首页 > 最新文献

2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)最新文献

英文 中文
The grid-based identity signcryption algorithm and application in Ad Hoc network 基于网格的身份签名加密算法及其在Ad Hoc网络中的应用
Shaohua Chen, Xiaoguang Fan, Yong-jian Yang, Jinke Huang, Xianming Sun
Identity-based signcryption which guarantees the confidentiality and authentication of message is suitable for the key management of Ad Hoc network due to its low computation cost. Aiming at the deficiencies of the existing identity-based signcryption algorithms, this paper proposes an efficient grid-based identity signcryption algorithm which adopts a low overhand, high expandability and high connectivity grid as the logical structure. By using this signcryption algorithm in the key management scheme of Ad Hoc network, the communication and computation cost of key management is reduced and the safety and efficiency of the key management scheme is enhanced. The analyses show that the Ad Hoc network has a good ability of resistance to the attack when the new signcryption algorithm is used in key management.
基于身份的签名加密由于计算成本低,保证了消息的保密性和认证性,适合于Ad Hoc网络的密钥管理。针对现有基于身份的签名加密算法的不足,本文提出了一种高效的基于网格的身份签名加密算法,该算法采用低重叠、高可扩展性和高连通性的网格作为逻辑结构。在Ad Hoc网络的密钥管理方案中使用该签名加密算法,降低了密钥管理的通信和计算成本,提高了密钥管理方案的安全性和效率。分析表明,采用新的签名加密算法进行密钥管理时,Ad Hoc网络具有良好的抗攻击能力。
{"title":"The grid-based identity signcryption algorithm and application in Ad Hoc network","authors":"Shaohua Chen, Xiaoguang Fan, Yong-jian Yang, Jinke Huang, Xianming Sun","doi":"10.1109/ICSESS.2016.7883098","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883098","url":null,"abstract":"Identity-based signcryption which guarantees the confidentiality and authentication of message is suitable for the key management of Ad Hoc network due to its low computation cost. Aiming at the deficiencies of the existing identity-based signcryption algorithms, this paper proposes an efficient grid-based identity signcryption algorithm which adopts a low overhand, high expandability and high connectivity grid as the logical structure. By using this signcryption algorithm in the key management scheme of Ad Hoc network, the communication and computation cost of key management is reduced and the safety and efficiency of the key management scheme is enhanced. The analyses show that the Ad Hoc network has a good ability of resistance to the attack when the new signcryption algorithm is used in key management.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116881661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transmission of clinical information based on HL7 CDA standard 基于HL7 CDA标准的临床信息传输
Yiming Yang, Liang Xiao, Jingbai Tian
At present, the phenomenon of electronic medical institutions is becoming more and more popular. In order to provide or get better medical services, the demand for exchange and sharing of clinical information is also increasing. However, due to the heterogeneity of the medical system, the problem of data format is not uniform, which has seriously hindered the delivery of clinical information, so that the patient's clinical information can not be fully utilized. In this paper, we apply the information model of HL7 CDA standard to package clinical information documents, use XML language to achieve a simple CDA document and its format output. At the same time, through the JDBC and XML parser to achieve the automatic generation and analysis of CDA documents. By encapsulating the CDA document in the HL7 message, the transmission of clinical information is realized.
