We propose a novel scheme, called Cooperative Semantic Caching Scheme (CSCS) for multi-level super-peer networks that support hierarchical P2P architecture. Peers share information according the semantic proximity between peers and between shared files to self-organise into clustered groups. In this paper we tackle the problem of exploiting the semantic locality of peer requests to improve the performance of a P2P network by the use of cooperative semantic caches. Such caches group together peers with similar interests as well as files with similar request patterns. Simulation experiments show that the CSCS mechanism achieves significant improvements in terms of access latency and global cache hit ratio.
{"title":"A Cooperative Semantic Caching Scheme for Super-Peer Networks","authors":"Yunsong Tan, Y. Wu","doi":"10.1109/CINC.2009.233","DOIUrl":"https://doi.org/10.1109/CINC.2009.233","url":null,"abstract":"We propose a novel scheme, called Cooperative Semantic Caching Scheme (CSCS) for multi-level super-peer networks that support hierarchical P2P architecture. Peers share information according the semantic proximity between peers and between shared files to self-organise into clustered groups. In this paper we tackle the problem of exploiting the semantic locality of peer requests to improve the performance of a P2P network by the use of cooperative semantic caches. Such caches group together peers with similar interests as well as files with similar request patterns. Simulation experiments show that the CSCS mechanism achieves significant improvements in terms of access latency and global cache hit ratio.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131807054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Overfitting is an important topic in Neural Network. Internal Symmetry Networks are a new modern Cellular Neural Networks inspired by the phenomenon of internal symmetry in quantum physics. Recurrent Internal Symmetry Networks are just studied very recently. In this paper, overfitting in recurrent cycles of Internal Symmetry Networks is analyzed. Back propagation is trained for an image processing task.
{"title":"Problem and Strategy: Overfitting in Recurrent Cycles of Internal Symmetry Networks by Back Propagation","authors":"Guanzhong Li","doi":"10.1109/CINC.2009.258","DOIUrl":"https://doi.org/10.1109/CINC.2009.258","url":null,"abstract":"Overfitting is an important topic in Neural Network. Internal Symmetry Networks are a new modern Cellular Neural Networks inspired by the phenomenon of internal symmetry in quantum physics. Recurrent Internal Symmetry Networks are just studied very recently. In this paper, overfitting in recurrent cycles of Internal Symmetry Networks is analyzed. Back propagation is trained for an image processing task.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133380777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes the definition of the tendency curve with saturation line and gives the range of the parameters and the necessary and sufficient condition when the cubic polynomials satisfy the definitions, which is based on the method of tendency surface constructed by cubic polynomial (TSCP) proposed in our former paper. The simulation experiment results, compared with the general fuzzy control, are given, which verify the effectiveness of the given method.
{"title":"The Design of Controller Based on Tendency Surface","authors":"Yucheng Li, Hongxing Li, Mushu Wang","doi":"10.1109/CINC.2009.196","DOIUrl":"https://doi.org/10.1109/CINC.2009.196","url":null,"abstract":"This paper proposes the definition of the tendency curve with saturation line and gives the range of the parameters and the necessary and sufficient condition when the cubic polynomials satisfy the definitions, which is based on the method of tendency surface constructed by cubic polynomial (TSCP) proposed in our former paper. The simulation experiment results, compared with the general fuzzy control, are given, which verify the effectiveness of the given method.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115695722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper first gives a new validity function for fuzzy clustering, then presents a method of the optimal selecting of the cluster number in the standard fuzzy c-means clustering algorithm, and finally outlines the fuzzy c-means clustering algorithm with parameters self-adapted. Experimental results carried on synthetic data set and data set based on actual background illustrate the performance of the new validity function and the corresponding fuzzy clustering algorithm.
