首页 > 最新文献

2011 3rd International Conference on Awareness Science and Technology (iCAST)最新文献

英文 中文
Research on hadoop-based enterprise file cloud storage system 基于hadoop的企业文件云存储系统研究
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163114
Dawei Zhang, F. Sun, Xu Cheng, Chao Liu
In order to solve the problem that enterprise-level users mass data storage and high-speed data processing services growth, and the traditional storage system can not meet the data services business growth, enterprise file cloud storage system is proposed. It is based on Hadoop, uses Linux cluster technology, distributed file systems and cloud computing framework, provides large-scale data storage and data storage flexible extension. This paper compares private cloud storage and traditional storage model, analyzes the advantage and feasibility of private cloud storage technology, presents mass data storage and data storage flexible extension methods based on Hadoop. Theoretical analysis shows that the enterprise private cloud storage platform is suit for critical business applications, online transaction processing, the platform can meet mass data storage, is easy to expand the scale of data.
为了解决企业级用户海量数据存储和高速数据处理业务增长,而传统存储系统已不能满足数据业务增长的问题,提出了企业文件云存储系统。它基于Hadoop,采用Linux集群技术、分布式文件系统和云计算框架,提供大规模数据存储和数据存储的灵活扩展。本文对私有云存储与传统存储模型进行了比较,分析了私有云存储技术的优势和可行性,提出了基于Hadoop的海量数据存储和数据存储的灵活扩展方法。理论分析表明,企业私有云存储平台适合关键业务应用,在线交易处理,该平台可以满足海量数据存储,易于扩展数据规模。
{"title":"Research on hadoop-based enterprise file cloud storage system","authors":"Dawei Zhang, F. Sun, Xu Cheng, Chao Liu","doi":"10.1109/ICAWST.2011.6163114","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163114","url":null,"abstract":"In order to solve the problem that enterprise-level users mass data storage and high-speed data processing services growth, and the traditional storage system can not meet the data services business growth, enterprise file cloud storage system is proposed. It is based on Hadoop, uses Linux cluster technology, distributed file systems and cloud computing framework, provides large-scale data storage and data storage flexible extension. This paper compares private cloud storage and traditional storage model, analyzes the advantage and feasibility of private cloud storage technology, presents mass data storage and data storage flexible extension methods based on Hadoop. Theoretical analysis shows that the enterprise private cloud storage platform is suit for critical business applications, online transaction processing, the platform can meet mass data storage, is easy to expand the scale of data.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116512595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Mixing matrix estimation based on single-source point identification and improved clustering method 基于单源点识别和改进聚类方法的混合矩阵估计
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163156
Dongyang Zhu, Xiaohong Ma
Mixing matrix is the key issue in the under-determined blind source separation with sparse representation. The performance of traditional clustering method degrades when the sources do not satisfy W-disjoint orthogonal condition. This paper puts forward an effective method, which sets less condition on the sparseness of the sources, to improve the estimation of the mixing matrix. Firstly, we detect the points in the time-frequency domain of the observations that only single source contributes. Samples at these points are more reliable for the mixing matrix estimation. Secondly, the number of sources, which often needs to be known a priori, is estimated through the characteristics of the observed signals. Finally, an improved initial cluster center selection method is presented for the defects of the traditional K-means cluster algorithm. The numerical performance of the proposed methods are provided highlighting their performance gain compared to existing ones, especially in the cases where the number of sources is unknown and the sources are relatively less sparse.
混合矩阵是稀疏表示欠定盲源分离中的关键问题。当源不满足w -不相交正交条件时,传统聚类方法的性能会下降。本文提出了一种有效的方法,该方法对源的稀疏性设置较少的条件,以改善混合矩阵的估计。首先,我们在观测值的时频域中检测只有单一源贡献的点。在这些点上的样本对于混合矩阵估计是更可靠的。其次,通过观测信号的特征来估计源的数量,而源的数量通常需要先验地知道。最后,针对传统k均值聚类算法的缺陷,提出了一种改进的初始聚类中心选择方法。给出了所提方法的数值性能,突出了它们与现有方法相比的性能增益,特别是在源数量未知且源相对较少稀疏的情况下。
{"title":"Mixing matrix estimation based on single-source point identification and improved clustering method","authors":"Dongyang Zhu, Xiaohong Ma","doi":"10.1109/ICAWST.2011.6163156","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163156","url":null,"abstract":"Mixing matrix is the key issue in the under-determined blind source separation with sparse representation. The performance of traditional clustering method degrades when the sources do not satisfy W-disjoint orthogonal condition. This paper puts forward an effective method, which sets less condition on the sparseness of the sources, to improve the estimation of the mixing matrix. Firstly, we detect the points in the time-frequency domain of the observations that only single source contributes. Samples at these points are more reliable for the mixing matrix estimation. Secondly, the number of sources, which often needs to be known a priori, is estimated through the characteristics of the observed signals. Finally, an improved initial cluster center selection method is presented for the defects of the traditional K-means cluster algorithm. The numerical performance of the proposed methods are provided highlighting their performance gain compared to existing ones, especially in the cases where the number of sources is unknown and the sources are relatively less sparse.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131853943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image inpainting based on energy minimization 基于能量最小化的图像绘制
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163147
Zhanjiang Zhi, Yi Sun
Image inpainting is an important work in the field of image processing. The basic idea of inpainting algorithm is to fill-in regions with available information from their surroundings. In this paper, we propose two image inpainting models based on variational method. The paper shows that the diffusion performance of the proposed models for image inpainting are superior to total variational (TV) model according to the physical characteristics in local coordinates. The experimental results show the effective performance of the proposed models in restoring text removal, scratched photos, and even removal of entire objects from images.
