首页 > 最新文献

2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)最新文献

英文 中文
Novel signal processing of brain activity based on Ant Colony Optimization and wavelet analysis with near infrared spectroscopy 基于蚁群优化和近红外小波分析的脑活动信号处理新方法
Xu Huang, Raul Fernandez-Rojas, K. Ou, A. C. Madoc
Signal processing of brain activity is becoming challenging to various researchers from different areas, including medical, biomedical, and engineering researchers. In this paper, investigations of brain activity are made from experimental works, with optical flow based on spatiotemporal analysis and wavelet over the equipment of Near Infrared Spectroscopy (NIRS). Ant Colony Optimization (ACO) algorithm is employed for obtaining the distributions of the intensity of the targeted image. The major outcomes of this paper from our research are the following items: (a) optical flow can be a proper technology for the investigation of brain activity based on NIRS; (b) the analyses of the temporal domain, the spatial domain, and the wavelet domain underpinned coherently to our experimental results; (c) our wavelet analysis can define the most brain activity image, denoted as targeted image; (d) the details of the intensity distributions on the targeted image show the most significant brain activity via ACO algorithm; (e) we can clearly observe, via our algorithm technology, the existence of the so-called Dominant Channel (DC) based on spatiotemporal analysis and it plays a critical role in brain activity. The spatial distribution of the origin of cortical activity can be described by hemodynamic response in the cerebral cortex after evoked stimulation using near infrared spectroscopy. Further application of this research is expected in the next step research outcomes.
大脑活动的信号处理对包括医学、生物医学和工程研究人员在内的不同领域的研究人员来说是一个挑战。本文在近红外光谱(NIRS)设备上,利用基于时空分析和小波变换的光流对脑活动进行了实验研究。采用蚁群算法求解目标图像的强度分布。本文的主要研究成果如下:(a)光流技术可以作为近红外光谱研究脑活动的一种合适的技术;(b)与实验结果相一致的时域、空域和小波域分析;(c)我们的小波分析可以定义出大脑活动最多的图像,记为目标图像;(d)目标图像上的强度分布细节通过蚁群算法显示了最显著的大脑活动;(e)通过我们的算法技术,我们可以清楚地观察到基于时空分析的所谓的优势通道(DC)的存在,它在大脑活动中起着至关重要的作用。近红外光谱法可以用诱发刺激后大脑皮层的血流动力学反应来描述皮层活动起源的空间分布。期待本研究在下一步研究成果中的进一步应用。
{"title":"Novel signal processing of brain activity based on Ant Colony Optimization and wavelet analysis with near infrared spectroscopy","authors":"Xu Huang, Raul Fernandez-Rojas, K. Ou, A. C. Madoc","doi":"10.1109/ICCSN.2016.7586623","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586623","url":null,"abstract":"Signal processing of brain activity is becoming challenging to various researchers from different areas, including medical, biomedical, and engineering researchers. In this paper, investigations of brain activity are made from experimental works, with optical flow based on spatiotemporal analysis and wavelet over the equipment of Near Infrared Spectroscopy (NIRS). Ant Colony Optimization (ACO) algorithm is employed for obtaining the distributions of the intensity of the targeted image. The major outcomes of this paper from our research are the following items: (a) optical flow can be a proper technology for the investigation of brain activity based on NIRS; (b) the analyses of the temporal domain, the spatial domain, and the wavelet domain underpinned coherently to our experimental results; (c) our wavelet analysis can define the most brain activity image, denoted as targeted image; (d) the details of the intensity distributions on the targeted image show the most significant brain activity via ACO algorithm; (e) we can clearly observe, via our algorithm technology, the existence of the so-called Dominant Channel (DC) based on spatiotemporal analysis and it plays a critical role in brain activity. The spatial distribution of the origin of cortical activity can be described by hemodynamic response in the cerebral cortex after evoked stimulation using near infrared spectroscopy. Further application of this research is expected in the next step research outcomes.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116621331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A blind detection method for tracing the real source of DDoS attack packets by cluster matching 一种通过集群匹配跟踪DDoS攻击报文真实来源的盲检测方法
Yonghong Chen, Xin Chen, H. Tian, Tian Wang, Yiqiao Cai
With the rapid growth of the Internet, the impact of attacks becomes more serious. IP spoofing makes hosts hard to defend against DDoS attacks. In this paper, we propose a blind detection method for tracing the real source of DDoS attack packets. Tracing the real source of a single-packet is difficult, so we trace-back a cluster of similar packets rather than a single-packet by cluster matching. We choose K-harmonic means clustering method to preprocess the packets according to our proposed quantitative model, at the same time, we propose an approach to determine the best number of clusters. In addition, we propose a novel detection algorithm about cluster matching for tracing the real source of packet clusters based on K-harmonic means and our improved silhouette. Experimental results show that our method can detect the real source of packets with up to 92.54% accuracy.
