Pub Date : 2012-05-19DOI: 10.1109/ICSAI.2012.6223613
Ranran Feng, Jiahuang Ji
Many methods on extracting 3D information from 2D images have been studied since 1990s, especially the depth information extraction. A novel approach for depth extraction is proposed and implemented in this paper. About 30 images are taken especially for this case study and experiments are conducted on the Stanford Range Image Data. Results show that this approach is generally suitable for most of the images; and performs even better on images with darker background.
{"title":"A novel approach for depth extraction from single 2D image","authors":"Ranran Feng, Jiahuang Ji","doi":"10.1109/ICSAI.2012.6223613","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223613","url":null,"abstract":"Many methods on extracting 3D information from 2D images have been studied since 1990s, especially the depth information extraction. A novel approach for depth extraction is proposed and implemented in this paper. About 30 images are taken especially for this case study and experiments are conducted on the Stanford Range Image Data. Results show that this approach is generally suitable for most of the images; and performs even better on images with darker background.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128145153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-19DOI: 10.1109/ICSAI.2012.6223520
Xiaojuan Yang
There are many duplicated web pages in the multimedia web resources, and elimination of the duplicates can remove the duplicated pages, reduce storage costs and improve search engine performance. Based on analysis of the classic algorithm of eliminating the duplicates, his article raises an improved algorithm for judging web page text repetition. The new algorithm runs the elimination process on the basis of webpage contents which are used as the vector characteristics in the comparison with the webpages' approximation, and analyzes how to capture the web page's theme. Hence, we can make a multidimensional improvement in the elimination of the duplicates of multimedia webpages.
{"title":"Study on the elimination of duplicated multimedia webpages","authors":"Xiaojuan Yang","doi":"10.1109/ICSAI.2012.6223520","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223520","url":null,"abstract":"There are many duplicated web pages in the multimedia web resources, and elimination of the duplicates can remove the duplicated pages, reduce storage costs and improve search engine performance. Based on analysis of the classic algorithm of eliminating the duplicates, his article raises an improved algorithm for judging web page text repetition. The new algorithm runs the elimination process on the basis of webpage contents which are used as the vector characteristics in the comparison with the webpages' approximation, and analyzes how to capture the web page's theme. Hence, we can make a multidimensional improvement in the elimination of the duplicates of multimedia webpages.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133760537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper provides a novel chaos-based image encryption algorithm with quadratic residue. The proposed scheme introduced a significant diffusion effect through a two-stage diffusion algorithm. In first-diffusion stage, we turn each pixel of the original image into 8 bits binary sequence, and apply Chebyshev map to shuffle the 8 bits binary sequence. In second-diffusion stage, we apply quadratic residue to encrypt the new binary sequence. Therefore, the proposed scheme transforms the statistical characteristics of plain image information drastically and randomly. Finally, Various types of security analyses demonstrate that the security of the proposed scheme is competitive with that of permutation-diffusion type image cipher and is very proper for realtime secure image communication applications.
{"title":"A new chaos-based image encryption scheme using quadratic residue","authors":"Hegui Zhu, Xiaojun Lu, Qingsong Tang, Xiangde Zhang, Cheng Zhao","doi":"10.1109/ICSAI.2012.6223394","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223394","url":null,"abstract":"This paper provides a novel chaos-based image encryption algorithm with quadratic residue. The proposed scheme introduced a significant diffusion effect through a two-stage diffusion algorithm. In first-diffusion stage, we turn each pixel of the original image into 8 bits binary sequence, and apply Chebyshev map to shuffle the 8 bits binary sequence. In second-diffusion stage, we apply quadratic residue to encrypt the new binary sequence. Therefore, the proposed scheme transforms the statistical characteristics of plain image information drastically and randomly. Finally, Various types of security analyses demonstrate that the security of the proposed scheme is competitive with that of permutation-diffusion type image cipher and is very proper for realtime secure image communication applications.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131847075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-19DOI: 10.1109/ICSAI.2012.6223259
Yuee Wen
Information technology is of great importance in College English teaching for non-English majors in China. This article talks about the theoretical basis of College English teaching based on information technology and the practice, and points out its future direction.
{"title":"Study on the application of information technology in College English teaching","authors":"Yuee Wen","doi":"10.1109/ICSAI.2012.6223259","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223259","url":null,"abstract":"Information technology is of great importance in College English teaching for non-English majors in China. This article talks about the theoretical basis of College English teaching based on information technology and the practice, and points out its future direction.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134601598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-19DOI: 10.1109/ICSAI.2012.6223494
Jingyong Li, Lan Huang, Tian Bai, Zhe Wang, Hongsheng Chen
Most existing community detection methods ignored the dynamic nature, a key property of social networks and these methods often lead to unreasonable divisions when faced with dynamic environments. Although there have been several dynamic community detection algorithms, low accuracy and low performing are still two challenging problems to be solved. In order to solve above problems, we proposed a new algorithm based on incremental analysis to mine communities in dynamic social networks. Extensive experimental results demonstrate the performance of our propose algorithm.