图像补图是图像处理领域的一项重要工作。绘制算法的基本思想是用周围的可用信息填充区域。本文提出了两种基于变分方法的图像绘制模型。结果表明,根据局部坐标下的物理特性,所提模型的扩散性能优于全变分模型。实验结果表明,所提出的模型在恢复文本删除、刮伤照片、甚至从图像中删除整个物体方面具有有效的性能。
{"title":"Image inpainting based on energy minimization","authors":"Zhanjiang Zhi, Yi Sun","doi":"10.1109/ICAWST.2011.6163147","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163147","url":null,"abstract":"Image inpainting is an important work in the field of image processing. The basic idea of inpainting algorithm is to fill-in regions with available information from their surroundings. In this paper, we propose two image inpainting models based on variational method. The paper shows that the diffusion performance of the proposed models for image inpainting are superior to total variational (TV) model according to the physical characteristics in local coordinates. The experimental results show the effective performance of the proposed models in restoring text removal, scratched photos, and even removal of entire objects from images.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"449 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125799152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of embedded wireless network camera 嵌入式无线网络摄像机的设计
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163137
Mingwei Li, Zhibo Li
Wireless fidelity (Wi-Fi) is one of the most popular network technologies today. It is widely used in consumer electronics, industrial control and network monitoring. In this paper, we will introduce a real-time wireless image transmission system. This system is based on Wi-Fi module, ARM, and using the Linux operating system controls the wireless transceiver. In our system, we transmit images with variable size. The data rate of the system is 3Mbps at least and 15Mbps at most. The Wi-Fi module uses infrastructure mode network of IEEE802.11. The camera transmits data and command with PC through the wireless router.
无线保真(Wi-Fi)是当今最流行的网络技术之一。广泛应用于消费电子、工业控制、网络监控等领域。本文将介绍一种实时无线图像传输系统。本系统基于Wi-Fi模块,采用ARM,并采用Linux操作系统控制无线收发器。在我们的系统中,我们传输可变尺寸的图像。系统数据速率最小为3Mbps,最大为15Mbps。Wi-Fi模块采用IEEE802.11标准的基础设施模式网络。摄像机通过无线路由器与PC机进行数据和指令的传输。
{"title":"Design of embedded wireless network camera","authors":"Mingwei Li, Zhibo Li","doi":"10.1109/ICAWST.2011.6163137","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163137","url":null,"abstract":"Wireless fidelity (Wi-Fi) is one of the most popular network technologies today. It is widely used in consumer electronics, industrial control and network monitoring. In this paper, we will introduce a real-time wireless image transmission system. This system is based on Wi-Fi module, ARM, and using the Linux operating system controls the wireless transceiver. In our system, we transmit images with variable size. The data rate of the system is 3Mbps at least and 15Mbps at most. The Wi-Fi module uses infrastructure mode network of IEEE802.11. The camera transmits data and command with PC through the wireless router.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121727003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An optimized overlay multicast sub-tree rearrangement algorithm 一种优化的覆盖组播子树重排算法
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163141
Xiaoqiong Tan, Ruimin Hu, Zhaoping Wang, Xuesong Cao
Traditional overlay multicast tree rearrange routing algorithm takes the approach of iterative optimization which is based on the residual degree, However in the sparse residual degree distribution, the proportion of optimization is low. This paper proposes a new algorithm of rerouting that is independent of residual degree, adopting Sorted sub-trees Exchange Strategy instead of residual degree migration strategy. The proposed approach can effectively reduce the overall delay. Experiments show that when remaining degree of the trees is less than 15% of the total, the proposed algorithm would enhance 5% –10% delay optimization ratio. The result can apply to the maintenance of the real-time group multimedia services distribution system, and can provide sustainable Quality of Service(QoS) for long time users.