目前,电子医疗机构的现象越来越普遍。为了提供或获得更好的医疗服务,对临床信息交换和共享的需求也在增加。然而,由于医疗系统的异质性,数据格式不统一的问题,严重阻碍了临床信息的传递,使患者的临床信息不能得到充分利用。本文应用HL7 CDA标准的信息模型对临床信息文档进行打包,使用XML语言实现简单的CDA文档及其格式输出。同时,通过JDBC和XML解析器实现CDA文档的自动生成和分析。通过将CDA文档封装在HL7消息中,实现临床信息的传输。
{"title":"Transmission of clinical information based on HL7 CDA standard","authors":"Yiming Yang, Liang Xiao, Jingbai Tian","doi":"10.1109/ICSESS.2016.7883222","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883222","url":null,"abstract":"At present, the phenomenon of electronic medical institutions is becoming more and more popular. In order to provide or get better medical services, the demand for exchange and sharing of clinical information is also increasing. However, due to the heterogeneity of the medical system, the problem of data format is not uniform, which has seriously hindered the delivery of clinical information, so that the patient's clinical information can not be fully utilized. In this paper, we apply the information model of HL7 CDA standard to package clinical information documents, use XML language to achieve a simple CDA document and its format output. At the same time, through the JDBC and XML parser to achieve the automatic generation and analysis of CDA documents. By encapsulating the CDA document in the HL7 message, the transmission of clinical information is realized.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117009421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Image fusion using the Wavelet TRW and Haar transforms: Enhancement of spatial resolution for the Ikonos images from Ortophotos 基于小波变换和Haar变换的图像融合:增强Ortophotos中Ikonos图像的空间分辨率
Rubén Javier Medina Daza, E. Upegui
This article has as a purpose to develop and assess two methodologies that allow to enhance spatial resolution without significant loss of the spectral resolution, with an Ikonos image and a Ortophoto. Using the RGB-IHS transform and the wavelet implementation of the Wavelet TRWH transform (Fast Haar transform) and Haar. Applying the fusion to the intensity components of the multispectral image (Im) and the ones from the ortophoto (Io) through the Wavelet haar transform predefined in Matlab together with the ARSIS technique, a new intensity l is generated respectively. To perform the inverse transforms IHS-RGB and thus obtain an multispectral image. Finally the obtained results are shown with the mathematical-statistical indexes CC, ERGAS, RSE and Qu.
本文的目的是开发和评估两种方法,这些方法可以在不显著损失光谱分辨率的情况下提高空间分辨率,使用Ikonos图像和ortopphoto。利用RGB-IHS变换和小波实现小波TRWH变换(Fast Haar变换)和Haar变换。利用Matlab中预定义的小波变换,结合ARSIS技术,对多光谱图像(Im)和直像图像(Io)的强度分量进行融合,分别生成新的强度1。执行逆变换的hs - rgb,从而获得一个多光谱图像。最后用数理统计指标CC、ERGAS、RSE和Qu对所得结果进行了说明。
{"title":"Image fusion using the Wavelet TRW and Haar transforms: Enhancement of spatial resolution for the Ikonos images from Ortophotos","authors":"Rubén Javier Medina Daza, E. Upegui","doi":"10.1109/ICSESS.2016.7883048","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883048","url":null,"abstract":"This article has as a purpose to develop and assess two methodologies that allow to enhance spatial resolution without significant loss of the spectral resolution, with an Ikonos image and a Ortophoto. Using the RGB-IHS transform and the wavelet implementation of the Wavelet TRWH transform (Fast Haar transform) and Haar. Applying the fusion to the intensity components of the multispectral image (Im) and the ones from the ortophoto (Io) through the Wavelet haar transform predefined in Matlab together with the ARSIS technique, a new intensity l is generated respectively. To perform the inverse transforms IHS-RGB and thus obtain an multispectral image. Finally the obtained results are shown with the mathematical-statistical indexes CC, ERGAS, RSE and Qu.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"41 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120849694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A test platform for baseband signal processing module of ADS-B ADS-B基带信号处理模块测试平台
Weilu Chen, Qibin Lu, Zhengxiang Li
In this paper, a test platform for baseband signal processing module of ADS-B is introduced, which is simple and efficient. The baseband signal processing module of ADS-B used in receiving system of ADS-B analyzes 1090ES ADS-B message of baseband. In order to reduce the risk of technology and business, it is necessary to ensure that the signal processing module of ADS-B works normally before delivery. The test platform based on hardware-software co-design architecture may make sure the signal processing module of ADS-B works normally and locate some hardware fault.
