首页 > 最新文献

2007 International Conference on Computational Intelligence and Security (CIS 2007)最新文献

英文 中文
An Energy Efficient Directed Diffusion Routing Protocol 高能效定向扩散路由协议
Shousheng Zhao, Fengqi Yu, Bao-hua Zhao
Directed diffusion is a classic data-centric routing protocol in Wireless Sensor Networks (WSNs). In directed diffusion based WSNs, data generated by sensor nodes is named by attribute-value pairs. A sink requests data by sending interests. The data that match the interests are then "drawn" down towards the sink. Intermediate nodes cache or transform data, and direct the interests based on previously cached data. In general, energy resources are limited in WSNs, therefore, energy saving becomes the most important consideration in designing routing protocols. In the directed diffusion, the path reinforcement scheme is designed for minimum delay and maximum data received during a certain period of time. However, the communication cost and energy balance over the whole WSNs have not been paid enough attention. To address these issues, we propose a novel path reinforcement scheme. Our proposed protocol is simulated and compared with the directed diffusion. The simulation results show that the proposed protocol is outperform directed diffusion in energy efficiency, energy balance over WSNs, and network lifetime. Key Words­ Directed diffusion, Routing protocol, Energy efficient, Reinforcement
定向扩散是无线传感器网络(WSN)中一种典型的以数据为中心的路由协议。在基于定向扩散的 WSN 中,传感器节点生成的数据由属性值对命名。网络汇通过发送兴趣请求数据。然后,与兴趣相匹配的数据被 "吸引 "到汇。中间节点缓存或转换数据,并根据先前缓存的数据引导兴趣。一般来说,WSN 中的能量资源是有限的,因此在设计路由协议时,节能成为最重要的考虑因素。在定向扩散中,路径增强方案的设计目标是在一定时间内实现最小延迟和最大数据接收。然而,整个 WSN 的通信成本和能量平衡却没有得到足够的重视。为了解决这些问题,我们提出了一种新型路径增强方案。我们对提出的协议进行了仿真,并与定向扩散进行了比较。仿真结果表明,提出的协议在能效、WSN 能量平衡和网络寿命方面都优于定向扩散方案。关键词 定向扩散 路由协议 能源效率 强化
{"title":"An Energy Efficient Directed Diffusion Routing Protocol","authors":"Shousheng Zhao, Fengqi Yu, Bao-hua Zhao","doi":"10.1109/CIS.2007.70","DOIUrl":"https://doi.org/10.1109/CIS.2007.70","url":null,"abstract":"Directed diffusion is a classic data-centric routing protocol in Wireless Sensor Networks (WSNs). In directed diffusion based WSNs, data generated by sensor nodes is named by attribute-value pairs. A sink requests data by sending interests. The data that match the interests are then \"drawn\" down towards the sink. Intermediate nodes cache or transform data, and direct the interests based on previously cached data. In general, energy resources are limited in WSNs, therefore, energy saving becomes the most important consideration in designing routing protocols. In the directed diffusion, the path reinforcement scheme is designed for minimum delay and maximum data received during a certain period of time. However, the communication cost and energy balance over the whole WSNs have not been paid enough attention. To address these issues, we propose a novel path reinforcement scheme. Our proposed protocol is simulated and compared with the directed diffusion. The simulation results show that the proposed protocol is outperform directed diffusion in energy efficiency, energy balance over WSNs, and network lifetime. Key Words­ Directed diffusion, Routing protocol, Energy efficient, Reinforcement","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129970575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Exploring the Relationships between Personal Characteristics, Aims, and Reasons of Learning in Further Education by Associating Rule Mining 基于关联规则挖掘的继续教育中个人特征、目标和学习原因之间的关系
Sheng-Fei Hsu, Dong-Her Shih, Hui-Ling Yu
Learning occurs when previous perceptions of reality are not in harmony with current experience, creating dissonance. To deepen understanding of the complexities of adult learning, this study presents the relationship within students' mode of study, the aims of learning and the motivation of choosing the course in further education. Associating rule mining will be used to explore the dataset, associate with these three factors and extract valuable rules. Several important adult learning theories will be reviewed and applied to examine the result. This research will provide valuable insight into how individual learning styles are shaped and developed in the further education.