传统的叠加组播树重排路由算法采用基于残差度的迭代优化方法,但在残差度分布稀疏的情况下,优化比例较低。本文提出了一种独立于残差度的重路由算法,采用排序子树交换策略代替残差度迁移策略。该方法可以有效地降低整体延迟。实验表明,当树的剩余度小于总剩余度的15%时,该算法可提高5% -10%的延迟优化率。该结果可用于实时群多媒体业务分配系统的维护,并可为长时间用户提供持续的服务质量(QoS)。
{"title":"An optimized overlay multicast sub-tree rearrangement algorithm","authors":"Xiaoqiong Tan, Ruimin Hu, Zhaoping Wang, Xuesong Cao","doi":"10.1109/ICAWST.2011.6163141","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163141","url":null,"abstract":"Traditional overlay multicast tree rearrange routing algorithm takes the approach of iterative optimization which is based on the residual degree, However in the sparse residual degree distribution, the proportion of optimization is low. This paper proposes a new algorithm of rerouting that is independent of residual degree, adopting Sorted sub-trees Exchange Strategy instead of residual degree migration strategy. The proposed approach can effectively reduce the overall delay. Experiments show that when remaining degree of the trees is less than 15% of the total, the proposed algorithm would enhance 5% –10% delay optimization ratio. The result can apply to the maintenance of the real-time group multimedia services distribution system, and can provide sustainable Quality of Service(QoS) for long time users.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124948249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A quantitative analysis of noncircularity for complex-valued fMRI based on semi-blind ICA 基于半盲ICA的复值fMRI非圆度定量分析
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163131
Jia-Chen Wang, Qiuhua Lin, F. Cong, V. Calhoun
The spatial components included in complex-valued functional magnetic resonance imaging (fMRI) data are generally assumed to be noncircular signals. In this paper, we try to quantitatively investigate the noncircularity of fMRI with a measure called the degree of impropriety (DOI). Two semi-blind complex ICA algorithms, the kurtosis maximization (KM) algorithm suitable for separating noncircular sources and the complex fastICA algorithm (CfastICA) derived for recovering circular signals, are performed to estimate the spatial components, and two kinds of fMRI data including a simulated complex-valued fMRI dataset and a real complex-valued fMRI data are used for DOI tests. Results show that, semi-blind KM algorithm always outperforms semi-blind CfastICA algorithm, the DOI indices for the estimated components from the real fMRI data are smaller than those from the simulated fMRI data but significantly larger than typical circular signals. Therefore, it is reasonable to conclude that the complex-valued components of fMRI are noncircular.
复值功能磁共振成像(fMRI)数据中包含的空间分量通常假定为非圆信号。在本文中,我们试图定量地研究非圆形的功能磁共振成像称为不适当程度(DOI)的措施。采用适用于分离非圆形源的峰度最大化(KM)算法和适用于恢复圆形信号的复形ICA算法(CfastICA)两种半盲复形ICA算法估计空间分量,并使用模拟复值fMRI数据集和真实复值fMRI数据集两种fMRI数据进行DOI测试。结果表明,半盲KM算法始终优于半盲CfastICA算法,真实fMRI数据估计分量的DOI指数小于模拟fMRI数据估计分量的DOI指数,但明显大于典型圆形信号。因此,有理由认为fMRI的复值分量是非圆的。
{"title":"A quantitative analysis of noncircularity for complex-valued fMRI based on semi-blind ICA","authors":"Jia-Chen Wang, Qiuhua Lin, F. Cong, V. Calhoun","doi":"10.1109/ICAWST.2011.6163131","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163131","url":null,"abstract":"The spatial components included in complex-valued functional magnetic resonance imaging (fMRI) data are generally assumed to be noncircular signals. In this paper, we try to quantitatively investigate the noncircularity of fMRI with a measure called the degree of impropriety (DOI). Two semi-blind complex ICA algorithms, the kurtosis maximization (KM) algorithm suitable for separating noncircular sources and the complex fastICA algorithm (CfastICA) derived for recovering circular signals, are performed to estimate the spatial components, and two kinds of fMRI data including a simulated complex-valued fMRI dataset and a real complex-valued fMRI data are used for DOI tests. Results show that, semi-blind KM algorithm always outperforms semi-blind CfastICA algorithm, the DOI indices for the estimated components from the real fMRI data are smaller than those from the simulated fMRI data but significantly larger than typical circular signals. Therefore, it is reasonable to conclude that the complex-valued components of fMRI are noncircular.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126394274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A sub-pixel edge detection approach based on orthogonal moment 基于正交矩的亚像素边缘检测方法
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163092
Jianhua Li, Jinri Yang
Edge detection with sub pixel accuracy is a vital step of vision measurement technology. In this paper, a novel sub-pixel edge detecting algorithm based on orthogonal moment is proposed. The proposed approach locates the edge points with different method for different edges. For the ideal edges, it uses the orthogonal moment based method, and for the blurred edges, the centroid based method is used. Experimental results demonstrate that the proposed method prevails in robustness and high precision compared with traditional method.