本文介绍了一种简单、高效的ADS-B基带信号处理模块测试平台。用于ADS-B接收系统的ADS-B基带信号处理模块对1090ES ADS-B基带报文进行分析。为了降低技术和业务风险,ADS-B的信号处理模块在出厂前必须保证正常工作。基于软硬件协同设计架构的测试平台可以保证ADS-B信号处理模块的正常工作,并对部分硬件故障进行定位。
{"title":"A test platform for baseband signal processing module of ADS-B","authors":"Weilu Chen, Qibin Lu, Zhengxiang Li","doi":"10.1109/ICSESS.2016.7883236","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883236","url":null,"abstract":"In this paper, a test platform for baseband signal processing module of ADS-B is introduced, which is simple and efficient. The baseband signal processing module of ADS-B used in receiving system of ADS-B analyzes 1090ES ADS-B message of baseband. In order to reduce the risk of technology and business, it is necessary to ensure that the signal processing module of ADS-B works normally before delivery. The test platform based on hardware-software co-design architecture may make sure the signal processing module of ADS-B works normally and locate some hardware fault.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124832525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-dimensional integrated design framework for CNC system 数控系统的多维集成设计框架
Di Li, Zhenkun Zhai
With regard to the challenges for CNC system design stemming from the diversity of design requirements, a multi-dimensional integrated design framework is proposed in this paper, which can provide a convenient and efficient way for CNC system design. As an important part of this framework, a modelling language is developed based on IEC 61499 and hierarchical policy. By encapsulating CNC functions into function blocks and constructing the control system in a bottom-up way, a variety of architectures of CNC system can be flexibly built. To investigate the reliability of CNC system in the early stage of the design, formal verification is combined into the design framework With formal model and specification, the dynamic and static properties of a CNC system can be automatically verified by use of model checking. Deliberating the multi-objective characteristic of system performance, the design framework employs the multi-objective optimization technique to detect the most appropriate design scheme. To achieve the seamless integration between the above steps, a design platform in the form of a tool chain is developed, which can effectively improve the efficiency of system design. At last, an experiment on the design of a motion controller is conducted, by which the validity of the proposed framework can be proved.
针对设计需求的多样性给数控系统设计带来的挑战,本文提出了一种多维度集成设计框架,为数控系统设计提供了一种便捷、高效的方法。作为该框架的重要组成部分,基于IEC 61499和分层策略开发了一种建模语言。通过将CNC功能封装到功能块中,自下而上地构建控制系统,可以灵活地构建CNC系统的各种体系结构。为了在设计初期对数控系统的可靠性进行研究,将形式化验证结合到设计框架中,通过形式化模型和规范,可以利用模型验证自动验证数控系统的动态和静态特性。考虑到系统性能的多目标特性,设计框架采用多目标优化技术来检测最合适的设计方案。为了实现上述步骤之间的无缝集成,开发了工具链形式的设计平台,可以有效地提高系统设计的效率。最后,进行了运动控制器的设计实验,验证了所提框架的有效性。
{"title":"A multi-dimensional integrated design framework for CNC system","authors":"Di Li, Zhenkun Zhai","doi":"10.1109/ICSESS.2016.7883234","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883234","url":null,"abstract":"With regard to the challenges for CNC system design stemming from the diversity of design requirements, a multi-dimensional integrated design framework is proposed in this paper, which can provide a convenient and efficient way for CNC system design. As an important part of this framework, a modelling language is developed based on IEC 61499 and hierarchical policy. By encapsulating CNC functions into function blocks and constructing the control system in a bottom-up way, a variety of architectures of CNC system can be flexibly built. To investigate the reliability of CNC system in the early stage of the design, formal verification is combined into the design framework With formal model and specification, the dynamic and static properties of a CNC system can be automatically verified by use of model checking. Deliberating the multi-objective characteristic of system performance, the design framework employs the multi-objective optimization technique to detect the most appropriate design scheme. To achieve the seamless integration between the above steps, a design platform in the form of a tool chain is developed, which can effectively improve the efficiency of system design. At last, an experiment on the design of a motion controller is conducted, by which the validity of the proposed framework can be proved.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128171863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Static detection of execution after redirect vulnerabilities in PHP applications 静态检测PHP应用程序重定向后执行的漏洞
Chuansen Chai, Xuexiong Yan, Qingxian Wang, Shukai Liu
In recent years, modern web applications are becoming more and more complex and it makes difficult for developers to audit the code. The number of attacks against these applications has increased rapidly. Automated detection techniques for web applications are badly in need. Execution after execution (EAR) vulnerability is a kind of logic flaws for web application. It allows the server-side execution continuing after the intended halting point. This may result in serious consequences such as information leakage. In this paper, we propose a path-sensitive inter-procedural analysis to detect EAR vulnerabilities in PHP web applications. The analysis improves the traditional detection method by verifying the path conditions and considers more details which may influence the false-positive rate. We have shown how our approach can handle situations where other existing tools may fail by some real-world examples.