当先前对现实的感知与当前经验不和谐时,就会发生学习,从而产生不和谐。为了加深对成人学习的复杂性的理解,本研究提出了学生的学习模式、学习目的和继续教育课程选择动机之间的关系。关联规则挖掘将用于探索数据集,将这三个因素关联起来并提取有价值的规则。几个重要的成人学习理论将被审查和应用来检验结果。这项研究将为进一步教育中个人学习风格的形成和发展提供有价值的见解。
{"title":"Exploring the Relationships between Personal Characteristics, Aims, and Reasons of Learning in Further Education by Associating Rule Mining","authors":"Sheng-Fei Hsu, Dong-Her Shih, Hui-Ling Yu","doi":"10.1109/CIS.2007.57","DOIUrl":"https://doi.org/10.1109/CIS.2007.57","url":null,"abstract":"Learning occurs when previous perceptions of reality are not in harmony with current experience, creating dissonance. To deepen understanding of the complexities of adult learning, this study presents the relationship within students' mode of study, the aims of learning and the motivation of choosing the course in further education. Associating rule mining will be used to explore the dataset, associate with these three factors and extract valuable rules. Several important adult learning theories will be reviewed and applied to examine the result. This research will provide valuable insight into how individual learning styles are shaped and developed in the further education.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130438900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Adaptive Parameter Control Strategy for Ant Colony Optimization 蚁群优化的自适应参数控制策略
Weixin Ling, Huanping Luo
proved to be one of the best performing algorithms for NP-hard combinational optimization problems like TSP. Many researchers have been attracted in research for ACO but fewer tuning methodologies have been done on its parameters which influence the algorithm directly. The setting of ACO's parameters is studied in this paper. The Artificial Fish Swarm Algorithm (AFSA) is introduced to solve the parameter tuning problem, and an adaptive parameter setting strategy is proposed. It's proved to be effective by the experiment based on TSPLIB test. Keywords: Artificial Fish Swarm Algorithm, Ant Colony Optimization, parameters, TSP
被证明是求解像TSP这样的NP-hard组合优化问题的最佳算法之一。蚁群算法的研究吸引了众多研究者,但对其直接影响算法的参数进行调优的方法较少。本文研究了蚁群算法的参数设置问题。引入人工鱼群算法(Artificial Fish Swarm Algorithm, AFSA)来解决参数整定问题,提出了一种自适应参数整定策略。基于TSPLIB测试的实验证明了该方法的有效性。关键词:人工鱼群算法,蚁群优化,参数,TSP
{"title":"An Adaptive Parameter Control Strategy for Ant Colony Optimization","authors":"Weixin Ling, Huanping Luo","doi":"10.1109/CIS.2007.156","DOIUrl":"https://doi.org/10.1109/CIS.2007.156","url":null,"abstract":"proved to be one of the best performing algorithms for NP-hard combinational optimization problems like TSP. Many researchers have been attracted in research for ACO but fewer tuning methodologies have been done on its parameters which influence the algorithm directly. The setting of ACO's parameters is studied in this paper. The Artificial Fish Swarm Algorithm (AFSA) is introduced to solve the parameter tuning problem, and an adaptive parameter setting strategy is proposed. It's proved to be effective by the experiment based on TSPLIB test. Keywords: Artificial Fish Swarm Algorithm, Ant Colony Optimization, parameters, TSP","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120850776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Modified Original Smart Cards and Smart Card Clone Countermeasures 修改的原始智能卡和智能卡克隆对策
A. D. Santis, Claudio Soriente
Conditional Access Systems are used in Pay-Tv Sys- tems to ensure conditional access to broadcasted data and charge subscribers a subscription fee. Smart cards are end- user security devices to store subscribers entitlements, re- quired to access data. On the other hand, pirates clone or modify smart cards to gain access to broadcasted data with- out paying any fees. This paper presents new countermea- sures, based on fingerprints, to avoid smart cards cloning or modifying in Conditional Access Systems for digital Tv broadcasting.
