首页 > 最新文献

2011 IEEE 2nd International Conference on Software Engineering and Service Science最新文献

英文 中文
Practical anonymous subscription system with privacy preserving data mining 具有隐私保护数据挖掘功能的实用匿名订阅系统
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982273
Liu Xin
To date, one interesting research topic in constructing anonymous subscription systems is how to allow client profiling, while keeping customers anonymous when they access one service. Though several solutions have been proposed, the service providers are only endowed with limited ability of utilizing and analyzing accumulated transaction transcripts at the cost of weakened privacy protection. To overcome this obstacle, we put forth the first anonymous subscription system with privacy preserving data mining, which is derived by applying the technique of Kiayias-Xu-Yung data mining group signature to the underlying multi-service subscription system by Canard and Jambert. The most prominent benefit of the new system is that service providers can obtain the desired output by a quorum of trusted data mining servers, and at the same time the customers can preserve maximum possible anonymity. Performance comparison shows that the proposed system is more practical than several related schemes published recently.
迄今为止,构建匿名订阅系统的一个有趣的研究主题是如何允许客户端分析,同时在客户访问一个服务时保持匿名。虽然已经提出了几种解决方案,但服务提供商仅具有有限的利用和分析积累的交易记录的能力,其代价是削弱了隐私保护。为了克服这一障碍,我们将Kiayias-Xu-Yung数据挖掘组签名技术应用于Canard和Jambert的底层多服务订阅系统,提出了第一个具有隐私保护的匿名订阅系统。新系统最突出的优点是服务提供商可以通过一组受信任的数据挖掘服务器获得期望的输出,同时客户可以最大限度地保持匿名。性能比较表明,该系统比最近发表的几种相关方案更实用。
{"title":"Practical anonymous subscription system with privacy preserving data mining","authors":"Liu Xin","doi":"10.1109/ICSESS.2011.5982273","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982273","url":null,"abstract":"To date, one interesting research topic in constructing anonymous subscription systems is how to allow client profiling, while keeping customers anonymous when they access one service. Though several solutions have been proposed, the service providers are only endowed with limited ability of utilizing and analyzing accumulated transaction transcripts at the cost of weakened privacy protection. To overcome this obstacle, we put forth the first anonymous subscription system with privacy preserving data mining, which is derived by applying the technique of Kiayias-Xu-Yung data mining group signature to the underlying multi-service subscription system by Canard and Jambert. The most prominent benefit of the new system is that service providers can obtain the desired output by a quorum of trusted data mining servers, and at the same time the customers can preserve maximum possible anonymity. Performance comparison shows that the proposed system is more practical than several related schemes published recently.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116288937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rotation invariant texture spectrum-based image retrieval algorithm 基于旋转不变性纹理谱的图像检索算法
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982392
Xiao-hui Cheng, Cuina Zhang, Maojie Zhou
Image retrieval is to find similar images in image library, LBP texture spectrum is sensitive to the rotation for this problem, a primitive rotating LBP texture spectrum obtained after a certain point of view as a new texture spectrum consistent with the visual texture primitive spectrum, will have all the texture spectrum of visual consistency primitives into one, this can reduce the dimension of feature values, and image rotation can solve the problem of similarity calculation, using the texture spectrum for texture image description, and finally histogram with the texture primitive search, the results show that the precision than the traditional LBP has significantly improved, better search results.
