首页 > 最新文献

2018 14th International Conference on Computational Intelligence and Security (CIS)最新文献

英文 中文
Robust Stability Analysis for Uncertain Time-Varying Delay Neutral Systems 不确定时变时滞中立型系统的鲁棒稳定性分析
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00054
Ruliang Wang, Xiaoli Pei
In this paper, we study the stability of a class of uncertain time-varying delay neutral systems. By constructing Lyapunov functions containing four integral integrals, using the techniques and methods of various types of inequalities, we can get the conclusion about the system Robust stability Finally, this conclusion is verified through the LMI toolbox in MATLAB.
本文研究了一类不确定时变时滞中立型系统的稳定性。通过构造包含四个积分的Lyapunov函数,利用各种不等式的技巧和方法,得到了系统鲁棒稳定性的结论,最后通过MATLAB中的LMI工具箱对该结论进行了验证。
{"title":"Robust Stability Analysis for Uncertain Time-Varying Delay Neutral Systems","authors":"Ruliang Wang, Xiaoli Pei","doi":"10.1109/CIS2018.2018.00054","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00054","url":null,"abstract":"In this paper, we study the stability of a class of uncertain time-varying delay neutral systems. By constructing Lyapunov functions containing four integral integrals, using the techniques and methods of various types of inequalities, we can get the conclusion about the system Robust stability Finally, this conclusion is verified through the LMI toolbox in MATLAB.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126000912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Constructing Business Simulation Training Platform Based on Workflow Management Systems 基于工作流管理系统的商务模拟培训平台构建
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00075
Ya-juan Yang, Liangliang Zhang, Quan-ju Zhang
Since the concept of workflow originates from the fields of production organization and office automation in 1970s, workflow technology research and related product development have entered a more prosperous stage during the 80s. Presently, workflow management technology has been successfully applied to libraries, hospitals, insurance companies and, of the most important, to the industrial fields. This paper aims at how the workflow-based technology can be applied to the area of intelligent education. We focus the attention on some important aspects of constructing business training platform with the workflow management system technology based-on, such as the construction framework, platform functions and implementation. Mean-while, workflow reference model design is presented and the workflow-based scheduling is carried out that will be employed in the developing process. Moreover, we point out the follow-up development potentials for constructing other wisdom training platform based on the workflow management systems.
由于工作流的概念起源于20世纪70年代的生产组织和办公自动化领域,80年代工作流技术的研究和相关产品的开发进入了一个更加繁荣的阶段。目前,工作流管理技术已成功应用于图书馆、医院、保险公司,最重要的是应用于工业领域。本文旨在研究基于工作流的技术如何应用于智能教育领域。重点研究了基于工作流管理系统技术的商务培训平台的构建框架、平台功能和实现等几个重要方面。同时,提出了工作流参考模型设计,并进行了基于工作流的调度,将在开发过程中使用。并指出了基于工作流管理系统构建其他智慧培训平台的后续发展潜力。
{"title":"Constructing Business Simulation Training Platform Based on Workflow Management Systems","authors":"Ya-juan Yang, Liangliang Zhang, Quan-ju Zhang","doi":"10.1109/CIS2018.2018.00075","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00075","url":null,"abstract":"Since the concept of workflow originates from the fields of production organization and office automation in 1970s, workflow technology research and related product development have entered a more prosperous stage during the 80s. Presently, workflow management technology has been successfully applied to libraries, hospitals, insurance companies and, of the most important, to the industrial fields. This paper aims at how the workflow-based technology can be applied to the area of intelligent education. We focus the attention on some important aspects of constructing business training platform with the workflow management system technology based-on, such as the construction framework, platform functions and implementation. Mean-while, workflow reference model design is presented and the workflow-based scheduling is carried out that will be employed in the developing process. Moreover, we point out the follow-up development potentials for constructing other wisdom training platform based on the workflow management systems.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134257506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Certificateless Proxy Signcryption Using Cyclic Multiplication Groups 使用循环乘法组的无证书代理签名加密
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00101
Hui-fang Yu
Proxy signcryption is that the proxy signcrypter obtains the delegate authorization from the original signcrypter, and then signcrypts the specified message on behalf of the original signcrypter. In this paper, the author constructs a novel certificateless proxy signcryption scheme based on three cyclic multiplication groups and its security bases on the intractability of the co-bilinear Diffie-Hellman (co-BDH) and co-computational Diffie-Hellman (co-CDH) problems. Our certificateless proxy signcryption scheme is very appropriate for applications in electric commerce and electric government.