条件访问系统用于付费电视系统,以确保有条件地访问广播数据并向用户收取订阅费。智能卡是终端用户的安全设备,用于存储用户的权利,访问所需的数据。另一方面,盗版者克隆或修改智能卡以获取广播数据而无需支付任何费用。针对数字电视广播条件接入系统中智能卡的克隆和篡改问题,提出了一种基于指纹的解决方案。
{"title":"Modified Original Smart Cards and Smart Card Clone Countermeasures","authors":"A. D. Santis, Claudio Soriente","doi":"10.1109/CIS.2007.187","DOIUrl":"https://doi.org/10.1109/CIS.2007.187","url":null,"abstract":"Conditional Access Systems are used in Pay-Tv Sys- tems to ensure conditional access to broadcasted data and charge subscribers a subscription fee. Smart cards are end- user security devices to store subscribers entitlements, re- quired to access data. On the other hand, pirates clone or modify smart cards to gain access to broadcasted data with- out paying any fees. This paper presents new countermea- sures, based on fingerprints, to avoid smart cards cloning or modifying in Conditional Access Systems for digital Tv broadcasting.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115627989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Effective Approach to Content-Based 3D Model Retrieval and Classification 一种基于内容的三维模型检索与分类方法
K. Lu, Feng Zhao, Ning He
The Development of effective content-based 3D model retrieval and classification is still an important research issue due to the growing amount of digital information, this paper present a novel 3D model retrieval and classification algorithm. In feature representation, a method combining distance histogram and moment invariants is proposed to improve the retrieval performance. A major advantage of the distance histogram is its invariance to the transforms of scaling, translation and rotation. Based on the premise that two similar images should have high mutual information, or equivalently, the querying image should convey high information about those similar to it, this paper proposed a mutual information distance measure to perform the similarity comparison. Multi-class support vector machine performs the classification for it has a very good generalization performance. This paper tested the algorithm with a 3D model retrieval and classification prototype, the experimental evaluation demonstrates the satisfactory retrieval results and good classification accuracy.
基于内容的三维模型检索与分类仍然是一个重要的研究课题,由于数字信息量的不断增长,本文提出了一种新的三维模型检索与分类算法。在特征表示方面,提出了一种距离直方图与矩不变量相结合的方法来提高检索性能。距离直方图的一个主要优点是它对缩放、平移和旋转变换具有不变性。基于两幅相似图像具有高互信息的前提,即查询图像传递相似图像的高信息的前提,本文提出了一种互信息距离度量来进行相似度比较。多类支持向量机由于具有很好的泛化性能而进行分类。本文用一个三维模型检索分类原型对该算法进行了测试,实验评价表明检索结果令人满意,分类精度较高。
{"title":"An Effective Approach to Content-Based 3D Model Retrieval and Classification","authors":"K. Lu, Feng Zhao, Ning He","doi":"10.1109/CIS.2007.216","DOIUrl":"https://doi.org/10.1109/CIS.2007.216","url":null,"abstract":"The Development of effective content-based 3D model retrieval and classification is still an important research issue due to the growing amount of digital information, this paper present a novel 3D model retrieval and classification algorithm. In feature representation, a method combining distance histogram and moment invariants is proposed to improve the retrieval performance. A major advantage of the distance histogram is its invariance to the transforms of scaling, translation and rotation. Based on the premise that two similar images should have high mutual information, or equivalently, the querying image should convey high information about those similar to it, this paper proposed a mutual information distance measure to perform the similarity comparison. Multi-class support vector machine performs the classification for it has a very good generalization performance. This paper tested the algorithm with a 3D model retrieval and classification prototype, the experimental evaluation demonstrates the satisfactory retrieval results and good classification accuracy.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122968127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Efficient Identity-Based Short Signature Scheme from Bilinear Pairings 基于双线性对的高效身份短签名方案
Hongzhen Du, Q. Wen
In this paper, we present an ID-based signature scheme that is proved to be secure in the random oracle model under the hardness assumption of k-CAA problem. The proposed scheme upholds all desirable properties of previous IBS schemes, and requires general cryptographic hash functions instead of MapToPoint hash function that is inefficient and probabilistic. Furthermore, our scheme requires less computation cost and is significantly more efficient than all known IBS schemes, and the size of signatures generated by our scheme is approximate 160 bits, which is the shortest ID-based signatures so far.