图像检索就是在图像库中寻找相似的图像,LBP纹理谱对旋转比较敏感,针对这一问题,一个原语旋转后得到的LBP纹理谱作为一个与视觉纹理原语谱一致的新纹理谱,将所有视觉一致性原语的纹理谱合并为一个,这样可以降低特征值的维数,并且图像旋转可以解决相似度计算的问题。利用纹理谱对纹理图像进行描述,最后用直方图对纹理原语进行搜索,结果表明其精度比传统的LBP有明显提高,搜索效果更好。
{"title":"Rotation invariant texture spectrum-based image retrieval algorithm","authors":"Xiao-hui Cheng, Cuina Zhang, Maojie Zhou","doi":"10.1109/ICSESS.2011.5982392","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982392","url":null,"abstract":"Image retrieval is to find similar images in image library, LBP texture spectrum is sensitive to the rotation for this problem, a primitive rotating LBP texture spectrum obtained after a certain point of view as a new texture spectrum consistent with the visual texture primitive spectrum, will have all the texture spectrum of visual consistency primitives into one, this can reduce the dimension of feature values, and image rotation can solve the problem of similarity calculation, using the texture spectrum for texture image description, and finally histogram with the texture primitive search, the results show that the precision than the traditional LBP has significantly improved, better search results.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130403020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The trust principles: The guidance of trust creation in e-commerce 信任原则:电子商务中建立信任的指导
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982450
Liangfang Huang, Lingling Wang
E-commerce is developing very fast and has achieved remarkable achievement in China. However, a series of ethical issues especially true crisis occur in e-commerce development. And trust issue is the biggest concern in e-commerce. For the long term, creating the integrity image for transaction parties is an important approach for keeping e-commerce developing healthily in China. The paper discusses the trust issue and uses the Trust Principles to analyze the trust situation in Chinese e-commerce. As the result, the paper proposes some suggestions and solutions to address the trust crisis in e-commerce.
电子商务在中国发展迅速,取得了令人瞩目的成就。然而,在电子商务的发展过程中,出现了一系列的伦理问题,尤其是真实危机。而信任问题是电子商务中最大的问题。从长远来看,为交易各方塑造诚信形象是保持中国电子商务健康发展的重要途径。本文讨论了信任问题,并运用信任原则分析了中国电子商务中的信任状况。因此,本文提出了一些解决电子商务信任危机的建议和对策。
{"title":"The trust principles: The guidance of trust creation in e-commerce","authors":"Liangfang Huang, Lingling Wang","doi":"10.1109/ICSESS.2011.5982450","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982450","url":null,"abstract":"E-commerce is developing very fast and has achieved remarkable achievement in China. However, a series of ethical issues especially true crisis occur in e-commerce development. And trust issue is the biggest concern in e-commerce. For the long term, creating the integrity image for transaction parties is an important approach for keeping e-commerce developing healthily in China. The paper discusses the trust issue and uses the Trust Principles to analyze the trust situation in Chinese e-commerce. As the result, the paper proposes some suggestions and solutions to address the trust crisis in e-commerce.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130614128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using service oriented architecture in a new anonymous mobile payment system 基于面向服务架构的新型匿名移动支付系统
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982335
Bakhtiari Shaghayegh
Currently, with the emergence of mobile payment systems and service-oriented architecture, the focus has shifted to utilizing modern service industry in mobile commerce. One of the important uses of mobile applications is transforming the mobile phone into a mobile wallet with digital cash that supports both anonymity (as real cash) and security [3]. Hence, in this article we propose applying service-oriented architecture in a mobile payment system called MobiCash to provide fully anonymity for mobile users.
当前,随着移动支付系统和面向服务的体系结构的出现,移动商务的重点已经转移到利用现代服务业。移动应用程序的一个重要用途是将手机转变为一个带有数字现金的移动钱包,该数字现金既支持匿名性(与真实现金一样),又支持安全性[3]。因此,在本文中,我们建议在移动支付系统MobiCash中应用面向服务的架构,为移动用户提供完全的匿名性。
{"title":"Using service oriented architecture in a new anonymous mobile payment system","authors":"Bakhtiari Shaghayegh","doi":"10.1109/ICSESS.2011.5982335","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982335","url":null,"abstract":"Currently, with the emergence of mobile payment systems and service-oriented architecture, the focus has shifted to utilizing modern service industry in mobile commerce. One of the important uses of mobile applications is transforming the mobile phone into a mobile wallet with digital cash that supports both anonymity (as real cash) and security [3]. Hence, in this article we propose applying service-oriented architecture in a mobile payment system called MobiCash to provide fully anonymity for mobile users.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132792247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Prevention of 4-way handshake blocking in IEEE 802.1 li by an statistical method and changing Message3 利用统计方法和改变Message3防止IEEE 802.1 li中4路握手阻塞
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982289
Sasan Jiaqaeeyan, Monsen Kosnanzaden
This paper focuses on IEEE 802.1U that is the last released security standard for WLAN and tries to resolve bugs of previous security standards in wireless networks, but it is vulnerable against some DOS (Denial of Service) attacks. One of the attacks that is considered in this paper happens in the last phase of the authentication process called 4-way handshake blocking. In this paper, in order to prevent the DOS attack we propose two solutions; first one is a new statistical method against abnormally increase of Message1 and another solution changes Message3- one of the messages in 4-way handshake phase-. We use C#.Net 2010 programming Language to implement 802.1U platform and then solutions and final results will be compared together.