亚像素精度边缘检测是视觉测量技术的重要组成部分。提出了一种基于正交矩的亚像素边缘检测算法。该方法针对不同的边缘采用不同的方法定位边缘点。对于理想边缘,采用基于正交矩的方法,对于模糊边缘,采用基于质心的方法。实验结果表明,与传统方法相比,该方法具有鲁棒性和较高的精度。
{"title":"A sub-pixel edge detection approach based on orthogonal moment","authors":"Jianhua Li, Jinri Yang","doi":"10.1109/ICAWST.2011.6163092","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163092","url":null,"abstract":"Edge detection with sub pixel accuracy is a vital step of vision measurement technology. In this paper, a novel sub-pixel edge detecting algorithm based on orthogonal moment is proposed. The proposed approach locates the edge points with different method for different edges. For the ideal edges, it uses the orthogonal moment based method, and for the blurred edges, the centroid based method is used. Experimental results demonstrate that the proposed method prevails in robustness and high precision compared with traditional method.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129040755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social image reranking with diversity, representative and relevance 社会形象以多样性、代表性和相关性重新排序
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163140
Xueming Wang, Fuming Sun, Dongxia Wang
In view of the problem in the image retrieval that the returned images don't match the query tag in the current fast-growing social media websites, i.e., the returned images from the web are irrelevant to the query, thus in this paper we improve the existing image ranking method which based on relevance of Bayesian and diversity of semantic, and take the representative into account in order to get better images results that we want. The final returned images results are generated by the algorithm proposed in this paper which takes relevance, diversity and representative into account and calculates the diverse score based on both the feature similarity and semantic similarity. The experimental results show its superior performance.
针对当前快速发展的社交媒体网站在图像检索中存在返回图像与查询标签不匹配的问题,即从web返回的图像与查询无关,因此本文对现有的基于贝叶斯相关性和语义多样性的图像排序方法进行改进,并考虑到代表性,以获得我们想要的更好的图像结果。本文提出的算法综合考虑相关度、多样性和代表性,并根据特征相似度和语义相似度计算多样性分数,生成最终的返回图像结果。实验结果表明了其优越的性能。
{"title":"Social image reranking with diversity, representative and relevance","authors":"Xueming Wang, Fuming Sun, Dongxia Wang","doi":"10.1109/ICAWST.2011.6163140","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163140","url":null,"abstract":"In view of the problem in the image retrieval that the returned images don't match the query tag in the current fast-growing social media websites, i.e., the returned images from the web are irrelevant to the query, thus in this paper we improve the existing image ranking method which based on relevance of Bayesian and diversity of semantic, and take the representative into account in order to get better images results that we want. The final returned images results are generated by the algorithm proposed in this paper which takes relevance, diversity and representative into account and calculates the diverse score based on both the feature similarity and semantic similarity. The experimental results show its superior performance.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"22 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124295139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inducing compact NNTrees using discriminant rough null space method 利用判别粗糙零空间方法诱导紧致nntree
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163107
Kyohei Watarai, Qiangfu Zhao, H. Hayashi
A Neural Network Tree (NNTree) is a hybrid learning model. NNTrees are more suitable for structural learning and can make decisions faster than normal neural networks. The goal of this research is to embed the NNTrees into different portable devices. To reach this goal, it is necessary to induce compact NNTrees that can be implemented easily on a chip. So far, we have tried several dimensionality reduction approaches, including principle component analysis (PCA), linear discriminant analysis (LDA), direct centroid (DC) approach, and discriminative multiple centroid (DMC) approach. In this paper, we investigate the discriminant rough null space (DRNS) approach.
