首页 > 最新文献

2018 14th International Conference on Computational Intelligence and Security (CIS)最新文献

英文 中文
A Real-Time Location Privacy Protection Method Based on Space Transformation 基于空间变换的实时位置隐私保护方法
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00071
Yingle Li, Shuyu Li
In recent years, mobile internet technology and positioning technology have been rapidly developed and widely used, mobile users can enjoy location-based services through mobile smart devices anywhere and anytime. However, they may lead to the leakage of personal sensitive information such as user's spatial temporal location data and so on. Trying to solve this problem and overcoming the shortcoming of traditional randomized dummy generation algorithm, a real-time location privacy protection algorithm based on spatial transform is proposed in the paper, without influencing the quality of user real-time location service. The algorithm uses the number of interest points in the history log file and the road network topology as the key elements of the query context and the motion model, which makes the generated dummy more realistic and effective in both time and space dimension. And the dummy set is encrypted by using the algorithm based on Hilbert space transformation, to make the user query data more secure. The results of experiment show that the algorithm can improve the effectiveness of dummy and gain better obfuscation query result in condition of preserving user privacy information.
近年来,移动互联网技术和定位技术得到了迅速发展和广泛应用,移动用户可以随时随地通过移动智能设备享受基于位置的服务。但是,它们可能会导致用户的时空位置数据等个人敏感信息的泄露。为了解决这一问题,克服传统随机虚拟生成算法的不足,提出了一种不影响用户实时位置服务质量的基于空间变换的实时位置隐私保护算法。该算法以历史日志文件中的兴趣点数量和路网拓扑结构作为查询上下文和运动模型的关键要素,使生成的虚拟人在时间和空间维度上都更加真实有效。采用基于Hilbert空间变换的算法对虚拟集进行加密,使用户查询数据更加安全。实验结果表明,该算法在保留用户隐私信息的情况下,提高了虚拟机的有效性,获得了较好的混淆查询结果。
{"title":"A Real-Time Location Privacy Protection Method Based on Space Transformation","authors":"Yingle Li, Shuyu Li","doi":"10.1109/CIS2018.2018.00071","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00071","url":null,"abstract":"In recent years, mobile internet technology and positioning technology have been rapidly developed and widely used, mobile users can enjoy location-based services through mobile smart devices anywhere and anytime. However, they may lead to the leakage of personal sensitive information such as user's spatial temporal location data and so on. Trying to solve this problem and overcoming the shortcoming of traditional randomized dummy generation algorithm, a real-time location privacy protection algorithm based on spatial transform is proposed in the paper, without influencing the quality of user real-time location service. The algorithm uses the number of interest points in the history log file and the road network topology as the key elements of the query context and the motion model, which makes the generated dummy more realistic and effective in both time and space dimension. And the dummy set is encrypted by using the algorithm based on Hilbert space transformation, to make the user query data more secure. The results of experiment show that the algorithm can improve the effectiveness of dummy and gain better obfuscation query result in condition of preserving user privacy information.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"47 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113981587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cloud Service Risk in the Smart Grid 智能电网中的云服务风险
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00060
Liping Chen, Jun Liu, Weitao Ha
Smart grid utilizes cloud service to realize reliable, efficient, secured, and cost-effective power management, but there are a number of security risks in the cloud service of smart grid. The security risks are particularly problematic to operators of power information infrastructure who want to leverage the benefits of cloud. In this paper, security risk of cloud service in the smart grid are categorized and analyzed characteristics, and multi-layered index system of general technical risks is established, which applies to different patterns of cloud service. Cloud service risk of smart grid can evaluate according indexes.
