Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183954
Li-Jie Peng, Chen Jian-jun, Zhixiong Shi, Li Lin, Shi Zhi-yong
Based on the analysis of resemble degradation character of the observed images, a fast image restoration algorithm using illumination correction is proposed in this paper. First, the fuzzy value of illumination parameters is estimated through fuzzy nonlinear regression method. Then, the whole damaged area can be restored by the whole-illumination correction method. The experimental results show that this algorithm has better ability in restoring both smooth area and edge-contained area. Compared with other image restoration algorithms, this method is better on the restoring time and the restoring effect.
{"title":"Image restoration based on illumination correction","authors":"Li-Jie Peng, Chen Jian-jun, Zhixiong Shi, Li Lin, Shi Zhi-yong","doi":"10.1109/ICCIAUTOM.2011.6183954","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183954","url":null,"abstract":"Based on the analysis of resemble degradation character of the observed images, a fast image restoration algorithm using illumination correction is proposed in this paper. First, the fuzzy value of illumination parameters is estimated through fuzzy nonlinear regression method. Then, the whole damaged area can be restored by the whole-illumination correction method. The experimental results show that this algorithm has better ability in restoring both smooth area and edge-contained area. Compared with other image restoration algorithms, this method is better on the restoring time and the restoring effect.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124314296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183906
Zhiguang Qin, Lei Yang, Ting Zhong, Tian Lan
Many security risks are caused due to the nature of anarchy in P2P networks. It is an effective method to deal with these security problems by introducing the trust mechanism into the P2P networks. In this paper, some typical trust mechanisms were summarized, the latest systems and models are discussed, some problems faced by many researches are proposed and some ideas for future research are given.
{"title":"Research on trust model for distributed P2P networks","authors":"Zhiguang Qin, Lei Yang, Ting Zhong, Tian Lan","doi":"10.1109/ICCIAUTOM.2011.6183906","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183906","url":null,"abstract":"Many security risks are caused due to the nature of anarchy in P2P networks. It is an effective method to deal with these security problems by introducing the trust mechanism into the P2P networks. In this paper, some typical trust mechanisms were summarized, the latest systems and models are discussed, some problems faced by many researches are proposed and some ideas for future research are given.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124334685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183947
Li Li, Li-Jie Peng, Shi Zhiyong, C. Jianjun
Conventional optical affine transform is implemented by dove prisms, mirrors, and zoom lens,with the shortage of experimental adjustment difficulties, low accuracy, poor flexibility and stability. By studying the two-dimensional optical affine transform, a novel method for optical affine transform based on optical fiber bundle and MEMS (Micro- Electromechanical Systems) optical cross-connect is proposed, and an arbitrary optical affine transform is realized by making use of the switch property of MEMS combined with optical fiber bundle. The shortcomings of traditional methods can be overcome effectively by this way. Additionally, the optical affine transform can solve the bottleneck problem of speed in realizing image iterated function systems. Comparison of optical experiment results and simulation results proves the superiority of this method.
{"title":"An novel method for optical affine transform based on MEMS optical cross-connect","authors":"Li Li, Li-Jie Peng, Shi Zhiyong, C. Jianjun","doi":"10.1109/ICCIAUTOM.2011.6183947","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183947","url":null,"abstract":"Conventional optical affine transform is implemented by dove prisms, mirrors, and zoom lens,with the shortage of experimental adjustment difficulties, low accuracy, poor flexibility and stability. By studying the two-dimensional optical affine transform, a novel method for optical affine transform based on optical fiber bundle and MEMS (Micro- Electromechanical Systems) optical cross-connect is proposed, and an arbitrary optical affine transform is realized by making use of the switch property of MEMS combined with optical fiber bundle. The shortcomings of traditional methods can be overcome effectively by this way. Additionally, the optical affine transform can solve the bottleneck problem of speed in realizing image iterated function systems. Comparison of optical experiment results and simulation results proves the superiority of this method.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116470453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6184016
Liu Peng, Liu Hong, Yang Wenlu, Ding Ding
With the purpose of improving the problems in the existing research methods like high cost, poor diversity, low realistic level, insufficient emerging characteristics, a method for path-planning of Herding based on firefly algorithms is proposed in this paper according to the features of automatic aggregation scene in Group Animation. In the process of automatic aggregation of crowd, this method can automatically focus the optimal aggregation of the target point according to the dynamic external environment, without specifying the target aggregation point in advance. Then it can generate the movement path of each particle, and ensure that each generated aggregation path is not completely consistent. In this way, the group animation can fully reflect the emerging characteristics in real-world movement and further improve the realistic animation effects. This paper used VS2003+ACIS+HOOPS as a platform developing a system for path planning of dynamic automatic aggregation. Relevant experiments show that this method is able to achieve the effects of dynamic automatic aggregation and simulate the group behavior effectively, also can generate data support for 3D animation production.