代理签名加密是代理签名人从原始签名人那里获得委托授权,然后代表原始签名人对指定的消息进行签名加密。本文构造了一种新的基于三个循环乘法群的无证书代理签名加密方案,其安全性基于协双线性Diffie-Hellman (co-BDH)和协计算Diffie-Hellman (co-CDH)问题的难解性。我们的无证书代理签名加密方案非常适合电子商务和电子政务的应用。
{"title":"Certificateless Proxy Signcryption Using Cyclic Multiplication Groups","authors":"Hui-fang Yu","doi":"10.1109/CIS2018.2018.00101","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00101","url":null,"abstract":"Proxy signcryption is that the proxy signcrypter obtains the delegate authorization from the original signcrypter, and then signcrypts the specified message on behalf of the original signcrypter. In this paper, the author constructs a novel certificateless proxy signcryption scheme based on three cyclic multiplication groups and its security bases on the intractability of the co-bilinear Diffie-Hellman (co-BDH) and co-computational Diffie-Hellman (co-CDH) problems. Our certificateless proxy signcryption scheme is very appropriate for applications in electric commerce and electric government.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132295943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A RMM Based Word Segmentation Method for Chinese Design Specifications of Building Stairs 基于RMM的建筑楼梯中文设计规范分词方法
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00068
Jie-lan Zhang, Yi Chen, Xinhong Hei, Lei Zhu, Qingpan Zhao, Yichuan Wang
With the rapid development of information technology, knowledge graph extracts more and more attentions from researchers. However, Chinese knowledge graph of construction industry is still at the beginning stage, and Chinese word segmentation method, as the basis of natural language processing, plays a vital role on the process of building knowledge graph. In this paper, we study Chinese design specifications of building stairs, and proposes a reverse maximum matching (RMM) based word segmentation method to parse Chinese building specifications. The proposed method first converts the dictionary of building into a hash dictionary. And then, by traversing the design specifications of building stairs, the proposed method handles the non-Chinese symbols in the design specifications. Finally, the proposed method uses RMM algorithm to match contexts with Chinese design specifications and generate the goal results. Through performing experiments on Chinese design specifications of building stairs, the results can be shown that the proposed method is feasible.
随着信息技术的飞速发展,知识图谱越来越受到研究者的关注。然而,建筑行业的中文知识图谱还处于起步阶段,而中文分词方法作为自然语言处理的基础,在构建知识图谱的过程中起着至关重要的作用。本文以中文建筑楼梯设计规范为研究对象,提出了一种基于反向最大匹配(RMM)的中文建筑楼梯设计规范分词方法。该方法首先将构建的字典转换为哈希字典。然后,通过遍历建筑楼梯设计规范,对设计规范中的非中文符号进行处理。最后,采用RMM算法将上下文与中文设计规范进行匹配,生成目标结果。通过对我国建筑楼梯设计规范进行试验,结果表明该方法是可行的。
{"title":"A RMM Based Word Segmentation Method for Chinese Design Specifications of Building Stairs","authors":"Jie-lan Zhang, Yi Chen, Xinhong Hei, Lei Zhu, Qingpan Zhao, Yichuan Wang","doi":"10.1109/CIS2018.2018.00068","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00068","url":null,"abstract":"With the rapid development of information technology, knowledge graph extracts more and more attentions from researchers. However, Chinese knowledge graph of construction industry is still at the beginning stage, and Chinese word segmentation method, as the basis of natural language processing, plays a vital role on the process of building knowledge graph. In this paper, we study Chinese design specifications of building stairs, and proposes a reverse maximum matching (RMM) based word segmentation method to parse Chinese building specifications. The proposed method first converts the dictionary of building into a hash dictionary. And then, by traversing the design specifications of building stairs, the proposed method handles the non-Chinese symbols in the design specifications. Finally, the proposed method uses RMM algorithm to match contexts with Chinese design specifications and generate the goal results. Through performing experiments on Chinese design specifications of building stairs, the results can be shown that the proposed method is feasible.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115324538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Parallel Host Log Analysis Approach Based on Spark 基于Spark的并行主机日志分析方法