智能电网利用云服务实现可靠、高效、安全、经济的电力管理,但智能电网云服务存在诸多安全隐患。对于希望利用云计算优势的电力信息基础设施运营商来说,安全风险尤其成问题。本文对智能电网中云服务的安全风险进行了分类和特征分析,建立了适用于不同云服务模式的通用技术风险多层次指标体系。智能电网云服务风险可根据指标进行评估。
{"title":"Cloud Service Risk in the Smart Grid","authors":"Liping Chen, Jun Liu, Weitao Ha","doi":"10.1109/CIS2018.2018.00060","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00060","url":null,"abstract":"Smart grid utilizes cloud service to realize reliable, efficient, secured, and cost-effective power management, but there are a number of security risks in the cloud service of smart grid. The security risks are particularly problematic to operators of power information infrastructure who want to leverage the benefits of cloud. In this paper, security risk of cloud service in the smart grid are categorized and analyzed characteristics, and multi-layered index system of general technical risks is established, which applies to different patterns of cloud service. Cloud service risk of smart grid can evaluate according indexes.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130058876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Location Algorithm Based on Mobile Anchor Node 一种基于移动锚节点的改进定位算法
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00069
L. Tian, Yong Fan
Aiming at the problem that the beacon signal of SCAN algorithm can not effectively cover the monitoring area and the mobile node of PI algorithm has longer moving path, an improved mobile anchor node localization algorithm-SCAN_ET is proposed in this paper. Firstly, this algorithm divides the region where nodes need to be located into several small zones. Then it's key step is that-the mobile anchor node detects whether there are unknown nodes that need to be positioned in each local small zones. If there are unknown nodes to be located in some small zones, the mobile anchor node moves along the sides of triangular in these zones and broadcasts beacon packets at all the vertices of the triangle. Otherwise, the mobile anchor node moves in a straight line in these zones. Finally, when the mobile anchor node traverses the regions, all unknown nodes that need to be positioned also complete positioning. Simulation results show that by this method, not only can all the unknown nodes obtain the location information effectively, but also the mobile anchor node has a shorter traversal length compared with PI algorithm and LMAT algorithm, which is good for saving energy and prolonging service life.
针对SCAN算法信标信号不能有效覆盖监控区域以及PI算法移动节点移动路径较长的问题,本文提出了一种改进的移动锚节点定位算法——scan_et。该算法首先将需要定位节点的区域划分为几个小区域。然后关键的一步是移动锚节点检测在每个局部小区域中是否存在需要定位的未知节点。如果在一些小区域内存在未知节点,则移动锚节点沿着这些区域的三角形边移动,并在三角形的所有顶点广播信标包。否则,移动锚节点在这些区域内沿直线移动。最后,当移动锚节点遍历区域时,所有需要定位的未知节点也完成定位。仿真结果表明,该方法不仅能有效地获取所有未知节点的位置信息,而且与PI算法和LMAT算法相比,移动锚节点的遍历长度更短,有利于节能和延长使用寿命。
{"title":"An Improved Location Algorithm Based on Mobile Anchor Node","authors":"L. Tian, Yong Fan","doi":"10.1109/CIS2018.2018.00069","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00069","url":null,"abstract":"Aiming at the problem that the beacon signal of SCAN algorithm can not effectively cover the monitoring area and the mobile node of PI algorithm has longer moving path, an improved mobile anchor node localization algorithm-SCAN_ET is proposed in this paper. Firstly, this algorithm divides the region where nodes need to be located into several small zones. Then it's key step is that-the mobile anchor node detects whether there are unknown nodes that need to be positioned in each local small zones. If there are unknown nodes to be located in some small zones, the mobile anchor node moves along the sides of triangular in these zones and broadcasts beacon packets at all the vertices of the triangle. Otherwise, the mobile anchor node moves in a straight line in these zones. Finally, when the mobile anchor node traverses the regions, all unknown nodes that need to be positioned also complete positioning. Simulation results show that by this method, not only can all the unknown nodes obtain the location information effectively, but also the mobile anchor node has a shorter traversal length compared with PI algorithm and LMAT algorithm, which is good for saving energy and prolonging service life.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121288808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability Simulation of Mobile Wireless Sensor Networks Based on Support Vector Machines 基于支持向量机的移动无线传感器网络可靠性仿真
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00066
Rong Shan, Tao Li
The nodes of mobile wireless sensor network have mobility, which leads to the change of network topology and signal strength. Therefore, the reliability of network service quality in mobile wireless sensor network has higher requirements. In the paper, the support vector machine (SVM) algorithm is used to identify and simulate faults in the mobile wireless sensor network, which can quickly locate fault nodes, thus providing guarantee for solving network faults and improving network reliability timely.
