Pub Date : 2018-11-01DOI: 10.1109/CIS2018.2018.00106
Yubin Wang, Jinyu Yao, Xiaoxue Yu
At the present, information security protection for software testing is faced with serious situation. There are risks of software information interaction and transmission throughout the life cycle in software testing process. Lack of information security protection and technical support will result in important information leakage, such as the source code leakage, etc. By analyzing the leakage way of software information, a method in accordance with the information security requirements is elaborated which composed by technology framework, Controlled library, and test data security etc. The method is throughout the life cycle of software testing process in order to ensure the security of software testing.
{"title":"Information Security Protection in Software Testing","authors":"Yubin Wang, Jinyu Yao, Xiaoxue Yu","doi":"10.1109/CIS2018.2018.00106","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00106","url":null,"abstract":"At the present, information security protection for software testing is faced with serious situation. There are risks of software information interaction and transmission throughout the life cycle in software testing process. Lack of information security protection and technical support will result in important information leakage, such as the source code leakage, etc. By analyzing the leakage way of software information, a method in accordance with the information security requirements is elaborated which composed by technology framework, Controlled library, and test data security etc. The method is throughout the life cycle of software testing process in order to ensure the security of software testing.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131749186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/CIS2018.2018.00043
Bo Zhao, Lin Zhu, Zhiyang Ma, Juyan Ni, Qing Lin, Li-Yu Daisy Liu
Object detection under complex background is a very challenge problems, because it might be very difficult to discriminate target and its background even for human eyes. Thanks to the application of deep learning to object detection, the detection performances have improved a lot year by year. In the paper, we propose an object detection framework based on image fusion using visible image, infrared image and motion image to form three-channel input image. Furthermore, we build a 53-layers neural network by using fused image as input. Cross-domain transfer learning technique is used to train the network on large-scale IMAGENET datasets firstly, then the network is fine-tuned on the small-scale collected image datasets. Both quantitatively and qualitatively experiments are conducted to demonstrate the robustness of our method while maintaining real-time performance.
{"title":"Object Detection Based on Multi-Channel Deep CNN","authors":"Bo Zhao, Lin Zhu, Zhiyang Ma, Juyan Ni, Qing Lin, Li-Yu Daisy Liu","doi":"10.1109/CIS2018.2018.00043","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00043","url":null,"abstract":"Object detection under complex background is a very challenge problems, because it might be very difficult to discriminate target and its background even for human eyes. Thanks to the application of deep learning to object detection, the detection performances have improved a lot year by year. In the paper, we propose an object detection framework based on image fusion using visible image, infrared image and motion image to form three-channel input image. Furthermore, we build a 53-layers neural network by using fused image as input. Cross-domain transfer learning technique is used to train the network on large-scale IMAGENET datasets firstly, then the network is fine-tuned on the small-scale collected image datasets. Both quantitatively and qualitatively experiments are conducted to demonstrate the robustness of our method while maintaining real-time performance.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115061182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/CIS2018.2018.00047
Xing Wang, Minghua Jiang, Quan-ju Zhang
In recent years, the increase of customer demand and their expectations has accelerated the market competition among manufacturers. Therefore, supply chain (SC) has become the most important issue for different enterprises. It is significant for companies to have an optimal supply chain network not only to fulfil customer’s expectation but also to make it efficient. Containing facilities such as production plants, warehouses, assembly centers, disassembly centers, refurbish centers, customer centers and collection centers in the network, supply chain network of modular products are considered with uncertainty in the supply from plants. To minimize overall cost of the network, we propose a mixed integer programming model for the considered network in this paper. The proposed model is validated by solving an example problem using GAMS tool.