随着互联网的快速发展,网络攻击的影响越来越严重。IP欺骗使主机难以抵御DDoS攻击。在本文中,我们提出了一种盲检测方法来追踪DDoS攻击数据包的真实来源。跟踪单个数据包的真实来源是困难的,因此我们通过集群匹配来跟踪类似数据包的集群,而不是单个数据包。根据所提出的定量模型,选择k调和均值聚类方法对数据包进行预处理,同时提出了一种确定最佳聚类数的方法。此外,我们提出了一种新的基于k谐波均值和改进轮廓的聚类匹配检测算法,用于跟踪数据包聚类的真实来源。实验结果表明,该方法能够检测出数据包的真实来源,准确率高达92.54%。
{"title":"A blind detection method for tracing the real source of DDoS attack packets by cluster matching","authors":"Yonghong Chen, Xin Chen, H. Tian, Tian Wang, Yiqiao Cai","doi":"10.1109/ICCSN.2016.7586583","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586583","url":null,"abstract":"With the rapid growth of the Internet, the impact of attacks becomes more serious. IP spoofing makes hosts hard to defend against DDoS attacks. In this paper, we propose a blind detection method for tracing the real source of DDoS attack packets. Tracing the real source of a single-packet is difficult, so we trace-back a cluster of similar packets rather than a single-packet by cluster matching. We choose K-harmonic means clustering method to preprocess the packets according to our proposed quantitative model, at the same time, we propose an approach to determine the best number of clusters. In addition, we propose a novel detection algorithm about cluster matching for tracing the real source of packet clusters based on K-harmonic means and our improved silhouette. Experimental results show that our method can detect the real source of packets with up to 92.54% accuracy.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132040191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance analysis of TAS/SC in MIMO relay systems with outdated CSI in the presence of co-channel interference 具有过时CSI的MIMO中继系统在同信道干扰下的TAS/SC性能分析
Feiyu Hou, Kun Xiao
In this paper, we investigate the impact of the outdated Channel State Information (CSI) and the Co-Channel Interference (CCI) on the performance of Transmit Antenna Selection with Selective Combining (TAS/SC) in a dual-hop amplify-and-forward (AF) Multiple-Input Multiple-Output (MIMO) relay network. We derive the exact closed-form and asymptotic expressions for the outage probability in the cases of perfect and outdated CSI, respectively. The simulation results match the theoretical analysis well. The findings suggest that the outdated CSI and CCI have significant impacts on the outage probability of an AF MIMO relay system with TAS/SC.