{"title":"A New Validity Function for Fuzzy Clustering","authors":"Yang Li, Fusheng Yu","doi":"10.1109/CINC.2009.100","DOIUrl":"https://doi.org/10.1109/CINC.2009.100","url":null,"abstract":"This paper first gives a new validity function for fuzzy clustering, then presents a method of the optimal selecting of the cluster number in the standard fuzzy c-means clustering algorithm, and finally outlines the fuzzy c-means clustering algorithm with parameters self-adapted. Experimental results carried on synthetic data set and data set based on actual background illustrate the performance of the new validity function and the corresponding fuzzy clustering algorithm.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116716161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With Mobile Agent is becoming common in a variety of applications on Electronic Commerce, How to protect the transaction security is the key technology of based Agent Electronic Commerce System. In this paper, a Mobile Agent security transaction Authentication Scheme is proposed, the Scheme effectively protects the Mobile Agent transaction security by using bilinear pairings, hash function and Exclusive Or operation. Comparing with previous security schemes for Mobile Agent, this scheme provides more security and improves effectively in computing and memory efficiency.
{"title":"Based Mobile Agent Transaction Authentication Scheme","authors":"Zhiming Zhang, Min Yu, Minghe Huang","doi":"10.1109/CINC.2009.30","DOIUrl":"https://doi.org/10.1109/CINC.2009.30","url":null,"abstract":"With Mobile Agent is becoming common in a variety of applications on Electronic Commerce, How to protect the transaction security is the key technology of based Agent Electronic Commerce System. In this paper, a Mobile Agent security transaction Authentication Scheme is proposed, the Scheme effectively protects the Mobile Agent transaction security by using bilinear pairings, hash function and Exclusive Or operation. Comparing with previous security schemes for Mobile Agent, this scheme provides more security and improves effectively in computing and memory efficiency.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"34 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116232335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emotion recognition from Electrocardiography (ECG) signal has become an important research topic in the field of affective computing. In the current work, ECG signals from multiple subjects were collected when film clips shown to them, and then feature sets were extracted from precise location of P-QRS-T wave by continuous wavelet transform (CWT). Hybrid Particle Swarm Optimization (HPSO) was utilized for feature selection, whose discrimination criteria was the correct rate of fisher classifier and the number of features selected. For recognizing two emotions of joy and sadness, effective features and better recognition rate were obviously obtained. Experimental results indicate that the features that acquired from experimental simulation can represent the changes of emotions, HPSO and fisher classifier are effective ways for emotion recognition.
{"title":"A Method of Emotion Recognition Based on ECG Signal","authors":"Ya Xu, Guangyuan Liu","doi":"10.1109/CINC.2009.102","DOIUrl":"https://doi.org/10.1109/CINC.2009.102","url":null,"abstract":"Emotion recognition from Electrocardiography (ECG) signal has become an important research topic in the field of affective computing. In the current work, ECG signals from multiple subjects were collected when film clips shown to them, and then feature sets were extracted from precise location of P-QRS-T wave by continuous wavelet transform (CWT). Hybrid Particle Swarm Optimization (HPSO) was utilized for feature selection, whose discrimination criteria was the correct rate of fisher classifier and the number of features selected. For recognizing two emotions of joy and sadness, effective features and better recognition rate were obviously obtained. Experimental results indicate that the features that acquired from experimental simulation can represent the changes of emotions, HPSO and fisher classifier are effective ways for emotion recognition.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123080641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The traditional algorithm for smoothing fingerprint orientation fields was based on the low-pass filter. To improve this algorithm, a variable window adaptive smoothing algorithm for the fingerprint orientation fields is proposed based on the fingerprint orientation consistency. Our algorithm uses the correctness of the fingerprint orientation field to compute the weighted average of the orientation field. Experiments show that our algorithm can effectively deal with the orientation field images which have noises and really describe the topological structure of the fingerprint ridge.