{"title":"Optimization of Supply Chain Network Based on Uncertainty Demand","authors":"Xing Wang, Minghua Jiang, Quan-ju Zhang","doi":"10.1109/CIS2018.2018.00047","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00047","url":null,"abstract":"In recent years, the increase of customer demand and their expectations has accelerated the market competition among manufacturers. Therefore, supply chain (SC) has become the most important issue for different enterprises. It is significant for companies to have an optimal supply chain network not only to fulfil customer’s expectation but also to make it efficient. Containing facilities such as production plants, warehouses, assembly centers, disassembly centers, refurbish centers, customer centers and collection centers in the network, supply chain network of modular products are considered with uncertainty in the supply from plants. To minimize overall cost of the network, we propose a mixed integer programming model for the considered network in this paper. The proposed model is validated by solving an example problem using GAMS tool.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133785742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/CIS2018.2018.00116
Ya Fan, Yong Wang, Miao Ye
As the double-write and backup strategies cause low efficiency of storing massive small files in Ceph FS (file system), we design a framework SFPS (Small File Process System) which adopted three technologies, including: k-means, Simhash and Analytic Hierarchy Process (AHP). The designed method can reduce the quantity and redundant data of massive small files by merging similar files after the deduplication with adaptive block skipping. Due to the associated files have high probability to be read in the next time, we also design a pre-fetching mechanism and metadata management module based on the high-efficiency database Redis to guarantee a high efficiency of read rate. The proposed scheme aims to achieve a better trade-off among the utilization of space of hard-disk and bandwidth resources, file access time, hard-disk I/O as well as the cluster performance in Ceph FS by eliminating duplicate copies of repeating data, merging similar small files, and introducing the cache module. Experimental results show that the method presented in this paper can not only effectively improve the utilization of bandwidth resources and space of device storage as well as the small file read rate, but also significantly reduce the amount of disk I/O generated by reading and writing files.
{"title":"An Improved Small File Storage Strategy in Ceph File System","authors":"Ya Fan, Yong Wang, Miao Ye","doi":"10.1109/CIS2018.2018.00116","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00116","url":null,"abstract":"As the double-write and backup strategies cause low efficiency of storing massive small files in Ceph FS (file system), we design a framework SFPS (Small File Process System) which adopted three technologies, including: k-means, Simhash and Analytic Hierarchy Process (AHP). The designed method can reduce the quantity and redundant data of massive small files by merging similar files after the deduplication with adaptive block skipping. Due to the associated files have high probability to be read in the next time, we also design a pre-fetching mechanism and metadata management module based on the high-efficiency database Redis to guarantee a high efficiency of read rate. The proposed scheme aims to achieve a better trade-off among the utilization of space of hard-disk and bandwidth resources, file access time, hard-disk I/O as well as the cluster performance in Ceph FS by eliminating duplicate copies of repeating data, merging similar small files, and introducing the cache module. Experimental results show that the method presented in this paper can not only effectively improve the utilization of bandwidth resources and space of device storage as well as the small file read rate, but also significantly reduce the amount of disk I/O generated by reading and writing files.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132928083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/CIS2018.2018.00064
Mengmeng Xu, Hai Zhu, Hengzhou Xu, Baofeng Wang, Sifeng Zhu
In this paper, we investigate the joint optimization of packet length and transmission energy for minimizing the total energy consumption per transferred payload bit in amplify-and-forward relay networks. Analytical expression of the total energy consumption per transferred payload bit is derived. The relay transmission is optimized to minimize the total energy consumption with respect to the packet length and the transmission energy. By simulation, we compare the relay transmission with the direct transmission in terms of the total energy consumption per transferred payload bit. Our results provide several insights into the choice of transmission strategies (relay transmission or direct transmission) given some network parameters.