在本文中,我们研究了过时的信道状态信息(CSI)和同信道干扰(CCI)对双跳放大和转发(AF)多输入多输出(MIMO)中继网络中选择性组合发射天线选择(TAS/SC)性能的影响。分别导出了完美CSI和过时CSI情况下的停机概率的精确封闭形式和渐近表达式。仿真结果与理论分析吻合较好。研究结果表明,过时的CSI和CCI对具有TAS/SC的AF MIMO中继系统的中断概率有显著影响。
{"title":"Performance analysis of TAS/SC in MIMO relay systems with outdated CSI in the presence of co-channel interference","authors":"Feiyu Hou, Kun Xiao","doi":"10.1109/ICCSN.2016.7586644","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586644","url":null,"abstract":"In this paper, we investigate the impact of the outdated Channel State Information (CSI) and the Co-Channel Interference (CCI) on the performance of Transmit Antenna Selection with Selective Combining (TAS/SC) in a dual-hop amplify-and-forward (AF) Multiple-Input Multiple-Output (MIMO) relay network. We derive the exact closed-form and asymptotic expressions for the outage probability in the cases of perfect and outdated CSI, respectively. The simulation results match the theoretical analysis well. The findings suggest that the outdated CSI and CCI have significant impacts on the outage probability of an AF MIMO relay system with TAS/SC.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130052957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An image display and analysis system for fluorescence microscopic sample 一种荧光显微样品图像显示与分析系统
Huan Jiang, Yu Wang, Changchun Zhang, X. Zhu
The quality of the fluorescence microscopic image is greatly degraded because of the physical limitation and human disturbance during the course of the optical imaging. Many image restoration and reconstruction algorithms were proposed to solve this problem. In this paper, an image display and analysis system for fluorescence microscopic sample was designed based on two-dimensional restoration and three-dimensional reconstruction algorithms. Our system aims to integrate those algorithms into one display interface. In this case, it is more convenient and ocular to process the images of fluorescence microscopic sample, and the results are more impressive. Users can obtain different restoration results by choosing different algorithms, and observe different restoration effects by setting different parameters.
由于光学成像过程中的物理限制和人为干扰,使荧光显微图像的质量大大降低。为了解决这一问题,提出了许多图像恢复和重建算法。本文设计了一种基于二维恢复和三维重建算法的荧光显微样品图像显示与分析系统。我们的系统旨在将这些算法集成到一个显示界面中。在这种情况下,处理荧光显微样品的图像更方便,更直观,结果也更令人印象深刻。用户通过选择不同的算法可以获得不同的恢复结果,通过设置不同的参数可以观察到不同的恢复效果。
{"title":"An image display and analysis system for fluorescence microscopic sample","authors":"Huan Jiang, Yu Wang, Changchun Zhang, X. Zhu","doi":"10.1109/ICCSN.2016.7586607","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586607","url":null,"abstract":"The quality of the fluorescence microscopic image is greatly degraded because of the physical limitation and human disturbance during the course of the optical imaging. Many image restoration and reconstruction algorithms were proposed to solve this problem. In this paper, an image display and analysis system for fluorescence microscopic sample was designed based on two-dimensional restoration and three-dimensional reconstruction algorithms. Our system aims to integrate those algorithms into one display interface. In this case, it is more convenient and ocular to process the images of fluorescence microscopic sample, and the results are more impressive. Users can obtain different restoration results by choosing different algorithms, and observe different restoration effects by setting different parameters.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116366759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power control for buffer limited physical layer network coding 缓冲区限制物理层网络编码的功率控制
Meng Qingmin, Pang Fengmei, Zou Yulong
The requirement of high data rate and energy efficiency for a new generation of wireless network should reshape the designs of wireless heterogeneous network architecture including wireless relaying. For two-top bi-directional information exchange in wireless networks, we consider a wireless transmission design, which adopts the bi-directional relaying channel and the physical broadcasting. The bi-directional relaying channel is roughly divided into Decode and Forward (DF) strategy and Amplify and Forward (AF) strategy. This work focuses on a power control scheme of the DF-based bi-directional relaying in the configuration of a limited and a non-limited buffer. This scheme assumes that the transmitters of two source nodes have the channel gain information of the bi-directional relaying channel. The numerical results show that: the size of buffer at the relay node will not affect average end-to-end capacity over the Rayleigh fading channel while the size of maximum buffer is set as to an appropriate value. In addition, optimal power control will significantly improve the average end-to-end capacity of the transmission strategy compared to that of the equal power control scheme.