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00073
Xinpeng Li, Yong Wang, Hao Feng, Wenlong Ke
Intrusion detection plays a key role in maintaining the security of computer networks. Host-based intrusion detection systems usually analyze log data to discover host abnormal behavior. In recent years, with the rapid growth of massive host log data generated by virtual machines in the cloud environment, the traditional log analysis methods are limited by factors such as single data source, independent data, large data volume, and insufficient single-point computing capability. To solve this problem, this paper proposes a Spark-based host log data processing method, which first expands the data dimension based on Spark SQL to obtain more detailed dimensional data; then accomplish the query (especially union query) and counting complex data for more comprehensive host health used Spark SQL. Series of experiments result show that our proposed method can achieve platform scalability and has well time performance in log data processing.
入侵检测在维护计算机网络安全方面起着至关重要的作用。基于主机的入侵检测系统通常通过分析日志数据来发现主机的异常行为。近年来,随着云环境下虚拟机产生的海量主机日志数据的快速增长,传统的日志分析方法受到数据源单一、数据独立、数据量大、单点计算能力不足等因素的限制。针对这一问题,本文提出了一种基于Spark的主机日志数据处理方法,该方法首先基于Spark SQL扩展数据维度,获得更详细的维度数据;然后使用Spark SQL完成查询(特别是联合查询)和对复杂数据的统计,以获得更全面的主机健康状况。一系列实验结果表明,该方法能够实现平台可扩展性,在测井数据处理中具有良好的时效性。
{"title":"A Parallel Host Log Analysis Approach Based on Spark","authors":"Xinpeng Li, Yong Wang, Hao Feng, Wenlong Ke","doi":"10.1109/CIS2018.2018.00073","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00073","url":null,"abstract":"Intrusion detection plays a key role in maintaining the security of computer networks. Host-based intrusion detection systems usually analyze log data to discover host abnormal behavior. In recent years, with the rapid growth of massive host log data generated by virtual machines in the cloud environment, the traditional log analysis methods are limited by factors such as single data source, independent data, large data volume, and insufficient single-point computing capability. To solve this problem, this paper proposes a Spark-based host log data processing method, which first expands the data dimension based on Spark SQL to obtain more detailed dimensional data; then accomplish the query (especially union query) and counting complex data for more comprehensive host health used Spark SQL. Series of experiments result show that our proposed method can achieve platform scalability and has well time performance in log data processing.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Security Evaluation Method for Voice-over-IP Streaming Media Information Hiding ip话音流媒体信息隐藏的安全评估方法
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00057
Xiaoyan Hu, Lejun Zhang, Tianwen Huang, Xiaoying Lei
Ensuring the security of a communication system is the key step of information hiding. With the rapid development of Internet technology and the increasingly complex network environment, more and more secret information needs to be transmitted over the network. Voice over IP (VoIP) is based on the IP network of digital transmission technology, taking voice services in VoIP as a steganographic carrier is one of the important methods for secure transmission of secret information. In this paper, we will start with the communication principle of VoIP streaming media information hiding, and gives the definition of imperceptibility, undetectability, irreducibility, unattackable, and insensitivity of VoIP streaming information hiding, and then analyze the covert communication process of steganography for VoIP. Finally, a security evaluation method based on information hiding of VoIP streaming media is proposed.