{"title":"A method based on Fa for herding dynamic automatic aggregation path-planning","authors":"Liu Peng, Liu Hong, Yang Wenlu, Ding Ding","doi":"10.1109/ICCIAUTOM.2011.6184016","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6184016","url":null,"abstract":"With the purpose of improving the problems in the existing research methods like high cost, poor diversity, low realistic level, insufficient emerging characteristics, a method for path-planning of Herding based on firefly algorithms is proposed in this paper according to the features of automatic aggregation scene in Group Animation. In the process of automatic aggregation of crowd, this method can automatically focus the optimal aggregation of the target point according to the dynamic external environment, without specifying the target aggregation point in advance. Then it can generate the movement path of each particle, and ensure that each generated aggregation path is not completely consistent. In this way, the group animation can fully reflect the emerging characteristics in real-world movement and further improve the realistic animation effects. This paper used VS2003+ACIS+HOOPS as a platform developing a system for path planning of dynamic automatic aggregation. Relevant experiments show that this method is able to achieve the effects of dynamic automatic aggregation and simulate the group behavior effectively, also can generate data support for 3D animation production.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"67 1-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123469097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183974
Jun-yan Zhang, Fan Min
Pattern matching is critical in some applications such as biological sequence analysis and text filtering. A wildcard gap matches any subsequence with a length in a specified interval, and introduces much adaptability to patterns. However, most existing works require that gaps in a pattern be identical. In this paper, we define a new pattern matching problem where gaps are independently specified. We develop an efficient algorithm to compute the number of all matches based on pattern decomposed. Experimental results show that our algorithm has better performance in the aspects of time complexity and space complexity.
{"title":"Improved algorithm for pattern matching with independent wildcard gaps","authors":"Jun-yan Zhang, Fan Min","doi":"10.1109/ICCIAUTOM.2011.6183974","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183974","url":null,"abstract":"Pattern matching is critical in some applications such as biological sequence analysis and text filtering. A wildcard gap matches any subsequence with a length in a specified interval, and introduces much adaptability to patterns. However, most existing works require that gaps in a pattern be identical. In this paper, we define a new pattern matching problem where gaps are independently specified. We develop an efficient algorithm to compute the number of all matches based on pattern decomposed. Experimental results show that our algorithm has better performance in the aspects of time complexity and space complexity.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128173468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6184025
Fenglei Yang, Jianhui Li, Qinghui Lin, Xiaodong Li, Junfeng Yang
As global environmental issues become more prominent, global change research is receiving unprecedented attention. For the effective global change research, scientists urgently need a platform which can aggregate and manage the distributed, multi-sourced, heterogeneous spatial science data automatically. On the basis of analyzing the characteristics of spatial science data, this paper splits the scientific problem about automatic aggregation and management spatial science data into several sub-problems such as dynamic discovery of data resource and so on firstly. And designs the spatial science data search engine which can automatically aggregate and manage the distributed, multi-sourced, heterogeneous spatial science data secondly. The search engine which is a part of spatial data cloud has been used to aggregate and manage the MODIS data actually.
{"title":"Design of spatial science data search engine for global change research","authors":"Fenglei Yang, Jianhui Li, Qinghui Lin, Xiaodong Li, Junfeng Yang","doi":"10.1109/ICCIAUTOM.2011.6184025","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6184025","url":null,"abstract":"As global environmental issues become more prominent, global change research is receiving unprecedented attention. For the effective global change research, scientists urgently need a platform which can aggregate and manage the distributed, multi-sourced, heterogeneous spatial science data automatically. On the basis of analyzing the characteristics of spatial science data, this paper splits the scientific problem about automatic aggregation and management spatial science data into several sub-problems such as dynamic discovery of data resource and so on firstly. And designs the spatial science data search engine which can automatically aggregate and manage the distributed, multi-sourced, heterogeneous spatial science data secondly. The search engine which is a part of spatial data cloud has been used to aggregate and manage the MODIS data actually.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129366526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183955
Xue Liu, Q. Zhou, Wenjing Zhang
This paper designs and realizes a Cloud Shield System. Its main function is sharing mobile phone's SD card space so that mobile phone users can encrypt and back up files to each others' phone. And at the end of this paper, there is some analysis about improving the system.