新一代无线网络对高数据速率和高能效的要求将重塑包括无线中继在内的无线异构网络架构的设计。针对无线网络中的两顶双向信息交换,提出了一种采用双向中继信道和物理广播的无线传输设计。双向中继信道大致分为解码转发(DF)策略和放大转发(AF)策略。本文主要研究基于df的双向继电器在有限和非有限缓冲器配置下的功率控制方案。该方案假定两个源节点的发射机都具有双向中继信道的信道增益信息。数值计算结果表明:当最大缓冲区的大小设置为适当值时,中继节点的缓冲区大小不会影响瑞利衰落信道的平均端到端容量。此外,与等功率控制方案相比,最优功率控制将显著提高传输策略的端到端平均容量。
{"title":"Power control for buffer limited physical layer network coding","authors":"Meng Qingmin, Pang Fengmei, Zou Yulong","doi":"10.1109/ICCSN.2016.7586577","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586577","url":null,"abstract":"The requirement of high data rate and energy efficiency for a new generation of wireless network should reshape the designs of wireless heterogeneous network architecture including wireless relaying. For two-top bi-directional information exchange in wireless networks, we consider a wireless transmission design, which adopts the bi-directional relaying channel and the physical broadcasting. The bi-directional relaying channel is roughly divided into Decode and Forward (DF) strategy and Amplify and Forward (AF) strategy. This work focuses on a power control scheme of the DF-based bi-directional relaying in the configuration of a limited and a non-limited buffer. This scheme assumes that the transmitters of two source nodes have the channel gain information of the bi-directional relaying channel. The numerical results show that: the size of buffer at the relay node will not affect average end-to-end capacity over the Rayleigh fading channel while the size of maximum buffer is set as to an appropriate value. In addition, optimal power control will significantly improve the average end-to-end capacity of the transmission strategy compared to that of the equal power control scheme.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133602191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blind identification for Turbo codes in AMC systems Turbo码在AMC系统中的盲识别
R. Pei, Zulin Wang, Qiang Xiao, Li Quan
Blind identification for channel codes are essential in adaptive modulation and coding (AMC) systems. Since Turbo codes are popular in AMC systems, it's necessary to identify its parameters. In this paper, we focus on the identification for Turbo codes from a closed-set. The proposed approach firstly identifies the first component code by accumulating Log-Likelihood Ratio (LLR) for syndrome a posteriori probability, then the interleaver and the other component code are identified by decoding based on zero insertion and LLR accumulation. This approach is robust to noise due to LLR. Moreover, it applies to both symmetric Turbo codes with two same component codes and asymmetric Turbo codes with two different component codes. Simulation results demonstrate that the proposed blind identification scheme is able to identify Turbo codes at signal-to-noise ratio (SNR) larger than 3.5dB.
信道码的盲识别是自适应调制编码(AMC)系统的关键。由于Turbo码在AMC系统中很流行,因此有必要对其参数进行识别。本文主要研究了Turbo码在闭集中的识别问题。该方法首先通过累积后验概率对数似然比(LLR)识别第一分量码,然后基于零插入和LLR累积的译码方法识别交织器和其他分量码。由于LLR的存在,该方法对噪声具有鲁棒性。此外,它既适用于具有两个相同分量码的对称Turbo码,也适用于具有两个不同分量码的非对称Turbo码。仿真结果表明,该盲识别方案能够在信噪比大于3.5dB的情况下识别Turbo码。
{"title":"Blind identification for Turbo codes in AMC systems","authors":"R. Pei, Zulin Wang, Qiang Xiao, Li Quan","doi":"10.1109/ICCSN.2016.7587202","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7587202","url":null,"abstract":"Blind identification for channel codes are essential in adaptive modulation and coding (AMC) systems. Since Turbo codes are popular in AMC systems, it's necessary to identify its parameters. In this paper, we focus on the identification for Turbo codes from a closed-set. The proposed approach firstly identifies the first component code by accumulating Log-Likelihood Ratio (LLR) for syndrome a posteriori probability, then the interleaver and the other component code are identified by decoding based on zero insertion and LLR accumulation. This approach is robust to noise due to LLR. Moreover, it applies to both symmetric Turbo codes with two same component codes and asymmetric Turbo codes with two different component codes. Simulation results demonstrate that the proposed blind identification scheme is able to identify Turbo codes at signal-to-noise ratio (SNR) larger than 3.5dB.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125724674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Recognition based segmentation of connected characters in text based CAPTCHAs 基于文本的验证码中连接字符的识别分割
Rafaqat Hussain, Hui-xian Gao, R. Shaikh, S. Soomro
Text based CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is the most widely used mechanism adopted by numerous popular web sites in order to differentiate between machines and humans, however due to extensive research carried out by computer vision researchers, it is now a days vulnerable against automated attacks. Segmentation is the most difficult task in automatic recognition of CAPTCHAs, therefore contemporary Text based CAPTCHAs try to combine the characters together in order to make them as segmentation resistant against these attacks as possible. In this research, we have found vulnerabilities in such CAPTCHAs, a novel mechanism, i.e. the recognition based segmentation is applied to crop such connected characters, a sliding window based neural network classifier is used to recognize and segment the connected characters. Experimental results have proved 95.5% recognition success rate and 58.25% segmentation success rate on our dataset of tmall CAPTCHAs, this algorithm is further tested on two other datasets of slightly different implementations and promising results were achieved.