移动无线传感器网络的节点具有移动性,从而导致网络拓扑结构和信号强度的变化。因此,对移动无线传感器网络中网络服务质量的可靠性提出了更高的要求。本文采用支持向量机(SVM)算法对移动无线传感器网络中的故障进行识别和模拟,能够快速定位故障节点,为及时解决网络故障、提高网络可靠性提供保障。
{"title":"Reliability Simulation of Mobile Wireless Sensor Networks Based on Support Vector Machines","authors":"Rong Shan, Tao Li","doi":"10.1109/CIS2018.2018.00066","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00066","url":null,"abstract":"The nodes of mobile wireless sensor network have mobility, which leads to the change of network topology and signal strength. Therefore, the reliability of network service quality in mobile wireless sensor network has higher requirements. In the paper, the support vector machine (SVM) algorithm is used to identify and simulate faults in the mobile wireless sensor network, which can quickly locate fault nodes, thus providing guarantee for solving network faults and improving network reliability timely.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128541808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internal Control Measure of Administrative Institutions Based on AHP and Fuzzy Comprehensive Evaluation 基于层次分析法和模糊综合评价的行政事业单位内部控制措施
Pub Date : 2018-11-01 DOI: 10.1109/cis2018.2018.00079
Can-Hui Zhang
By utilizing the analytic hierarchy process (AHP) and the related content of fuzzy mathematics, this pap er introduced an actual case of administrative institution in C hina and comprehensively assessed its internal control throug h establishing appropriate indicators evaluation system and e valuation function, as well as proposing some specific solutio ns. To some extend, this verified the validity and feasibility o f evaluation index for the internal control. References for con structing the internal control of administrative institutions in our country would also be provided.
本文运用层次分析法(AHP)和模糊数学的相关内容,介绍了中国行政事业单位的实际案例,通过建立合适的指标评价体系和评价函数,对其内部控制进行了综合评价,并提出了具体的解决方案。这在一定程度上验证了内部控制评价指标的有效性和可行性。为我国行政事业单位内部控制的构建提供参考。
{"title":"Internal Control Measure of Administrative Institutions Based on AHP and Fuzzy Comprehensive Evaluation","authors":"Can-Hui Zhang","doi":"10.1109/cis2018.2018.00079","DOIUrl":"https://doi.org/10.1109/cis2018.2018.00079","url":null,"abstract":"By utilizing the analytic hierarchy process (AHP) and the related content of fuzzy mathematics, this pap er introduced an actual case of administrative institution in C hina and comprehensively assessed its internal control throug h establishing appropriate indicators evaluation system and e valuation function, as well as proposing some specific solutio ns. To some extend, this verified the validity and feasibility o f evaluation index for the internal control. References for con structing the internal control of administrative institutions in our country would also be provided.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128637080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Massive Data Storage Algorithm Based on Node Performance Evaluation 基于节点性能评估的海量数据存储算法
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00097
Qiang Chen
In order to make massive network data storage possible in heterogeneous environment, this paper introduces node performance evaluation method and data storage node selection algorithm in HDFS data storage mechanism. First of all, this paper describes how to evaluate each node in Hadoop cluster. And then, according to the result of node performance evaluation, the appropriate nodes are selected to store data blocks when data are stored. Through this algorithm, the number of data blocks placed in each node is allocated according to the performance value of the node.
为了使异构环境下的海量网络数据存储成为可能,本文介绍了HDFS数据存储机制中的节点性能评价方法和数据存储节点选择算法。首先,本文描述了如何对Hadoop集群中的每个节点进行评估。然后,根据节点性能评估结果,在存储数据时选择合适的节点来存储数据块。通过该算法,根据节点的性能值分配放置在每个节点上的数据块数量。
{"title":"Massive Data Storage Algorithm Based on Node Performance Evaluation","authors":"Qiang Chen","doi":"10.1109/CIS2018.2018.00097","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00097","url":null,"abstract":"In order to make massive network data storage possible in heterogeneous environment, this paper introduces node performance evaluation method and data storage node selection algorithm in HDFS data storage mechanism. First of all, this paper describes how to evaluate each node in Hadoop cluster. And then, according to the result of node performance evaluation, the appropriate nodes are selected to store data blocks when data are stored. Through this algorithm, the number of data blocks placed in each node is allocated according to the performance value of the node.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129137807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Option Pricing under Stochastic Interest Rates 随机利率下的期权定价
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00109
Xiuni Yang, Yunfeng Yang
This paper considers the pricing problem of European options. We will generalize the jump-diffusion option pricing formula by incorporating stochastic interest rates. Under the hypothesis of underlying asset price being driven by a jump-diffusion process that is a kind of special renewal process discussed the option pricing when interest rate is random variable, the formula of European options for dividend paying securities is deduced. Hence the results in R.C.Merton are generalized.