{"title":"Design and realization of mobile phone Cloud Shield System","authors":"Xue Liu, Q. Zhou, Wenjing Zhang","doi":"10.1109/ICCIAUTOM.2011.6183955","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183955","url":null,"abstract":"This paper designs and realizes a Cloud Shield System. Its main function is sharing mobile phone's SD card space so that mobile phone users can encrypt and back up files to each others' phone. And at the end of this paper, there is some analysis about improving the system.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121470084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183968
Lei Sun, Z. Duan
Support vector machine (SVM) constructs an optimal hyperplane utilizing a small set of vectors near boundary. The proximal SVM is an extremely simple procedure to generate linear and nonlinear classifier based on proximity to one of two parallel planes that are separated as far as possible. However, when the two-class are very unbalanced, the proximal SVM tends to fit better the class with more samples and has higher error in fewer samples. Further more, this draw back exists in K-category classification by using one-from-the-rest (OFR) separation for each class. To solve the problem, an improved SVM algorithm is presented in this paper. Experimental results show that the novel approach is prior to the proximal SVM.
{"title":"A classification algorithm for multi-classes based on SVM","authors":"Lei Sun, Z. Duan","doi":"10.1109/ICCIAUTOM.2011.6183968","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183968","url":null,"abstract":"Support vector machine (SVM) constructs an optimal hyperplane utilizing a small set of vectors near boundary. The proximal SVM is an extremely simple procedure to generate linear and nonlinear classifier based on proximity to one of two parallel planes that are separated as far as possible. However, when the two-class are very unbalanced, the proximal SVM tends to fit better the class with more samples and has higher error in fewer samples. Further more, this draw back exists in K-category classification by using one-from-the-rest (OFR) separation for each class. To solve the problem, an improved SVM algorithm is presented in this paper. Experimental results show that the novel approach is prior to the proximal SVM.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126802486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper aims to study the application of expert system combined with neural network in Intrusion Detection System. It brings improvement to BP algorithm of neural networks, meanwhile a series of rule sets have been created using the experience and knowledge from experts, scholars as well as professional forecasters. This benefits the simulation of human expert reasoning of the decision-making process and helps the judgments to create an expert system. Test shows improved efficiencies in intrusion detection than those with single BP algorithm.
{"title":"Intrusion Detection System based on combination of expert system and Bp neural network","authors":"Liang Zhou, Lixin Ke, K. Wu, Xitao Zheng","doi":"10.12696/GSAM.2013.1010","DOIUrl":"https://doi.org/10.12696/GSAM.2013.1010","url":null,"abstract":"This paper aims to study the application of expert system combined with neural network in Intrusion Detection System. It brings improvement to BP algorithm of neural networks, meanwhile a series of rule sets have been created using the experience and knowledge from experts, scholars as well as professional forecasters. This benefits the simulation of human expert reasoning of the decision-making process and helps the judgments to create an expert system. Test shows improved efficiencies in intrusion detection than those with single BP algorithm.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"11 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120990371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183895
Fengying Wang, Gui Li, L. Du
In the paper, the problems of chaos control for a class of switched chaotic systems with uncertainty is studied. Based on the adaptive control theory and common Lyapunov function method, a new adaptive controller is constructed, which can guarantee the switched chaotic systems asymptotic stability under arbitrary switchings. The results of simulation are given to show effectiveness of the proposed method.
{"title":"Adaptive control for a class of switched chaotic systems with uncertainty","authors":"Fengying Wang, Gui Li, L. Du","doi":"10.1109/ICCIAUTOM.2011.6183895","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183895","url":null,"abstract":"In the paper, the problems of chaos control for a class of switched chaotic systems with uncertainty is studied. Based on the adaptive control theory and common Lyapunov function method, a new adaptive controller is constructed, which can guarantee the switched chaotic systems asymptotic stability under arbitrary switchings. The results of simulation are given to show effectiveness of the proposed method.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131165166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}