基于文本的CAPTCHA(完全自动化的公共图灵测试来告诉计算机和人类分开)是许多流行网站采用的最广泛使用的机制,以区分机器和人类,但是由于计算机视觉研究人员进行了广泛的研究,它现在很容易受到自动化攻击。分割是captcha自动识别中最困难的任务,因此当代基于文本的captcha试图将字符组合在一起,以使它们尽可能地抵抗这些攻击。在本研究中,我们发现了这类验证码的漏洞,采用了一种新的机制,即基于识别的分割来裁剪这些连接字符,使用基于滑动窗口的神经网络分类器来识别和分割连接字符。实验结果表明,在我们的天猫验证码数据集上,该算法的识别成功率为95.5%,分割成功率为58.25%,在另外两个实现略有不同的数据集上进行了进一步的测试,取得了令人满意的结果。
{"title":"Recognition based segmentation of connected characters in text based CAPTCHAs","authors":"Rafaqat Hussain, Hui-xian Gao, R. Shaikh, S. Soomro","doi":"10.1109/ICCSN.2016.7586608","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586608","url":null,"abstract":"Text based CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is the most widely used mechanism adopted by numerous popular web sites in order to differentiate between machines and humans, however due to extensive research carried out by computer vision researchers, it is now a days vulnerable against automated attacks. Segmentation is the most difficult task in automatic recognition of CAPTCHAs, therefore contemporary Text based CAPTCHAs try to combine the characters together in order to make them as segmentation resistant against these attacks as possible. In this research, we have found vulnerabilities in such CAPTCHAs, a novel mechanism, i.e. the recognition based segmentation is applied to crop such connected characters, a sliding window based neural network classifier is used to recognize and segment the connected characters. Experimental results have proved 95.5% recognition success rate and 58.25% segmentation success rate on our dataset of tmall CAPTCHAs, this algorithm is further tested on two other datasets of slightly different implementations and promising results were achieved.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124792162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The importance of k-shell in discovering key nodes in complex networks k-shell在复杂网络中发现关键节点的重要性
Hong Zhang, Changzhen Hu, Xiaojun Wang
Outlier detection is drawing more attention in recent years. It has a wide variety of applications, including network intrusion detection and event detection. A great deal of research has been done in this area, using spectrum or MDL (Minimum Description Length) as important tools to find some outliers. In this paper, we bring the k-shell into the outlier detection in complex networks, using the structural entropy as a way to measure the feature of the whole complex network. Through the experiment both on a synthetic network and a real world network, we give the importance of k-shell in discovering outliers in complex networks.