在k-CAA问题的硬度假设下,提出了一种基于id的签名方案,该方案在随机oracle模型下被证明是安全的。该方案保留了以前的IBS方案的所有理想特性,并且需要通用的加密哈希函数,而不是低效率和概率性的maptoppoint哈希函数。此外,我们的方案比所有已知的IBS方案所需的计算成本更少,效率显著提高,并且我们的方案生成的签名大小约为160位,是目前为止最短的基于id的签名。
{"title":"An Efficient Identity-Based Short Signature Scheme from Bilinear Pairings","authors":"Hongzhen Du, Q. Wen","doi":"10.1109/CIS.2007.168","DOIUrl":"https://doi.org/10.1109/CIS.2007.168","url":null,"abstract":"In this paper, we present an ID-based signature scheme that is proved to be secure in the random oracle model under the hardness assumption of k-CAA problem. The proposed scheme upholds all desirable properties of previous IBS schemes, and requires general cryptographic hash functions instead of MapToPoint hash function that is inefficient and probabilistic. Furthermore, our scheme requires less computation cost and is significantly more efficient than all known IBS schemes, and the size of signatures generated by our scheme is approximate 160 bits, which is the shortest ID-based signatures so far.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115060689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Estimate and Track the PN Sequence of Weak DS-SS Signals 弱DS-SS信号的PN序列估计与跟踪
Tianqi Zhang, Shao-sheng Dai, Liufei Yang, Xuesong Li
This paper proposes a modified Sanger's generalized Hebbian neural network method to estimate and track the pseudo noise sequence of weak direct sequence spread spectrum signals. The proposed method is based on eigen-analysis of received signals. The received signal is firstly sampled and divided into non-overlapping signal vectors according to a temporal window, which duration is a periods of PN sequence. Then an autocorrelation matrix is computed and accumulated by these signal vectors one by one. The pseudo noise sequence can be estimated and tracked by the principal eigenvector of the matrix in the end. Because the eigen-analysis method becomes inefficiency when the estimated pseudo noise sequence becomes longer or the estimated pseudo noise sequence becomes time varying, we use a modified Sanger's generalized Hebbian neural network to realize the pseudo noise sequence estimation and tracking from weak input signals adaptively and effectively.