本文以最新发布的无线局域网安全标准IEEE 802.1U为研究对象,试图解决以往无线网络安全标准中存在的一些漏洞,但该标准容易受到DOS (Denial of Service)攻击。本文考虑的一种攻击发生在身份验证过程的最后阶段,称为4路握手阻断。为了防止DOS攻击,本文提出了两种解决方案;第一个解决方案是针对Message1异常增加的一种新的统计方法,另一个解决方案是对处于4路握手阶段的消息之一Message3进行更改。我们使用c#。Net 2010编程语言实现802.1U平台,然后将解决方案与最终结果进行比较。
{"title":"Prevention of 4-way handshake blocking in IEEE 802.1 li by an statistical method and changing Message3","authors":"Sasan Jiaqaeeyan, Monsen Kosnanzaden","doi":"10.1109/ICSESS.2011.5982289","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982289","url":null,"abstract":"This paper focuses on IEEE 802.1U that is the last released security standard for WLAN and tries to resolve bugs of previous security standards in wireless networks, but it is vulnerable against some DOS (Denial of Service) attacks. One of the attacks that is considered in this paper happens in the last phase of the authentication process called 4-way handshake blocking. In this paper, in order to prevent the DOS attack we propose two solutions; first one is a new statistical method against abnormally increase of Message1 and another solution changes Message3- one of the messages in 4-way handshake phase-. We use C#.Net 2010 programming Language to implement 802.1U platform and then solutions and final results will be compared together.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128220851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An improved static program slicing algorithm using stack trace 一种改进的使用堆栈跟踪的静态程序切片算法
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982378
Hongchang Zhang, Shujuan Jiang, Rong Jin
In order to improve the accuracy of the static program slicing which is used to locate the faults that cause an exception, we propose a new approach that uses the stack trace which is stored when an exception occurred. The proposed approach consists of three steps. First, it uses stack trace to infer the execution trace and figure out those methods and statements that have not been ever executed. Then, these methods which are not executed will be ignored when building the system dependence graph. Finally, the accurate slice will be got by adopting the improved program slicing algorithm. We perform an empirical study of our new approach by using four reported bugs of open-source project Ant. And the result shows that using our approach the slice is 8 percent less than using the general static program slicing algorithm on average.
为了提高静态程序切片定位导致异常的错误的准确性,提出了一种利用异常发生时存储的堆栈跟踪的新方法。建议的方法包括三个步骤。首先,它使用堆栈跟踪来推断执行跟踪,并找出那些从未执行过的方法和语句。然后,在构建系统依赖图时,这些未执行的方法将被忽略。最后,采用改进的程序切片算法进行精确切片。我们通过使用开源项目Ant报告的四个bug对我们的新方法进行了实证研究。结果表明,使用我们的方法,切片平均比使用一般静态程序切片算法少8%。
{"title":"An improved static program slicing algorithm using stack trace","authors":"Hongchang Zhang, Shujuan Jiang, Rong Jin","doi":"10.1109/ICSESS.2011.5982378","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982378","url":null,"abstract":"In order to improve the accuracy of the static program slicing which is used to locate the faults that cause an exception, we propose a new approach that uses the stack trace which is stored when an exception occurred. The proposed approach consists of three steps. First, it uses stack trace to infer the execution trace and figure out those methods and statements that have not been ever executed. Then, these methods which are not executed will be ignored when building the system dependence graph. Finally, the accurate slice will be got by adopting the improved program slicing algorithm. We perform an empirical study of our new approach by using four reported bugs of open-source project Ant. And the result shows that using our approach the slice is 8 percent less than using the general static program slicing algorithm on average.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122899949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance evaluation of UDP-based high-speed transport protocols 基于udp的高速传输协议性能评价
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982257
Zhaojuan Yue, Yongmao Ren, Jun Li
The emergence of high speed long distance networks has promoted the development of various e-science applications. The traditional TCP protocol is not suitable for high bandwidth-delay product networks because of its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. This paper mainly introduces four kinds of typical UDP-based high speed transport protocols (RUBDP, Tsunami, UDT, and PA-UDP). By experiments on the test bed with end-to-end transport mode, the influence of the file size, loss ratio and RTT to the performance of the four protocols is evaluated. And, the intra-protocol fairness and inter-protocol fairness while transferring multiple parallel flows are also evaluated. The results show: PA-UDP protocol has the best transport performance; UDT protocol is the most convenient, because it does not require the users to set the initial sending rate, buffer size and other parameters.