保证通信系统的安全是信息隐藏的关键步骤。随着Internet技术的飞速发展和网络环境的日益复杂,越来越多的保密信息需要通过网络进行传输。IP语音(Voice over IP, VoIP)是基于IP网络的数字传输技术,将VoIP中的语音业务作为隐写载体是保密信息安全传输的重要方法之一。本文从VoIP流媒体信息隐藏的通信原理出发,给出了VoIP流媒体信息隐藏的不可感知性、不可检测性、不可约性、不可攻击性和不敏感性的定义,分析了VoIP隐写的隐蔽通信过程。最后,提出了一种基于信息隐藏的VoIP流媒体安全评估方法。
{"title":"A Security Evaluation Method for Voice-over-IP Streaming Media Information Hiding","authors":"Xiaoyan Hu, Lejun Zhang, Tianwen Huang, Xiaoying Lei","doi":"10.1109/CIS2018.2018.00057","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00057","url":null,"abstract":"Ensuring the security of a communication system is the key step of information hiding. With the rapid development of Internet technology and the increasingly complex network environment, more and more secret information needs to be transmitted over the network. Voice over IP (VoIP) is based on the IP network of digital transmission technology, taking voice services in VoIP as a steganographic carrier is one of the important methods for secure transmission of secret information. In this paper, we will start with the communication principle of VoIP streaming media information hiding, and gives the definition of imperceptibility, undetectability, irreducibility, unattackable, and insensitivity of VoIP streaming information hiding, and then analyze the covert communication process of steganography for VoIP. Finally, a security evaluation method based on information hiding of VoIP streaming media is proposed.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114385798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improvement Evolutionary Algorithm Based on Grid-Based Pareto Dominance for Many-Objective Optimization 基于网格Pareto优势的多目标优化改进进化算法
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00012
Cai Dai, Yanjun Ji, Juan Li
Pareto dominance based Multi-objective Evolutionary Algorithms (MOEAs) is an effective method for solving multi-objective problems with two or three objectives. However, in many-objective problems, the determination of the solution set scale is a challenge which highly limits the performance of existing MOEAs. The small quantity of solution set in MOEA may lead to large non-dominance area which dramatically reduces the selection pressure, while large scale solution set will inevitably increases the time and memory consumption. In order to solve this problem, in this paper, a grid-based Pareto dominance approach is proposed for many-objective problem. In this approach, one single solution is used to create the non-dominance area which approximates that used to be determined by a set of solutions in MOEA. Moreover, in this approach, both the selection pressure, diversity of solutions and time and memory consumption are taken into consideration by utilizing the smallest number of virtual solutions to determine whether a solution is a non-dominance solution. In this paper, a new MOEA based on the grid-based Pareto dominance is designed for many-objective problems. In the experiment, the well-known algorithms and relaxed forms of Pareto dominance are used to compare with the algorithm and the grid-based Pareto dominance. The experimental results show that the proposed approaches can guide the search for many-objective spaces to converge to the true PF and maintain the diversity of solutions.