提出了一种改进的Sanger广义Hebbian神经网络方法来估计和跟踪弱直接序列扩频信号的伪噪声序列。该方法基于接收信号的特征分析。首先对接收到的信号进行采样,并根据时间窗将其分割为不重叠的信号矢量,时间窗的持续时间为PN序列的一个周期。然后计算一个自相关矩阵,将这些信号向量逐个累加。最后利用矩阵的主特征向量对伪噪声序列进行估计和跟踪。针对估计的伪噪声序列变长或估计的伪噪声序列时变时特征分析方法效率低下的问题,采用改进的Sanger广义Hebbian神经网络自适应有效地实现了对弱输入信号的伪噪声序列的估计和跟踪。
{"title":"Estimate and Track the PN Sequence of Weak DS-SS Signals","authors":"Tianqi Zhang, Shao-sheng Dai, Liufei Yang, Xuesong Li","doi":"10.1109/CIS.2007.90","DOIUrl":"https://doi.org/10.1109/CIS.2007.90","url":null,"abstract":"This paper proposes a modified Sanger's generalized Hebbian neural network method to estimate and track the pseudo noise sequence of weak direct sequence spread spectrum signals. The proposed method is based on eigen-analysis of received signals. The received signal is firstly sampled and divided into non-overlapping signal vectors according to a temporal window, which duration is a periods of PN sequence. Then an autocorrelation matrix is computed and accumulated by these signal vectors one by one. The pseudo noise sequence can be estimated and tracked by the principal eigenvector of the matrix in the end. Because the eigen-analysis method becomes inefficiency when the estimated pseudo noise sequence becomes longer or the estimated pseudo noise sequence becomes time varying, we use a modified Sanger's generalized Hebbian neural network to realize the pseudo noise sequence estimation and tracking from weak input signals adaptively and effectively.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122882686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Order Holon Modeling Method Based on Time Petri-Nets and its Solution with Particle Swarm Optimization 基于时间petri网的阶Holon建模方法及其粒子群优化求解
Fuqing Zhao, Qiuyu Zhang, Aihong Zhu
The manufacturing system change from hierarchy to parallel structure, from concentration to distribution based on notion of Holonic Manufacturing System. In this paper, the problem of how to demarcate the unit of the manufacturing system, management style of the unit, control structure and the corresponding control method are settled. The model on order settlement in system reconfiguration model based on time Petri-net is put forward, order intelligent operation series is guided by particle swarm optimization, Simulation results show that the proposed model and algorithm are effective to order evaluation and implementation .
基于全息制造系统的概念,制造系统由分层结构向平行结构转变,由集中结构向分布结构转变。本文解决了制造系统单元的划分、单元的管理方式、控制结构和相应的控制方法等问题。提出了基于时间petri网的系统重构模型中的订单处理模型,采用粒子群优化方法指导订单智能操作序列,仿真结果表明,所提出的模型和算法对订单的评估和实现是有效的。
{"title":"Order Holon Modeling Method Based on Time Petri-Nets and its Solution with Particle Swarm Optimization","authors":"Fuqing Zhao, Qiuyu Zhang, Aihong Zhu","doi":"10.1109/CIS.2007.161","DOIUrl":"https://doi.org/10.1109/CIS.2007.161","url":null,"abstract":"The manufacturing system change from hierarchy to parallel structure, from concentration to distribution based on notion of Holonic Manufacturing System. In this paper, the problem of how to demarcate the unit of the manufacturing system, management style of the unit, control structure and the corresponding control method are settled. The model on order settlement in system reconfiguration model based on time Petri-net is put forward, order intelligent operation series is guided by particle swarm optimization, Simulation results show that the proposed model and algorithm are effective to order evaluation and implementation .","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123314394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Multi-Focus Image Fusion Algorithm with DT-CWT 基于DT-CWT的多焦点图像融合算法
Sun Wei, Wang Ke
A multi-focus image fusion algorithm with Dual-Tree Complex Wavelet Transform (DT-CWT) is proposed in the paper. There are some disadvantages in Discrete Wavelet Transform (DWT), such as shift variance and lack of directional selectivity. Therefore, to have better representation of the images, they are processed with DT-CWT. The low frequency coefficients and high frequency coefficients are fused separately with different methods because of their different characteristics. To the low frequency coefficients, neighborhood gradient maximum selectivity (NGMS) scheme is used, the ones having maximal neighborhood gradient are selected. To the high frequency coefficients, the absolute value maximum selectivity (AVMS) is used, the ones having maximal absolute values are selected. Experiment results show that the algorithm proposed in this paper not only solves the problems such as low contrast and blocking effects caused by fusion algorithms in space domain, but also avoids the artifacts and ringing artifacts exhibited by conventional wavelet based fusion algorithms. Keywords: DT-CWT, image fusion, multi-focus, NGMS, AVMS
