carrier ship, and it deduces the model equations of Airborne Inertial Navigation System's velocity and acceleration (ecificforce) with the effect of arm-lever vector. It employs the method that establishes large initial misalignment angle transfer alignment model of AINS, which is other than traditional velocity and attitude matching algorithm. Basing on nonlinear deterministic particle filtering, it simulates the performance of the model with experimental data, and comparatively studies inhering lever-arm vector error's influence on AINS misalignment attitude angle estimation error and its alignment accuracy. With different initial lever-arm vectors it researches its effects on misalignment attitude angle's estimation error and the accuracy of transfer alignment. The simulation results verify the model's validity and its superior alignment accuracy in transfer alignment of AINS. It is of great theory and application value in design of AINS.","PeriodicalId":6327,"journal":{"name":"2009 International Workshop on Intelligent Systems and Applications","volume":"7 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2009-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80835517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fast Method for Building and Updating Background Model","authors":"Juan Zhu, Yongping Kong","doi":"10.1109/IWISA.2009.5072618","DOIUrl":"https://doi.org/10.1109/IWISA.2009.5072618","url":null,"abstract":"On the basic of the video traffic surveillance system, the Vehicle detection is a crucial step. A typical method is background subtraction. Extracting and updating the background plays an important role on speed and efficiency of detection. For this reason, the author puts forward a fast and effective method for building and updating the background model. First, adopt the improved statistical method to build initial background. Second, get the vista of the picture per frame by means of background subtraction, and bring forward the background updating method based on the container technology. Finally, in its updating stage, use the pixel excluding the pixel in vista region to renew the background model. The data of experimental picture states clearly that competed with the traditional method, detection technology is robust and accurate. Furthermore, on the realization of arithmetic, it is easier to operate and it has higher timeliness.","PeriodicalId":6327,"journal":{"name":"2009 International Workshop on Intelligent Systems and Applications","volume":"48 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2009-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81153192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Inference Trust in P2P Network Environment","authors":"Hongwe Chen, Z. Ye, Wei Liu, Chunzhi Wang","doi":"10.1109/IWISA.2009.5072876","DOIUrl":"https://doi.org/10.1109/IWISA.2009.5072876","url":null,"abstract":"How to build the mutual trust among peers in P2P network is crucial to secure distributed P2P applications. In this paper, we propose to use Mamdani-type fuzzy inference techniques in the design of P2P trust systems based on collecting and aggregating peers' trust value, which can better handle uncertainty and fuzziness in peer trust. There are five parts in the process of P2P trust fuzzy inference: fuzzification of the input variables, application of the fuzzy operator in the antecedent, implication from the antecedent to the consequent, aggregation of the consequents across the rules, and defuzzification. Fuzzy logic inference is clearly effective for distributed trust management in P2P networks.","PeriodicalId":6327,"journal":{"name":"2009 International Workshop on Intelligent Systems and Applications","volume":"20 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2009-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81184770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Particle Swarm Algorithm for the Shortest Bezier Curve","authors":"Shang Gao, Zaiyue Zhang, C. Cao","doi":"10.1109/IWISA.2009.5073001","DOIUrl":"https://doi.org/10.1109/IWISA.2009.5073001","url":null,"abstract":"Bezier curves have become fundamental tools in many challenging and varied applications, ranging from computer- aided geometric design to generic object shape descriptors. Bezier curves have wide applications because they are easy to compute and very stable. Based on analysis of Bezier curve, the problem of the shortest Bezier curve is discussed in this paper. Furthermore, the particle swarm algorithm for this problem is presented. At last, examples are given.","PeriodicalId":6327,"journal":{"name":"2009 International Workshop on Intelligent Systems and Applications","volume":"1 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2009-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82979124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power Plant Equipment Performance Feature Reduction and Weight Allocation Based on Fuzzy Rough Set","authors":"Xiao-feng Dong, Y. Gu, Kun Yang","doi":"10.1109/IWISA.2009.5073012","DOIUrl":"https://doi.org/10.1109/IWISA.2009.5073012","url":null,"abstract":"Case-based reasoning introduced into RCM analysis process simplifies the tasks of RCM analysis and shortens time. However, redundant features may not only increase the case memory, but also make the case retrieval algorithm more complicated. Additionally, traditional methods of weight allocation increase the human subjective influence on the accuracy of case retrieval. This paper applies fuzzy rough set algorithm in feature reduction and weight allocation which is used for case retrieval of similar equipment in RCM analysis case-based reasoning. This method effectively avoids information loss caused by discretizing continuous feature value in cases. Finally, a case study is implemented to steam feed pump performance features.","PeriodicalId":6327,"journal":{"name":"2009 International Workshop on Intelligent Systems and Applications","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2009-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82987685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Road Friction Coefficient Estimation Based on Extended Kalman Filter","authors":"Tianjun Zhu, C. Zong","doi":"10.1109/IWISA.2009.5073206","DOIUrl":"https://doi.org/10.1109/IWISA.2009.5073206","url":null,"abstract":"The road-tire friction coefficient has important role in vehicle dynamic control systems like adaptive cruise control system (ACC), vehicle dynamic control (VDC), direct yaw-torque control system (DYC) etc. This paper introduces a new predictive methodology for the estimation of road-tire friction coefficient by using Dugoff tire model and the extended Kalman filter. At the same time, a simulation verification of the road/tire coefficient estimation has been made using the software CarSim7.0. The result shows that the EKF estimation accuracy of road/tire friction coefficient is satisfied very well. Keywords-road-tire friction coefficient;extended kalman filter; estimation","PeriodicalId":6327,"journal":{"name":"2009 International Workshop on Intelligent Systems and Applications","volume":"17 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2009-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85823815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}