高速长途网络的出现促进了各种电子科学应用的发展。传统的TCP协议由于其保守的AIMD (Additive Increase multiplative reduction)拥塞控制算法和慢启动策略而不适用于高带宽延迟的产品网络。本文主要介绍了四种典型的基于udp的高速传输协议(RUBDP、Tsunami、UDT和PA-UDP)。通过端到端传输模式的实验平台,评估了文件大小、丢包率和RTT对四种协议性能的影响。并对传输多个并行流时的协议内公平性和协议间公平性进行了评价。结果表明:PA-UDP协议具有最佳的传输性能;UDT协议是最方便的,因为它不需要用户设置初始发送速率、缓冲区大小等参数。
{"title":"Performance evaluation of UDP-based high-speed transport protocols","authors":"Zhaojuan Yue, Yongmao Ren, Jun Li","doi":"10.1109/ICSESS.2011.5982257","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982257","url":null,"abstract":"The emergence of high speed long distance networks has promoted the development of various e-science applications. The traditional TCP protocol is not suitable for high bandwidth-delay product networks because of its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. This paper mainly introduces four kinds of typical UDP-based high speed transport protocols (RUBDP, Tsunami, UDT, and PA-UDP). By experiments on the test bed with end-to-end transport mode, the influence of the file size, loss ratio and RTT to the performance of the four protocols is evaluated. And, the intra-protocol fairness and inter-protocol fairness while transferring multiple parallel flows are also evaluated. The results show: PA-UDP protocol has the best transport performance; UDT protocol is the most convenient, because it does not require the users to set the initial sending rate, buffer size and other parameters.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122900163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
UART interface design based on DM642 video surveillance system and wireless network module 基于DM642视频监控系统与无线网络模块的UART接口设计
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982357
Baofeng Zhang, Kuigang Zhang, Junchao Zhu, Xinzhi Li
TMS320DM642(DM642) is a widely used digital media DSP chip. As with no Universal Asynchronous Receiver/Transmitter(UART) provided, it is difficult to communicate with other UART devices,especially in wireless video surveillance system.This paper uses on-chip multichannel buffered serial port(McBSP) and enhanced direct memory access(EDMA) to implement UART function based on DM642 and wireless communication module LC6311. The initialization of the McBSP and the data coding/decoding inprocess of transmitting/receiving are discussed in detail.This method can implement the communication between DM642 and LC6311 with easy program flow and no other devices. It enriches interface function of the DM642 and provides a new interface design for wireless video monitoring system.
TMS320DM642(DM642)是一款应用广泛的数字媒体DSP芯片。由于没有提供通用异步接收/发送器(UART),因此难以与其他UART设备进行通信,特别是在无线视频监控系统中。本文采用片上多通道缓冲串口(McBSP)和增强型直接存储器访问(EDMA)实现了基于DM642和无线通信模块LC6311的UART功能。详细讨论了McBSP的初始化和收发过程中的数据编解码。该方法可实现DM642与LC6311之间的通信,程序流程简单,无需其他器件。它丰富了DM642的接口功能,为无线视频监控系统提供了一种新的接口设计。
{"title":"UART interface design based on DM642 video surveillance system and wireless network module","authors":"Baofeng Zhang, Kuigang Zhang, Junchao Zhu, Xinzhi Li","doi":"10.1109/ICSESS.2011.5982357","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982357","url":null,"abstract":"TMS320DM642(DM642) is a widely used digital media DSP chip. As with no Universal Asynchronous Receiver/Transmitter(UART) provided, it is difficult to communicate with other UART devices,especially in wireless video surveillance system.This paper uses on-chip multichannel buffered serial port(McBSP) and enhanced direct memory access(EDMA) to implement UART function based on DM642 and wireless communication module LC6311. The initialization of the McBSP and the data coding/decoding inprocess of transmitting/receiving are discussed in detail.This method can implement the communication between DM642 and LC6311 with easy program flow and no other devices. It enriches interface function of the DM642 and provides a new interface design for wireless video monitoring system.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124428666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BS-SVM multi-classification model in the application of consumer goods BS-SVM多分类模型在消费品中的应用
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982240
Quanhui Jia, Lieli Liu
Quality and safety of consumer products have drawn wide attention from scholars in related domain, this issue is based on the subject of the quality and safety of consumer goods, in accordance with characteristics of cases, and put forward a hierarchical support vector machine classification algorithm based on the relative separability of the feature space, to solve the low classification performance and high rate of misclassification of the existing algorithms. The weight of Binary Search Tree is the separability of samples, determining the order of categories by a selective set of training samples to construct SVM classifier and the final formation of a binary classification of the larger interval multi-valued SVM classifier tree. Simulation results show that the method has a faster test speed, relatively perfect good classification accuracy and generalization performance.