{"title":"Joint Optimization of Packet Length and Transmission Energy in Amplify-and-Forward Relay Networks","authors":"Mengmeng Xu, Hai Zhu, Hengzhou Xu, Baofeng Wang, Sifeng Zhu","doi":"10.1109/CIS2018.2018.00064","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00064","url":null,"abstract":"In this paper, we investigate the joint optimization of packet length and transmission energy for minimizing the total energy consumption per transferred payload bit in amplify-and-forward relay networks. Analytical expression of the total energy consumption per transferred payload bit is derived. The relay transmission is optimized to minimize the total energy consumption with respect to the packet length and the transmission energy. By simulation, we compare the relay transmission with the direct transmission in terms of the total energy consumption per transferred payload bit. Our results provide several insights into the choice of transmission strategies (relay transmission or direct transmission) given some network parameters.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134528147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/CIS2018.2018.00105
Longqing Zhang, Xinwei Zhang, Liping Bai, Yanghong Zhang, ShengFu Lan
Environment control play a very important role in the growth of flowers. Only in a suitable environment can flowers grow well. However, the agricultural monitoring in China is mainly based on the field information monitoring, and the flowers information management is relatively less designed, and many monitoring management system platforms are limited to the field monitoring or the monitoring of a certain crop in a certain region. According to the current situation, this subject designed and developed a flower environment monitoring system based on domain name binding. The system realized real-time collection, processing, storage and reporting of temperature, humidity and soil moisture information through hardware application and software programming. This subject mainly includes the flower information sensor acquisition information system, monitoring center configuration system development, domain name binding three main contents, combined with microcomputer, power electronics, data communication, sensors and other technologies.
{"title":"Research on Domain Binding Information Environment System of Flower with GPRS","authors":"Longqing Zhang, Xinwei Zhang, Liping Bai, Yanghong Zhang, ShengFu Lan","doi":"10.1109/CIS2018.2018.00105","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00105","url":null,"abstract":"Environment control play a very important role in the growth of flowers. Only in a suitable environment can flowers grow well. However, the agricultural monitoring in China is mainly based on the field information monitoring, and the flowers information management is relatively less designed, and many monitoring management system platforms are limited to the field monitoring or the monitoring of a certain crop in a certain region. According to the current situation, this subject designed and developed a flower environment monitoring system based on domain name binding. The system realized real-time collection, processing, storage and reporting of temperature, humidity and soil moisture information through hardware application and software programming. This subject mainly includes the flower information sensor acquisition information system, monitoring center configuration system development, domain name binding three main contents, combined with microcomputer, power electronics, data communication, sensors and other technologies.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133580476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/CIS2018.2018.00021
Jie Zhang, Junhong Feng
Single-cell RNA-seq data often contain tens of and thousands genes, while too many of them are redundant genes as well as inferior genes. In this study, the information gain is used to coarsely remove those redundant and inferior genes, then a new designed genetic algorithm with a dynamic crossover operator is used to finely select the most important genes. The new feature selection algorithm is abbreviated as IGGA. The difference between the IGGA and the existing methods lies in that IGGA is designed at the first time to select genes from single-cell RNA-seq data. Experimental results performing on several real datasets demonstrate that the proposed algorithm can efficiently select the most important genes.
{"title":"Gene Selection for Single-Cell RNA-Seq Data Based on Information Gain and Genetic Algorithm","authors":"Jie Zhang, Junhong Feng","doi":"10.1109/CIS2018.2018.00021","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00021","url":null,"abstract":"Single-cell RNA-seq data often contain tens of and thousands genes, while too many of them are redundant genes as well as inferior genes. In this study, the information gain is used to coarsely remove those redundant and inferior genes, then a new designed genetic algorithm with a dynamic crossover operator is used to finely select the most important genes. The new feature selection algorithm is abbreviated as IGGA. The difference between the IGGA and the existing methods lies in that IGGA is designed at the first time to select genes from single-cell RNA-seq data. Experimental results performing on several real datasets demonstrate that the proposed algorithm can efficiently select the most important genes.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132562373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/CIS2018.2018.00014
Na Wang, Wenyao Zhang, Dawei Li
Multimodal medical image fusion plays important roles in clinical applications. Existing indexes used to evaluate 2D medical image fusion algorithms are not suitable for 3D fusions. In this paper, a new evaluation index, which is named as GIMI, is proposed to evaluate and compare the quality of 3D medical image fusion algorithms. GIMI index is based on image volumes not slices. It captures spatial information through the combination of image intensity and gradient, where gradients are computed in 3D space to reconnect all separated image slices together. It treats image slices as a whole of volume to improve the consistency of evaluation. Quantitative and qualitative test results show that GIMI index is effective in evaluating 3D medical image fusions. Its evaluation is consistent with the visual perception of fused images.