近年来,现代web应用程序变得越来越复杂,这使得开发人员很难审核代码。针对这些应用程序的攻击数量迅速增加。web应用程序非常需要自动检测技术。执行后执行(EAR)漏洞是web应用程序的一种逻辑缺陷。它允许服务器端执行在预期的停止点之后继续执行。这可能会导致信息泄露等严重后果。在本文中,我们提出了一种路径敏感的过程间分析方法来检测PHP web应用程序中的EAR漏洞。该分析改进了传统的检测方法,通过验证路径条件,并考虑了更多可能影响假阳性率的细节。我们通过一些现实世界的例子展示了我们的方法如何处理其他现有工具可能失败的情况。
{"title":"Static detection of execution after redirect vulnerabilities in PHP applications","authors":"Chuansen Chai, Xuexiong Yan, Qingxian Wang, Shukai Liu","doi":"10.1109/ICSESS.2016.7883115","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883115","url":null,"abstract":"In recent years, modern web applications are becoming more and more complex and it makes difficult for developers to audit the code. The number of attacks against these applications has increased rapidly. Automated detection techniques for web applications are badly in need. Execution after execution (EAR) vulnerability is a kind of logic flaws for web application. It allows the server-side execution continuing after the intended halting point. This may result in serious consequences such as information leakage. In this paper, we propose a path-sensitive inter-procedural analysis to detect EAR vulnerabilities in PHP web applications. The analysis improves the traditional detection method by verifying the path conditions and considers more details which may influence the false-positive rate. We have shown how our approach can handle situations where other existing tools may fail by some real-world examples.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127344472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual machine anomaly detection based on partitioning detection domain 基于分区检测域的虚拟机异常检测
Deyuan Qin, Shuyu Chen, Hancui Zhang, Tianshu Wu
Virtual machine is an important part of cloud platform. Ensuring virtual machine running correctly is of great significance to ensure the availability of cloud service. Due to cloud platform has characteristics of the large number of virtual machines and dynamic change of running environment, it's hard to accept the cost of collecting training data for anomaly detector and training the anomaly detector. This paper focuses on insufficient training data set for anomaly detector training of virtual machine of cloud platform and high cost of detector training, and does research on how to improve anomaly detection accuracy and efficiency under the condition that there is not enough training data for anomaly detector. Concretely speaking, main research contents and highlights of this paper are described as follows: It puts forward a virtual machine detection domain partitioning strategy based on K-medoids according to the virtual machine running environment, thereby, improving the accuracy and efficiency of anomaly detection. Meanwhile, this paper optimizes the steps of clustering iteration updating, to enhance the speed of detecting area partitioning. The experiment result shows that, the improved clustering algorithm has lower time complexity, and the virtual machine anomaly detection strategy based on detection domain partitioning possesses higher accuracy and efficiency.