基于Pareto优势的多目标进化算法(moea)是求解具有两个或三个目标的多目标问题的有效方法。然而,在许多客观问题中,解集规模的确定是一个挑战,严重限制了现有moea的性能。MOEA中较少的解集可能导致较大的非优势区域,从而大大降低了选择压力,而大规模的解集不可避免地会增加时间和内存消耗。为了解决这一问题,本文针对多目标问题,提出了一种基于网格的Pareto优度方法。在这种方法中,使用一个单一的解决方案来创建非优势区域,该区域近似于在MOEA中由一组解决方案确定的区域。此外,该方法同时考虑了选择压力、解的多样性以及时间和内存消耗,利用最小数量的虚拟解来确定一个解是否为非优势解。针对多目标问题,设计了一种新的基于网格Pareto优势的MOEA。在实验中,使用了著名的算法和放松形式的帕累托优势,与该算法和基于网格的帕累托优势进行了比较。实验结果表明,该方法能够引导多目标空间的搜索收敛于真PF,并保持解的多样性。
{"title":"An Improvement Evolutionary Algorithm Based on Grid-Based Pareto Dominance for Many-Objective Optimization","authors":"Cai Dai, Yanjun Ji, Juan Li","doi":"10.1109/CIS2018.2018.00012","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00012","url":null,"abstract":"Pareto dominance based Multi-objective Evolutionary Algorithms (MOEAs) is an effective method for solving multi-objective problems with two or three objectives. However, in many-objective problems, the determination of the solution set scale is a challenge which highly limits the performance of existing MOEAs. The small quantity of solution set in MOEA may lead to large non-dominance area which dramatically reduces the selection pressure, while large scale solution set will inevitably increases the time and memory consumption. In order to solve this problem, in this paper, a grid-based Pareto dominance approach is proposed for many-objective problem. In this approach, one single solution is used to create the non-dominance area which approximates that used to be determined by a set of solutions in MOEA. Moreover, in this approach, both the selection pressure, diversity of solutions and time and memory consumption are taken into consideration by utilizing the smallest number of virtual solutions to determine whether a solution is a non-dominance solution. In this paper, a new MOEA based on the grid-based Pareto dominance is designed for many-objective problems. In the experiment, the well-known algorithms and relaxed forms of Pareto dominance are used to compare with the algorithm and the grid-based Pareto dominance. The experimental results show that the proposed approaches can guide the search for many-objective spaces to converge to the true PF and maintain the diversity of solutions.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117009938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Improved Weighted Local Linear Embedding Algorithm 一种改进的加权局部线性嵌入算法
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00090
Qing Wu, Zongxian Qi, Zhicang Wang, Yu Zhang
Local linear embedding has the characteristics of nonlinearity and simple implementation, but it cannot accurately handle the selection of neighborhoods under the conditions of noise, large curvature and sparse sampling. To solve this problem, an improved weighted local linear embedding method (WLE-LLE) is proposed. In WLE-LLE, the dimensionality reduction objective function is reconstructed by utilizing Laplacian Eigenmaps, which can effectively represent the manifold structure of nonlinear data. Theoretical analyses show the proposed method is better than LLE algorithm in preserving the original manifold structure of the data. And numerical experiments show its classification recognition rate is greatly improved, which is 2%-8% higher than LLE.
局部线性嵌入具有非线性和实现简单的特点,但不能准确处理噪声、大曲率和稀疏采样条件下的邻域选择问题。为了解决这一问题,提出了一种改进的加权局部线性嵌入方法(WLE-LLE)。在WLE-LLE中,利用拉普拉斯特征映射重构降维目标函数,可以有效地表示非线性数据的流形结构。理论分析表明,该方法在保留原始数据流形结构方面优于LLE算法。数值实验表明,该算法的分类识别率比LLE算法提高了2% ~ 8%。
{"title":"An Improved Weighted Local Linear Embedding Algorithm","authors":"Qing Wu, Zongxian Qi, Zhicang Wang, Yu Zhang","doi":"10.1109/CIS2018.2018.00090","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00090","url":null,"abstract":"Local linear embedding has the characteristics of nonlinearity and simple implementation, but it cannot accurately handle the selection of neighborhoods under the conditions of noise, large curvature and sparse sampling. To solve this problem, an improved weighted local linear embedding method (WLE-LLE) is proposed. In WLE-LLE, the dimensionality reduction objective function is reconstructed by utilizing Laplacian Eigenmaps, which can effectively represent the manifold structure of nonlinear data. Theoretical analyses show the proposed method is better than LLE algorithm in preserving the original manifold structure of the data. And numerical experiments show its classification recognition rate is greatly improved, which is 2%-8% higher than LLE.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"389 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115991114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Influence of Distributed Generation Connection on Dynamic Characteristics of Power Grid 分布式发电并网对电网动态特性的影响
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00085
Kangshun Li, Yi Wang
The power grid is an artificial network. Studying the complex power grid with distributed generation is of great significance to people's life, production and social stability. This paper studies synchronous and operational reliability of power grid when distributed generation enter the network from the dynamic point of view. It is found that the more the power output of distributed generation is, the more easy the power grid is to synchronize and the stronger the resistance to disturbance when distributed generation is connected to a single power grid. When distributed generation is connected to interconnected power grids through small degree load nodes or a large sub network, the synchronization capability of interconnected power grids will be enhanced. No matter single power grid or interconnected power grids, the more distributed generation connected to the grid there are, the more the synchronization ability of power grid will be improved.