消费品质量安全问题已经引起了相关领域学者的广泛关注,本课题以消费品质量安全问题为主题,根据案例的特点,提出了一种基于特征空间相对可分性的分层支持向量机分类算法,解决了现有算法分类性能低、误分类率高的问题。二叉搜索树的权重是样本的可分性,通过选择一组训练样本来确定类别的顺序来构建SVM分类器并最终形成二叉分类的大间隔多值SVM分类器树。仿真结果表明,该方法具有较快的测试速度、较为完善的分类精度和较好的泛化性能。
{"title":"BS-SVM multi-classification model in the application of consumer goods","authors":"Quanhui Jia, Lieli Liu","doi":"10.1109/ICSESS.2011.5982240","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982240","url":null,"abstract":"Quality and safety of consumer products have drawn wide attention from scholars in related domain, this issue is based on the subject of the quality and safety of consumer goods, in accordance with characteristics of cases, and put forward a hierarchical support vector machine classification algorithm based on the relative separability of the feature space, to solve the low classification performance and high rate of misclassification of the existing algorithms. The weight of Binary Search Tree is the separability of samples, determining the order of categories by a selective set of training samples to construct SVM classifier and the final formation of a binary classification of the larger interval multi-valued SVM classifier tree. Simulation results show that the method has a faster test speed, relatively perfect good classification accuracy and generalization performance.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129003764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the technology of concealing the character of binary codes based on equal transposition 基于等转置的二进制码特征隐藏技术研究
Pub Date : 2011-07-15 DOI: 10.1109/ICSESS.2011.5982482
Feng Tian, Youwei Zhang, Dengwei Ma
The concealing of binary code is a key technology in the field of information security. Through in-depth study of this technology, it can not only provide theoretical support for detection of malicious code, but also play a role in promoting the development of network attack techniques. We combine the technology of equal transposition with the character concealing of binary code and achieve the target of character concealing by researching the technology of binary code's equal transposition. At the same time, we build a prototype system which plays perfectly in character concealing after a relevant test.
二进制码的隐藏是信息安全领域的一项关键技术。通过对该技术的深入研究,不仅可以为恶意代码的检测提供理论支持,而且可以对网络攻击技术的发展起到促进作用。将等换位技术与二进制码的字符隐藏技术相结合,通过对二进制码的等换位技术的研究,达到字符隐藏的目的。同时,经过相关测试,我们构建了一个在字符隐藏方面发挥良好作用的原型系统。
{"title":"Research on the technology of concealing the character of binary codes based on equal transposition","authors":"Feng Tian, Youwei Zhang, Dengwei Ma","doi":"10.1109/ICSESS.2011.5982482","DOIUrl":"https://doi.org/10.1109/ICSESS.2011.5982482","url":null,"abstract":"The concealing of binary code is a key technology in the field of information security. Through in-depth study of this technology, it can not only provide theoretical support for detection of malicious code, but also play a role in promoting the development of network attack techniques. We combine the technology of equal transposition with the character concealing of binary code and achieve the target of character concealing by researching the technology of binary code's equal transposition. At the same time, we build a prototype system which plays perfectly in character concealing after a relevant test.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 IEEE 2nd International Conference on Software Engineering and Service Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1