离群值检测近年来受到越来越多的关注。它具有广泛的应用,包括网络入侵检测和事件检测。在这方面已经做了大量的研究,使用频谱或MDL(最小描述长度)作为发现一些异常值的重要工具。本文将k壳引入到复杂网络的离群点检测中,利用结构熵作为一种度量整个复杂网络特征的方法。通过在一个合成网络和一个真实网络上的实验,我们给出了k-shell在复杂网络中发现离群值的重要性。
{"title":"The importance of k-shell in discovering key nodes in complex networks","authors":"Hong Zhang, Changzhen Hu, Xiaojun Wang","doi":"10.1109/ICCSN.2016.7586586","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586586","url":null,"abstract":"Outlier detection is drawing more attention in recent years. It has a wide variety of applications, including network intrusion detection and event detection. A great deal of research has been done in this area, using spectrum or MDL (Minimum Description Length) as important tools to find some outliers. In this paper, we bring the k-shell into the outlier detection in complex networks, using the structural entropy as a way to measure the feature of the whole complex network. Through the experiment both on a synthetic network and a real world network, we give the importance of k-shell in discovering outliers in complex networks.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129074204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Space millimeter-wavelength very long baseline interferometry simulation software 空间毫米波超长基线干涉测量仿真软件
T. An, B. Lao, Junyi Wang, Yang Lu, Yanheng Wei, Xiaocong Wu
The Strategic Priority Research Program on Space Science of the Chinese Academy of Sciences, “Space Millimeter-wavelength VLBI Array (SMVA)”, aims to build the first space millimeter-wavelength Very Long Baseline Interferometry (VLBI) array in the world. The SMVA, which has the ultra-high spatial resolution with a best of 20 micro-arcsecond that a ground-based VLBI array can not attain, is a powerful tool in imaging the hyperfine emission structure surrounding the black holes and other compact celestial objects. The simulations, such as UV coverage simulation, numerical simulation and image simulation, play a crucial role in all phases of the project, so a space VLBI simulation software was designed and implemented. This software has all the necessary and auxiliary simulation functions. And it has many advantages compared to other similar software packages: its interface is more friendly, the software package is robust and independent of operation system, the code is much easier to expand and scalable.
中国科学院空间科学战略重点研究项目“空间毫米波VLBI阵列(SMVA)”,旨在建设世界上第一个空间毫米波甚长基线干涉测量(VLBI)阵列。SMVA具有地面VLBI阵列无法达到的最高20微弧秒的超高空间分辨率,是对黑洞和其他致密天体周围超精细发射结构进行成像的有力工具。紫外覆盖仿真、数值仿真和图像仿真在项目的各个阶段都起着至关重要的作用,因此设计并实现了空间VLBI仿真软件。该软件具有所有必要的和辅助的仿真功能。与其他同类软件包相比,它具有许多优点:它的界面更友好,软件包健壮且独立于操作系统,代码更容易扩展和扩展。
{"title":"Space millimeter-wavelength very long baseline interferometry simulation software","authors":"T. An, B. Lao, Junyi Wang, Yang Lu, Yanheng Wei, Xiaocong Wu","doi":"10.1109/ICCSN.2016.7586664","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586664","url":null,"abstract":"The Strategic Priority Research Program on Space Science of the Chinese Academy of Sciences, “Space Millimeter-wavelength VLBI Array (SMVA)”, aims to build the first space millimeter-wavelength Very Long Baseline Interferometry (VLBI) array in the world. The SMVA, which has the ultra-high spatial resolution with a best of 20 micro-arcsecond that a ground-based VLBI array can not attain, is a powerful tool in imaging the hyperfine emission structure surrounding the black holes and other compact celestial objects. The simulations, such as UV coverage simulation, numerical simulation and image simulation, play a crucial role in all phases of the project, so a space VLBI simulation software was designed and implemented. This software has all the necessary and auxiliary simulation functions. And it has many advantages compared to other similar software packages: its interface is more friendly, the software package is robust and independent of operation system, the code is much easier to expand and scalable.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"2006 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121079263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proposed retinal abnormality detection and classification approach: Computer aided detection for diabetic retinopathy by machine learning approaches 提出视网膜异常检测与分类方法:利用机器学习方法对糖尿病视网膜病变进行计算机辅助检测
V. Raman, P. Then, P. Sumari
Diabetes occurs when the pancreas fails to secrete enough insulin, slowly affecting the retina of the human eye, leading to diabetic retinopathy. The blood vessels in the retina get altered and have abnormality. Exudates are secreted, micro-aneurysms and haemorrhages occur in the retina. The appearance of these features represents the degree of severity of the disease. Early detection of diabetic retinopathy plays a major role in the success of such disease treatment. The main challenge is to extract exudates which are similar in colour property and size of the optic disk, and then micro-aneurysms are similar in colour and proximity with blood vessels. The main objective of the paper is to develop a computer aided detection system to find the abnormality of retinal imaging and detects the presence of abnormality features from retinal fundus images. There is few existing research works have been undergone by applying machine learning techniques, but existing approaches have not achieved a good accuracy of detection and they have not yielded successful performance in different datasets. The proposed methodology is to enhance the image and filter the noise, detect blood vessel and identify the optic disc, extract the exudates and micro aneurysms, extract the features and classify different stages of diabetic retinopathy into mild, moderate, severe non-proliferative diabetic retinopathy (NPDR) and proliferative Diabetic retinopathy (PDR) by using proposed machine learning methods. The expected output of proposed work in this paper will be a preliminary design and pilot prototype development.