{"title":"An Adaptive Algorithm for Smoothing Fingerprint Orientation Fields","authors":"Xiang Can, You Lin","doi":"10.1109/CINC.2009.197","DOIUrl":"https://doi.org/10.1109/CINC.2009.197","url":null,"abstract":"The traditional algorithm for smoothing fingerprint orientation fields was based on the low-pass filter. To improve this algorithm, a variable window adaptive smoothing algorithm for the fingerprint orientation fields is proposed based on the fingerprint orientation consistency. Our algorithm uses the correctness of the fingerprint orientation field to compute the weighted average of the orientation field. Experiments show that our algorithm can effectively deal with the orientation field images which have noises and really describe the topological structure of the fingerprint ridge.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121737388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In designing new wells, hydrogeologic operators often make a rough estimation through drawing lines method, according to stratum, aquifer and electric measuring curve of reference wells. This method can not meet the requirement of imprecise for its insufficiency of utilizing data of reference wells. How to analyze the distribution of stratums and aquifers of new well has become a serious problem to be solved urgently in groundwater management. This paper tries to make full use of GIS capacity of data management and strong analysis and the Piecewise Bilinear Interpolation theory to get the aquifer distribution in designing new well and show Cross-section of new well. First, designing database, including graphics database and hydrogeological database. Secondly, according to different wells, choosing reference wells and forming the section graphics of reference wells. From these graphics, the stratum and aquifer of reference wells is displayed. Thirdly, Piecewise Bilinear Interpolation theory is applied to calculate the stratum and aquifer position of new well. The new method shows its advantages in higher precision and efficiency.
{"title":"New Well's Aquifer Designing Based on GIS and Bilinear Interpolation Theory","authors":"Songyi Mei, W. Lijie","doi":"10.1109/CINC.2009.92","DOIUrl":"https://doi.org/10.1109/CINC.2009.92","url":null,"abstract":"In designing new wells, hydrogeologic operators often make a rough estimation through drawing lines method, according to stratum, aquifer and electric measuring curve of reference wells. This method can not meet the requirement of imprecise for its insufficiency of utilizing data of reference wells. How to analyze the distribution of stratums and aquifers of new well has become a serious problem to be solved urgently in groundwater management. This paper tries to make full use of GIS capacity of data management and strong analysis and the Piecewise Bilinear Interpolation theory to get the aquifer distribution in designing new well and show Cross-section of new well. First, designing database, including graphics database and hydrogeological database. Secondly, according to different wells, choosing reference wells and forming the section graphics of reference wells. From these graphics, the stratum and aquifer of reference wells is displayed. Thirdly, Piecewise Bilinear Interpolation theory is applied to calculate the stratum and aquifer position of new well. The new method shows its advantages in higher precision and efficiency.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122078479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of the Internet, P2P technology has changed the traditional concept of Internet; this technology has become the dominant flow and greatly satisfied the needs of the users. At the same time, P2P worm has become one of the serious threats. This article include characteristics of P2P worms, classification, propagation model, detection and defense mechanism, also analyze some advantages and disadvantages of simulation software. At last this article discusses the direction for future research.
{"title":"The Research of Worms in P2P Networks","authors":"Xie Chunyan, Yin Zhiyu","doi":"10.1109/CINC.2009.248","DOIUrl":"https://doi.org/10.1109/CINC.2009.248","url":null,"abstract":"With the rapid development of the Internet, P2P technology has changed the traditional concept of Internet; this technology has become the dominant flow and greatly satisfied the needs of the users. At the same time, P2P worm has become one of the serious threats. This article include characteristics of P2P worms, classification, propagation model, detection and defense mechanism, also analyze some advantages and disadvantages of simulation software. At last this article discusses the direction for future research.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121472275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a kind of all-digital integrated hydraulic actuator unit to drive heavy load object without centralized oil tank. In order to improve the control quality of the actuation system while eliminating or reducing the disturbance, a fuzzy PWM controller is suggested. Simulations on the integrated hydraulic actuator unit are carried out to evaluate the effectiveness of the proposed control method when applied to hydraulic systems with various external disturbances encountered in real working conditions. Simulation results are discussed and some conclusions are given.
{"title":"Fuzzy Logic Control of Integrated Hydraulic Actuator Unit Using High Speed Switch Valves","authors":"L. Jianxin, Tan Ping","doi":"10.1109/CINC.2009.65","DOIUrl":"https://doi.org/10.1109/CINC.2009.65","url":null,"abstract":"This paper presents a kind of all-digital integrated hydraulic actuator unit to drive heavy load object without centralized oil tank. In order to improve the control quality of the actuation system while eliminating or reducing the disturbance, a fuzzy PWM controller is suggested. Simulations on the integrated hydraulic actuator unit are carried out to evaluate the effectiveness of the proposed control method when applied to hydraulic systems with various external disturbances encountered in real working conditions. Simulation results are discussed and some conclusions are given.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122647331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}