本文研究欧式期权的定价问题。我们将引入随机利率来推广跳跃扩散期权定价公式。在标的资产价格受跳跃-扩散过程(一种特殊的续期过程)驱动的假设下,讨论了利率为随机变量时的期权定价问题,推导了股利支付证券欧式期权的定价公式。因此,默顿的结果得到推广。
{"title":"Option Pricing under Stochastic Interest Rates","authors":"Xiuni Yang, Yunfeng Yang","doi":"10.1109/CIS2018.2018.00109","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00109","url":null,"abstract":"This paper considers the pricing problem of European options. We will generalize the jump-diffusion option pricing formula by incorporating stochastic interest rates. Under the hypothesis of underlying asset price being driven by a jump-diffusion process that is a kind of special renewal process discussed the option pricing when interest rate is random variable, the formula of European options for dividend paying securities is deduced. Hence the results in R.C.Merton are generalized.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115617703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CIS 2018 Preface CIS 2018前言
Pub Date : 2018-11-01 DOI: 10.1109/cis2018.2018.00005
{"title":"CIS 2018 Preface","authors":"","doi":"10.1109/cis2018.2018.00005","DOIUrl":"https://doi.org/10.1109/cis2018.2018.00005","url":null,"abstract":"","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126131602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Reconstruction Algorithm Based on Guided Image Filtering in Parallel-Beam CT 基于引导滤波的平行束CT图像重建算法
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00094
Xuening Quan, Wenzhang He
Reconstruction of high-quality images by few-view projections is a challenge faced by computed tomography. Based on guided image filtering, a new image reconstruction algorithm is presented to reconstruct image. Specially, the guided image is identical to the reconstructed image. The new reconstruction algorithm was applied to the few-view projections. The experimental results show that the new technique can improve the image quality over the compared method.
通过少视点投影重建高质量图像是计算机断层扫描面临的挑战。提出了一种基于引导滤波的图像重建算法。特别地,引导图像与重建图像是一致的。将新的重建算法应用于少视图投影。实验结果表明,该方法能较前一种方法提高图像质量。
{"title":"Image Reconstruction Algorithm Based on Guided Image Filtering in Parallel-Beam CT","authors":"Xuening Quan, Wenzhang He","doi":"10.1109/CIS2018.2018.00094","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00094","url":null,"abstract":"Reconstruction of high-quality images by few-view projections is a challenge faced by computed tomography. Based on guided image filtering, a new image reconstruction algorithm is presented to reconstruct image. Specially, the guided image is identical to the reconstructed image. The new reconstruction algorithm was applied to the few-view projections. The experimental results show that the new technique can improve the image quality over the compared method.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123819750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Feature Fusion Method Applied in Texture Image Segmentation 多特征融合方法在纹理图像分割中的应用
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00037
Hui Du, Zhihe Wang, Dan Wang, Xiaoli Wang
Texture patterns are complex and varied, and their applications are diverse. In many cases, the effect of image segmentation by a single texture feature extraction method is not ideal. In response to this problem, this paper proposes a multi-feature fusion method to process the texture feature extraction. The proposed method combines the gray level co-occurrence matrix (GLCM), Gabor wavelet transform and local binary pattern (LBP). It has the advantages of the above three texture feature extraction methods. Then, we use the algorithm K-means to implement the image segmentation by clustering the extracted texture features. As a result, the proposed algorithm can precisely realize the clustering for texture image segmentation. The experimental results show that the proposed algorithm is more efficient than the single texture feature extraction methods.
纹理图案复杂多样,其应用也多种多样。在很多情况下,单一的纹理特征提取方法对图像的分割效果并不理想。针对这一问题,本文提出了一种多特征融合的纹理特征提取方法。该方法将灰度共生矩阵(GLCM)、Gabor小波变换和局部二值模式(LBP)相结合。它具有以上三种纹理特征提取方法的优点。然后,利用K-means算法对提取的纹理特征进行聚类,实现图像分割。结果表明,该算法能够准确地实现纹理图像分割的聚类。实验结果表明,该算法比单一的纹理特征提取方法更有效。
{"title":"Multi-Feature Fusion Method Applied in Texture Image Segmentation","authors":"Hui Du, Zhihe Wang, Dan Wang, Xiaoli Wang","doi":"10.1109/CIS2018.2018.00037","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00037","url":null,"abstract":"Texture patterns are complex and varied, and their applications are diverse. In many cases, the effect of image segmentation by a single texture feature extraction method is not ideal. In response to this problem, this paper proposes a multi-feature fusion method to process the texture feature extraction. The proposed method combines the gray level co-occurrence matrix (GLCM), Gabor wavelet transform and local binary pattern (LBP). It has the advantages of the above three texture feature extraction methods. Then, we use the algorithm K-means to implement the image segmentation by clustering the extracted texture features. As a result, the proposed algorithm can precisely realize the clustering for texture image segmentation. The experimental results show that the proposed algorithm is more efficient than the single texture feature extraction methods.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126324426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2018 14th International Conference on Computational Intelligence and Security (CIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1