提出了一种基于双树复小波变换的多焦点图像融合算法。离散小波变换(DWT)存在平移方差大、方向选择性差等缺点。因此,为了更好地表示图像,对图像进行DT-CWT处理。由于低频系数和高频系数的特性不同,采用不同的方法分别进行融合。对于低频系数,采用邻域梯度最大选择性(NGMS)方案,选取邻域梯度最大的系数。对于高频系数,采用绝对值最大选择性(AVMS),选取绝对值最大的系数。实验结果表明,本文提出的算法不仅解决了小波融合算法在空间域中对比度低和块效应等问题,而且避免了传统小波融合算法存在的伪影和环形伪影。关键词:DT-CWT,图像融合,多焦点,NGMS, AVMS
{"title":"A Multi-Focus Image Fusion Algorithm with DT-CWT","authors":"Sun Wei, Wang Ke","doi":"10.1109/CIS.2007.46","DOIUrl":"https://doi.org/10.1109/CIS.2007.46","url":null,"abstract":"A multi-focus image fusion algorithm with Dual-Tree Complex Wavelet Transform (DT-CWT) is proposed in the paper. There are some disadvantages in Discrete Wavelet Transform (DWT), such as shift variance and lack of directional selectivity. Therefore, to have better representation of the images, they are processed with DT-CWT. The low frequency coefficients and high frequency coefficients are fused separately with different methods because of their different characteristics. To the low frequency coefficients, neighborhood gradient maximum selectivity (NGMS) scheme is used, the ones having maximal neighborhood gradient are selected. To the high frequency coefficients, the absolute value maximum selectivity (AVMS) is used, the ones having maximal absolute values are selected. Experiment results show that the algorithm proposed in this paper not only solves the problems such as low contrast and blocking effects caused by fusion algorithms in space domain, but also avoids the artifacts and ringing artifacts exhibited by conventional wavelet based fusion algorithms. Keywords: DT-CWT, image fusion, multi-focus, NGMS, AVMS","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123316279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Recognition Approach for Adversarial Planning Based on Complete Goal Graph 基于完全目标图的对抗性规划识别方法
Ji-Li Yin, Y. Liu, Jinyan Wang, W. Gu, Yin-Ping Zhang
Based on classical plan graph and goal graph, complete goal graph (CGG) is constructed against the characteristics of adversarial domain. The complete goal graph makes the action relate with its goal directly, which is more efficient to recognize adversarial goals. The conception of complete degree of goals will be put forward to distinguish adversarial high level goals. Then, a deep research is done on adversarial plan recognition algorithm based on CGG, which not only can predict adversarial next step action, but also can recognize adversarial goals in different levels with complete degrees. The research is of great significance for the plan recognition problem of uncontrollable and nondeterministic domain such as contest robot, information security, business strategy, game role design and etc.
在经典平面图和目标图的基础上,针对对抗域的特点构造了完全目标图。完整的目标图使行动与其目标直接相关,从而更有效地识别对抗性目标。提出目标完备度的概念来区分对抗性高水平目标。然后,对基于CGG的对抗计划识别算法进行了深入研究,该算法不仅可以预测对手下一步行动,而且可以识别不同级别的完整度对抗目标。该研究对竞赛机器人、信息安全、商业策略、游戏角色设计等不可控和不确定领域的计划识别问题具有重要意义。
{"title":"A Recognition Approach for Adversarial Planning Based on Complete Goal Graph","authors":"Ji-Li Yin, Y. Liu, Jinyan Wang, W. Gu, Yin-Ping Zhang","doi":"10.1109/CIS.2007.91","DOIUrl":"https://doi.org/10.1109/CIS.2007.91","url":null,"abstract":"Based on classical plan graph and goal graph, complete goal graph (CGG) is constructed against the characteristics of adversarial domain. The complete goal graph makes the action relate with its goal directly, which is more efficient to recognize adversarial goals. The conception of complete degree of goals will be put forward to distinguish adversarial high level goals. Then, a deep research is done on adversarial plan recognition algorithm based on CGG, which not only can predict adversarial next step action, but also can recognize adversarial goals in different levels with complete degrees. The research is of great significance for the plan recognition problem of uncontrollable and nondeterministic domain such as contest robot, information security, business strategy, game role design and etc.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130977816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2007 International Conference on Computational Intelligence and Security (CIS 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1