当胰腺不能分泌足够的胰岛素时,就会发生糖尿病,慢慢影响人眼的视网膜,导致糖尿病视网膜病变。视网膜上的血管发生了改变,出现了异常。渗出物分泌,视网膜出现微动脉瘤和出血。这些特征的出现代表了疾病的严重程度。糖尿病视网膜病变的早期发现对这种疾病的成功治疗起着重要作用。主要的挑战是提取出与视盘颜色性质和大小相似的渗出物,然后提取出颜色相似且与血管接近的微动脉瘤。本文的主要目的是开发一种计算机辅助检测系统来发现视网膜成像中的异常,并从视网膜眼底图像中检测出异常特征的存在。应用机器学习技术进行的现有研究工作很少,但是现有的方法没有达到很好的检测精度,并且在不同的数据集上没有取得成功的性能。该方法采用机器学习方法对不同阶段的糖尿病视网膜病变进行轻度、中度、重度非增殖性糖尿病视网膜病变(NPDR)和增殖性糖尿病视网膜病变(PDR)分类,增强图像并滤除噪声,检测血管并识别视盘,提取渗出物和微动脉瘤,提取特征。本文提出的工作的预期产出将是初步设计和试点原型开发。
{"title":"Proposed retinal abnormality detection and classification approach: Computer aided detection for diabetic retinopathy by machine learning approaches","authors":"V. Raman, P. Then, P. Sumari","doi":"10.1109/ICCSN.2016.7586601","DOIUrl":"https://doi.org/10.1109/ICCSN.2016.7586601","url":null,"abstract":"Diabetes occurs when the pancreas fails to secrete enough insulin, slowly affecting the retina of the human eye, leading to diabetic retinopathy. The blood vessels in the retina get altered and have abnormality. Exudates are secreted, micro-aneurysms and haemorrhages occur in the retina. The appearance of these features represents the degree of severity of the disease. Early detection of diabetic retinopathy plays a major role in the success of such disease treatment. The main challenge is to extract exudates which are similar in colour property and size of the optic disk, and then micro-aneurysms are similar in colour and proximity with blood vessels. The main objective of the paper is to develop a computer aided detection system to find the abnormality of retinal imaging and detects the presence of abnormality features from retinal fundus images. There is few existing research works have been undergone by applying machine learning techniques, but existing approaches have not achieved a good accuracy of detection and they have not yielded successful performance in different datasets. The proposed methodology is to enhance the image and filter the noise, detect blood vessel and identify the optic disc, extract the exudates and micro aneurysms, extract the features and classify different stages of diabetic retinopathy into mild, moderate, severe non-proliferative diabetic retinopathy (NPDR) and proliferative Diabetic retinopathy (PDR) by using proposed machine learning methods. The expected output of proposed work in this paper will be a preliminary design and pilot prototype development.","PeriodicalId":158877,"journal":{"name":"2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115111828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2016 8th IEEE International Conference on Communication Software and Networks (ICCSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1