电网是一个人工网络。研究分布式发电的复杂电网对人们的生活、生产和社会稳定具有重要意义。本文从动态角度研究了分布式发电并网时电网的同步可靠性和运行可靠性。研究发现,当分布式发电接入单一电网时,分布式发电输出功率越大,电网越容易同步,抗扰动能力越强。当分布式发电通过小程度负荷节点或大型子网接入互联电网时,将增强互联电网的同步能力。无论是单电网还是互联电网,接入电网的分布式发电越多,电网的同步能力就越好。
{"title":"Influence of Distributed Generation Connection on Dynamic Characteristics of Power Grid","authors":"Kangshun Li, Yi Wang","doi":"10.1109/CIS2018.2018.00085","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00085","url":null,"abstract":"The power grid is an artificial network. Studying the complex power grid with distributed generation is of great significance to people's life, production and social stability. This paper studies synchronous and operational reliability of power grid when distributed generation enter the network from the dynamic point of view. It is found that the more the power output of distributed generation is, the more easy the power grid is to synchronize and the stronger the resistance to disturbance when distributed generation is connected to a single power grid. When distributed generation is connected to interconnected power grids through small degree load nodes or a large sub network, the synchronization capability of interconnected power grids will be enhanced. No matter single power grid or interconnected power grids, the more distributed generation connected to the grid there are, the more the synchronization ability of power grid will be improved.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117100125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Filtering Out Infrequent Events by Expectation from Business Process Event Logs 根据期望从业务流程事件日志中过滤掉不频繁的事件
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00089
Ying Huang, Yingxu Wang, Yiwang Huang
Process discovery, one of the key steps in process management, aims at discovering process models from process execution data stored in event logs. Most discovery algorithms assume that all data in an event log fully comply with the process execution specification. However, in real event logs, noise and irrelevant infrequent behaviour are often present. In this paper, we propose a novel filtering method that the removal of infrequent behavior from event logs. The method has been evaluated in detail and it is shown that its application in existing process discovery algorithms significantly improves the quality of the discovered process models and that it scales well to large datasets.
流程发现是流程管理中的关键步骤之一,旨在从存储在事件日志中的流程执行数据中发现流程模型。大多数发现算法假设事件日志中的所有数据都完全符合流程执行规范。然而,在真实的事件日志中,噪声和不相关的不频繁行为经常出现。在本文中,我们提出了一种新的过滤方法,即从事件日志中删除不频繁的行为。对该方法进行了详细的评估,结果表明,该方法在现有过程发现算法中的应用显著提高了发现过程模型的质量,并且可以很好地扩展到大型数据集。
{"title":"Filtering Out Infrequent Events by Expectation from Business Process Event Logs","authors":"Ying Huang, Yingxu Wang, Yiwang Huang","doi":"10.1109/CIS2018.2018.00089","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00089","url":null,"abstract":"Process discovery, one of the key steps in process management, aims at discovering process models from process execution data stored in event logs. Most discovery algorithms assume that all data in an event log fully comply with the process execution specification. However, in real event logs, noise and irrelevant infrequent behaviour are often present. In this paper, we propose a novel filtering method that the removal of infrequent behavior from event logs. The method has been evaluated in detail and it is shown that its application in existing process discovery algorithms significantly improves the quality of the discovered process models and that it scales well to large datasets.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 14th International Conference on Computational Intelligence and Security (CIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1