{"title":"CDBIA: A dynamic community detection method based on incremental analysis","authors":"Jingyong Li, Lan Huang, Tian Bai, Zhe Wang, Hongsheng Chen","doi":"10.1109/ICSAI.2012.6223494","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223494","url":null,"abstract":"Most existing community detection methods ignored the dynamic nature, a key property of social networks and these methods often lead to unreasonable divisions when faced with dynamic environments. Although there have been several dynamic community detection algorithms, low accuracy and low performing are still two challenging problems to be solved. In order to solve above problems, we proposed a new algorithm based on incremental analysis to mine communities in dynamic social networks. Extensive experimental results demonstrate the performance of our propose algorithm.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-19DOI: 10.1109/ICSAI.2012.6223462
Wang Zhang, Xiaohui Duan, H. Kou, Y. Gao, Lixia Deng, Daoxian Wang
High performance network over coax (HINOC) is a recently proposed technology which achieves high-performance wide-band duplex data transmission using the vacant frequency resource beyond the existing broadcast TV channel. As HINOC is a novel technology, there exists no testing equipment designed for it yet. In this paper, we designed a high-speed configurable signal generator for HINOC system test. The system of the signal generator is implemented based on NI PXI platform. The HINOC algorithm used to generate HINOC physical layer signal is realized by software, which is convenient for maintenance and upgrade. Transmission, DA conversion and RF upconversion of the signal are performed by hardware (FPGA, NI PXI modules). The signal generator is tested using a HINOC signal analyzer. The test demonstrated that the signal generator meets the HINOC test specification and can provide standard HINOC physical layer signal.
{"title":"High-speed configurable signal generator for access network system test","authors":"Wang Zhang, Xiaohui Duan, H. Kou, Y. Gao, Lixia Deng, Daoxian Wang","doi":"10.1109/ICSAI.2012.6223462","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223462","url":null,"abstract":"High performance network over coax (HINOC) is a recently proposed technology which achieves high-performance wide-band duplex data transmission using the vacant frequency resource beyond the existing broadcast TV channel. As HINOC is a novel technology, there exists no testing equipment designed for it yet. In this paper, we designed a high-speed configurable signal generator for HINOC system test. The system of the signal generator is implemented based on NI PXI platform. The HINOC algorithm used to generate HINOC physical layer signal is realized by software, which is convenient for maintenance and upgrade. Transmission, DA conversion and RF upconversion of the signal are performed by hardware (FPGA, NI PXI modules). The signal generator is tested using a HINOC signal analyzer. The test demonstrated that the signal generator meets the HINOC test specification and can provide standard HINOC physical layer signal.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114837017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-19DOI: 10.1109/ICSAI.2012.6223538
Sijia Zou, L. Yi
In recent years, rapid warming of Arctic has made the Northwest Passage navigation possible. In this paper, we roughly studied features of variation of sea ice's concentration during the summer season, June, August and September, using AMSR-E sea ice concentration product with the resolution of 6.25 kilometers from the year 2002 to 2010. By studying the variation, we got deeper understanding of the main features of sea ice seasonal and inter-annual variation and distribution. What's more, we looked into the relevance between sea surface temperature(SST), sea level pressure(SLP) and the reducing amount of annual sea ice concentration (May minus September) based on the NSST daily average data from NASA MODISA and SLP monthly average data from NCEP.
{"title":"Features of northwest passage variation of sea ice concentration from 2002 to 2010 and analysis of possible reasons","authors":"Sijia Zou, L. Yi","doi":"10.1109/ICSAI.2012.6223538","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223538","url":null,"abstract":"In recent years, rapid warming of Arctic has made the Northwest Passage navigation possible. In this paper, we roughly studied features of variation of sea ice's concentration during the summer season, June, August and September, using AMSR-E sea ice concentration product with the resolution of 6.25 kilometers from the year 2002 to 2010. By studying the variation, we got deeper understanding of the main features of sea ice seasonal and inter-annual variation and distribution. What's more, we looked into the relevance between sea surface temperature(SST), sea level pressure(SLP) and the reducing amount of annual sea ice concentration (May minus September) based on the NSST daily average data from NASA MODISA and SLP monthly average data from NCEP.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116808039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-19DOI: 10.1109/ICSAI.2012.6223393
Man Jie
A new support vector machine classifier for recognition of vehicle type which has been captured from traffic scene images. A new support vector machine classifier is presented with probabilistic constrains which presence probability of samples in each class is determined based on a distribution function. Noise is caused to found incorrect support vectors thereupon margin can not be maximized. In the proposed method, constraints boundaries and constraints occurrence have probability density functions which it helps for achieving maximum margin.