神经网络树(NNTree)是一种混合学习模型。NNTrees更适合于结构学习,并且可以比普通神经网络更快地做出决策。这项研究的目标是将NNTrees嵌入到不同的便携式设备中。为了达到这一目标,有必要诱导可以在芯片上轻松实现的紧凑nntree。到目前为止,我们已经尝试了几种降维方法,包括主成分分析(PCA)、线性判别分析(LDA)、直接质心(DC)方法和判别多质心(DMC)方法。本文研究了判别粗糙零空间(DRNS)方法。
{"title":"Inducing compact NNTrees using discriminant rough null space method","authors":"Kyohei Watarai, Qiangfu Zhao, H. Hayashi","doi":"10.1109/ICAWST.2011.6163107","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163107","url":null,"abstract":"A Neural Network Tree (NNTree) is a hybrid learning model. NNTrees are more suitable for structural learning and can make decisions faster than normal neural networks. The goal of this research is to embed the NNTrees into different portable devices. To reach this goal, it is necessary to induce compact NNTrees that can be implemented easily on a chip. So far, we have tried several dimensionality reduction approaches, including principle component analysis (PCA), linear discriminant analysis (LDA), direct centroid (DC) approach, and discriminative multiple centroid (DMC) approach. In this paper, we investigate the discriminant rough null space (DRNS) approach.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"38 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120885029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification of malicious web code by machine learning 恶意web代码的机器学习分类
Pub Date : 2011-09-01 DOI: 10.1109/ICAWST.2011.6163109
R. Komiya, Incheon Paik, M. Hisada
Web applications make life more convenient through on the activities. Many web applications have several kind of user input (e.g. personal information, a user's comment of commercial goods, etc.) for the activities. However, there are various vulnerabilities in input functions of web applications. It is possible to try malicious actions using free accessibility of the web applications. The attacks by exploitation of these input vulnerabilities enable to be performed by injecting malicious web code; it enables one to perform various illegal actions, such as SQL Injection Attacks (SQLIAs) and Cross Site Scripting (XSS). These actions come down to theft, replacing personal information, or phishing. Many solutions have devised for the malicious web code, such as AMNESIA [1] and SQL Check [2], etc. The methods use parser for the code, and limited to fixed and very small patterns, and are difficult to adapt to variations. Machine learning method can give leverage to cover far broader range of malicious web code and is easy to adapt to variations and changes. Therefore, we suggests adaptable classification of malicious web code by machine learning approach such as Support Vector Machine (SVM)[3], Naïve-Bayes[4], and k-Nearest Neighbor Algorithm[5] for detecting the exploitation user inputs.
Web应用程序通过活动使生活更加方便。许多web应用程序有几种类型的用户输入(例如个人信息、用户对商品的评论等)。然而,web应用程序的输入功能存在各种漏洞。使用免费的web应用程序可以尝试恶意操作。利用这些输入漏洞的攻击可以通过注入恶意web代码来执行;它使人们能够执行各种非法操作,例如SQL注入攻击(sqlia)和跨站脚本(XSS)。这些行为可以归结为盗窃、替换个人信息或网络钓鱼。针对恶意web代码,人们设计了许多解决方案,如AMNESIA[1]和SQL Check[2]等。这些方法对代码使用解析器,并且仅限于固定的和非常小的模式,并且难以适应变化。机器学习方法可以利用更广泛的恶意web代码,并且很容易适应变化和变化。因此,我们建议采用支持向量机(SVM)[3]、Naïve-Bayes[4]和k近邻算法[5]等机器学习方法对恶意web代码进行自适应分类,以检测利用用户输入。
{"title":"Classification of malicious web code by machine learning","authors":"R. Komiya, Incheon Paik, M. Hisada","doi":"10.1109/ICAWST.2011.6163109","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163109","url":null,"abstract":"Web applications make life more convenient through on the activities. Many web applications have several kind of user input (e.g. personal information, a user's comment of commercial goods, etc.) for the activities. However, there are various vulnerabilities in input functions of web applications. It is possible to try malicious actions using free accessibility of the web applications. The attacks by exploitation of these input vulnerabilities enable to be performed by injecting malicious web code; it enables one to perform various illegal actions, such as SQL Injection Attacks (SQLIAs) and Cross Site Scripting (XSS). These actions come down to theft, replacing personal information, or phishing. Many solutions have devised for the malicious web code, such as AMNESIA [1] and SQL Check [2], etc. The methods use parser for the code, and limited to fixed and very small patterns, and are difficult to adapt to variations. Machine learning method can give leverage to cover far broader range of malicious web code and is easy to adapt to variations and changes. Therefore, we suggests adaptable classification of malicious web code by machine learning approach such as Support Vector Machine (SVM)[3], Naïve-Bayes[4], and k-Nearest Neighbor Algorithm[5] for detecting the exploitation user inputs.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132506951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
期刊
2011 3rd International Conference on Awareness Science and Technology (iCAST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1