虚拟机是云平台的重要组成部分。确保虚拟机的正常运行对于保证云服务的可用性具有重要意义。由于云平台具有大量虚拟机和运行环境动态变化的特点,采集异常检测器的训练数据并对异常检测器进行训练的成本是难以接受的。本文针对云平台虚拟机异常检测器训练训练数据集不足、检测器训练成本高的问题,研究了在异常检测器训练数据不足的情况下,如何提高异常检测器的检测精度和效率。具体而言,本文的主要研究内容和重点如下:根据虚拟机运行环境,提出了一种基于K-medoids的虚拟机检测域划分策略,从而提高了异常检测的准确性和效率。同时,优化了聚类迭代更新的步骤,提高了检测区域划分的速度。实验结果表明,改进的聚类算法具有较低的时间复杂度,基于检测域划分的虚拟机异常检测策略具有更高的准确率和效率。
{"title":"Virtual machine anomaly detection based on partitioning detection domain","authors":"Deyuan Qin, Shuyu Chen, Hancui Zhang, Tianshu Wu","doi":"10.1109/ICSESS.2016.7883102","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883102","url":null,"abstract":"Virtual machine is an important part of cloud platform. Ensuring virtual machine running correctly is of great significance to ensure the availability of cloud service. Due to cloud platform has characteristics of the large number of virtual machines and dynamic change of running environment, it's hard to accept the cost of collecting training data for anomaly detector and training the anomaly detector. This paper focuses on insufficient training data set for anomaly detector training of virtual machine of cloud platform and high cost of detector training, and does research on how to improve anomaly detection accuracy and efficiency under the condition that there is not enough training data for anomaly detector. Concretely speaking, main research contents and highlights of this paper are described as follows: It puts forward a virtual machine detection domain partitioning strategy based on K-medoids according to the virtual machine running environment, thereby, improving the accuracy and efficiency of anomaly detection. Meanwhile, this paper optimizes the steps of clustering iteration updating, to enhance the speed of detecting area partitioning. The experiment result shows that, the improved clustering algorithm has lower time complexity, and the virtual machine anomaly detection strategy based on detection domain partitioning possesses higher accuracy and efficiency.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128780427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Measurement and modelling of the instant messenger service behavior 即时通讯服务行为的测量与建模
Ke Li, Xiao-liang Xu, Li Dong, Xiaoqin Song
Among all the applications and services currently used by the smart phone users, Instant messenger (IM) is the most actively used one, and deserves deep research of its service behavior properties. In this paper, we built an accurate traffic behavior model of the IM services, based on the huge amount of data that collected from the real smart phone users in the mobile network. Finally, an analysis and comparison of the service behavior of several typical IM applications has been provided.
在智能手机用户目前使用的所有应用和服务中,即时通讯(IM)是使用最为活跃的应用和服务,其服务行为特性值得深入研究。本文基于对移动网络中真实智能手机用户的大量数据采集,构建了准确的IM服务流量行为模型。最后,对几种典型IM应用的服务行为进行了分析和比较。
{"title":"Measurement and modelling of the instant messenger service behavior","authors":"Ke Li, Xiao-liang Xu, Li Dong, Xiaoqin Song","doi":"10.1109/ICSESS.2016.7883184","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883184","url":null,"abstract":"Among all the applications and services currently used by the smart phone users, Instant messenger (IM) is the most actively used one, and deserves deep research of its service behavior properties. In this paper, we built an accurate traffic behavior model of the IM services, based on the huge amount of data that collected from the real smart phone users in the mobile network. Finally, an analysis and comparison of the service behavior of several typical IM applications has been provided.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"54 90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122188543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of improved ant colony algorithm in distribution network patrol route planning 改进蚁群算法在配电网巡逻路线规划中的应用
Xiaoliu Shen, JinSong Sang, Yangbo Sun, Ruixue Liu
In order to improve the efficiency of electrical patrol, we need to develop a scientific and reasonable patrol route planning. By analyzing the electrical route patrol work content and features, we establish a patrol route planning model based VRP, and use the improved ant colony algorithm to solve this problem. For traditional ant colony algorithm, improve the algorithms from the transition probability, using of joint control with two parameters, which improves the computational efficiency of ant colony algorithm, makes up the disadvantage that traditional ant colony algorithm's training efficiency is low and easy to produce local minimum because of the parameter settings inaccurate. The experiment result shows that patrol route optimization by this method improves the scientificity and ratio nality of patrol programs as well as improves efficiency of the electrical patrol department.