{"title":"A method of type recognition using probabilistic constraint support vector machine","authors":"Man Jie","doi":"10.1109/ICSAI.2012.6223393","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223393","url":null,"abstract":"A new support vector machine classifier for recognition of vehicle type which has been captured from traffic scene images. A new support vector machine classifier is presented with probabilistic constrains which presence probability of samples in each class is determined based on a distribution function. Noise is caused to found incorrect support vectors thereupon margin can not be maximized. In the proposed method, constraints boundaries and constraints occurrence have probability density functions which it helps for achieving maximum margin.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115495139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-19DOI: 10.1109/ICSAI.2012.6223491
O. Arnold, K. Jantke
Plan generation is essentially a process of reasoning about the future. In complex application conditions, humans need computerized support by planning assistant systems that manage the complexity of data and the dynamics of targeted processes. In practice, information on real processes and human behavior is typically incomplete, maybe vague, and sometimes incorrect. Consequently, realistic planning is more inductive than deductive and the plans generated by an assistant system are hypothetical. In monotonic approaches to plan generation, intermediate plans are increasingly better fitting the application needs over time. Monotonicity is some logical property of the planning process. It depends on a variety of conditions which have to be balanced. Solutions for monotonic plan generation are elaborated in detail.
{"title":"Monotonic plan generation assistance: Challenges, open problems & solutions","authors":"O. Arnold, K. Jantke","doi":"10.1109/ICSAI.2012.6223491","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223491","url":null,"abstract":"Plan generation is essentially a process of reasoning about the future. In complex application conditions, humans need computerized support by planning assistant systems that manage the complexity of data and the dynamics of targeted processes. In practice, information on real processes and human behavior is typically incomplete, maybe vague, and sometimes incorrect. Consequently, realistic planning is more inductive than deductive and the plans generated by an assistant system are hypothetical. In monotonic approaches to plan generation, intermediate plans are increasingly better fitting the application needs over time. Monotonicity is some logical property of the planning process. It depends on a variety of conditions which have to be balanced. Solutions for monotonic plan generation are elaborated in detail.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123117397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-19DOI: 10.1109/ICSAI.2012.6223228
Jie Liu, Qiang Wei, Qingxian Wang, Tao Guo
Software vulnerabilities become methods by which an attacker can take control of the victim's system, and those critical bugs cluster in dangerous spot codes. However, fuzz testing provides low code coverage and serious security bugs may be missed potentially, while symbolic execution based testing encounters path explosion and bug trigger problem. To deal with the security issue above, we highlight two kinds of dangerous spot codes which mostly likely to trigger buffer overflows at runtime: dangerous functions and instructions. We define the conditions on which dangerous spot code can trigger a bug: input-dependent operand, feasible execution path, and trigger conditions. Then we give algorithm for trigger point directed search in order to find the shortest feasible path in CFG, and formalize the trigger conditions for integer overflow, string buffer overflow, array out of bound and division by zero bugs. At last we evaluate the implementation in four benchmark programs in Ubuntu Linux, showing that our method improves the coverage rate of trigger point and trigger rate of overflows efficiently.
{"title":"Trigger condition based test generation for finding security bugs","authors":"Jie Liu, Qiang Wei, Qingxian Wang, Tao Guo","doi":"10.1109/ICSAI.2012.6223228","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223228","url":null,"abstract":"Software vulnerabilities become methods by which an attacker can take control of the victim's system, and those critical bugs cluster in dangerous spot codes. However, fuzz testing provides low code coverage and serious security bugs may be missed potentially, while symbolic execution based testing encounters path explosion and bug trigger problem. To deal with the security issue above, we highlight two kinds of dangerous spot codes which mostly likely to trigger buffer overflows at runtime: dangerous functions and instructions. We define the conditions on which dangerous spot code can trigger a bug: input-dependent operand, feasible execution path, and trigger conditions. Then we give algorithm for trigger point directed search in order to find the shortest feasible path in CFG, and formalize the trigger conditions for integer overflow, string buffer overflow, array out of bound and division by zero bugs. At last we evaluate the implementation in four benchmark programs in Ubuntu Linux, showing that our method improves the coverage rate of trigger point and trigger rate of overflows efficiently.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121753333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}