{"title":"GIMI: A New Evaluation Index for 3D Multimodal Medical Image Fusion","authors":"Na Wang, Wenyao Zhang, Dawei Li","doi":"10.1109/CIS2018.2018.00014","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00014","url":null,"abstract":"Multimodal medical image fusion plays important roles in clinical applications. Existing indexes used to evaluate 2D medical image fusion algorithms are not suitable for 3D fusions. In this paper, a new evaluation index, which is named as GIMI, is proposed to evaluate and compare the quality of 3D medical image fusion algorithms. GIMI index is based on image volumes not slices. It captures spatial information through the combination of image intensity and gradient, where gradients are computed in 3D space to reconnect all separated image slices together. It treats image slices as a whole of volume to improve the consistency of evaluation. Quantitative and qualitative test results show that GIMI index is effective in evaluating 3D medical image fusions. Its evaluation is consistent with the visual perception of fused images.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132820298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/CIS2018.2018.00051
Mei Ma, Hecheng Li, Jing Huang
In order to effectively solve the many objective optimization problems (MaOPs), a new multi-objective evolutionary algorithm is proposed. Firstly, utilizes the principal component analysis (PCA) to reduce the dimension of objective space. The main idea is do a correlation analysis between objectives. Secondly, puts forward a new grid division method. In the course of dividing, make sure all grid sizes are equal. The simulation illustrates the efficiency of the proposed algorithm.
{"title":"A Multi-Objective Evolutionary Algorithm Based on Principal Component Analysis and Grid Division","authors":"Mei Ma, Hecheng Li, Jing Huang","doi":"10.1109/CIS2018.2018.00051","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00051","url":null,"abstract":"In order to effectively solve the many objective optimization problems (MaOPs), a new multi-objective evolutionary algorithm is proposed. Firstly, utilizes the principal component analysis (PCA) to reduce the dimension of objective space. The main idea is do a correlation analysis between objectives. Secondly, puts forward a new grid division method. In the course of dividing, make sure all grid sizes are equal. The simulation illustrates the efficiency of the proposed algorithm.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133548706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/CIS2018.2018.00117
Ye Wang, Hua Li, Gongbing Shan
This paper demonstrates a continuing task of our previous research. We have implemented a wireless sensor system and applied the wearable sensor device in several training sessions of our university hammer throwers. There is an optical distance sensor used in our previous wireless sensor system. The initial conception is to use the distance sensor to collect the vertical hip displacement. However, through the field tests, it has been found that keeping the distance sensor pointing vertically towards the ground is impossible during a hammer throw performance. Therefore, we propose to use an inertial measurement unit (IMU) as a motion tracking sensor to replace the distance sensor.
{"title":"Acquiring the Distance Data with Inertial Measurement Unit in a Wearable Device for the Training of Hammer Throwers","authors":"Ye Wang, Hua Li, Gongbing Shan","doi":"10.1109/CIS2018.2018.00117","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00117","url":null,"abstract":"This paper demonstrates a continuing task of our previous research. We have implemented a wireless sensor system and applied the wearable sensor device in several training sessions of our university hammer throwers. There is an optical distance sensor used in our previous wireless sensor system. The initial conception is to use the distance sensor to collect the vertical hip displacement. However, through the field tests, it has been found that keeping the distance sensor pointing vertically towards the ground is impossible during a hammer throw performance. Therefore, we propose to use an inertial measurement unit (IMU) as a motion tracking sensor to replace the distance sensor.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122229707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}