为了提高电气巡逻的效率,需要制定科学合理的巡逻路线规划。在分析电力线路巡逻工作内容和特点的基础上,建立了基于VRP的巡逻线路规划模型,并采用改进的蚁群算法对其进行求解。对于传统的蚁群算法,从转移概率的角度对算法进行改进,采用双参数联合控制,提高了蚁群算法的计算效率,弥补了传统蚁群算法由于参数设置不准确而训练效率低且容易产生局部最小值的缺点。实验结果表明,利用该方法优化巡逻路线,提高了巡逻方案的科学性和正确率,提高了电力巡逻部门的工作效率。
{"title":"Application of improved ant colony algorithm in distribution network patrol route planning","authors":"Xiaoliu Shen, JinSong Sang, Yangbo Sun, Ruixue Liu","doi":"10.1109/ICSESS.2016.7883132","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883132","url":null,"abstract":"In order to improve the efficiency of electrical patrol, we need to develop a scientific and reasonable patrol route planning. By analyzing the electrical route patrol work content and features, we establish a patrol route planning model based VRP, and use the improved ant colony algorithm to solve this problem. For traditional ant colony algorithm, improve the algorithms from the transition probability, using of joint control with two parameters, which improves the computational efficiency of ant colony algorithm, makes up the disadvantage that traditional ant colony algorithm's training efficiency is low and easy to produce local minimum because of the parameter settings inaccurate. The experiment result shows that patrol route optimization by this method improves the scientificity and ratio nality of patrol programs as well as improves efficiency of the electrical patrol department.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122319226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Vehicle make and model recognition based on convolutional neural networks 基于卷积神经网络的车型识别
Yongguo Ren, Shanzhen Lan
Vehicle analysis is an important task in many intelligent applications, which involves vehicle-type classification(VTC), license-plate recognition(LPR) and vehicle make and model recognition(MMR). Among these tasks, MMR plays an important complementary role with respect to LPR. In this paper, we propose a novel framework to detect moving vehicle and MMR using convolutional neural networks. The frontal view of vehicle images first extracted and fed into convolutional neural networks for training and testing. The experimental results show that our proposed framework achieves favorable recognition accuracy 98.7% in terms of our vehicle MMR.
车辆分析是智能应用中的一项重要任务,涉及到车型分类、车牌识别和车型识别。在这些任务中,MMR对LPR起着重要的补充作用。本文提出了一种利用卷积神经网络检测移动车辆和MMR的新框架。首先提取车辆正面视图图像,并将其输入卷积神经网络进行训练和测试。实验结果表明,该框架在车辆MMR上的识别准确率达到了98.7%。
{"title":"Vehicle make and model recognition based on convolutional neural networks","authors":"Yongguo Ren, Shanzhen Lan","doi":"10.1109/ICSESS.2016.7883162","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883162","url":null,"abstract":"Vehicle analysis is an important task in many intelligent applications, which involves vehicle-type classification(VTC), license-plate recognition(LPR) and vehicle make and model recognition(MMR). Among these tasks, MMR plays an important complementary role with respect to LPR. In this paper, we propose a novel framework to detect moving vehicle and MMR using convolutional neural networks. The frontal view of vehicle images first extracted and fed into convolutional neural networks for training and testing. The experimental results show that our proposed framework achieves favorable recognition accuracy 98.7% in terms of our vehicle MMR.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122847230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1