Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6309082
Wu Yuntian
Machine learning and data mining is a powerful tool of the analysis of massive data, is emerging interdisciplinary of computer science and statistics, which plays an important role in the front field of modern science and technology. Introduction of machine learning information technology, further expounds the contact of the machine learning and data mining. Stratified discusses the meaning of data mining, in view of the different professions and different areas, points out how to use the data mining technology, give play to the role of machine learning. The emphasis is on data gathered information, use data information, and development data information resources.
{"title":"Based on Machine Learning of Data Mining to Further Explore","authors":"Wu Yuntian","doi":"10.1109/CSIP.2012.6309082","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6309082","url":null,"abstract":"Machine learning and data mining is a powerful tool of the analysis of massive data, is emerging interdisciplinary of computer science and statistics, which plays an important role in the front field of modern science and technology. Introduction of machine learning information technology, further expounds the contact of the machine learning and data mining. Stratified discusses the meaning of data mining, in view of the different professions and different areas, points out how to use the data mining technology, give play to the role of machine learning. The emphasis is on data gathered information, use data information, and development data information resources.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115215549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6308924
Hong Zheng, Wu Lifa, Li Huabo, Pan Fan
To curb worm spread, it is vital to detect worms in time and restrict the victims' network behavior effectively. A worm detection and containment system for local networks is proposed. Normal service requests are characterized with the self-set, which is applied to monitor for suspicious service requests. The system correlates the suspicious service requests in the form of binary trees, and binary trees' anomaly values are monitored for worm attacks. Possible worm victims are determined from the binary trees. Based on the self-set, the worm victims' normal traffic is permitted while their worm activities are strictly contained. Experiments show the system contains worms effectively, and the detrimental effect of the system's deployment on normal network traffic is negligible.
{"title":"Worm detection and containment in local networks","authors":"Hong Zheng, Wu Lifa, Li Huabo, Pan Fan","doi":"10.1109/CSIP.2012.6308924","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6308924","url":null,"abstract":"To curb worm spread, it is vital to detect worms in time and restrict the victims' network behavior effectively. A worm detection and containment system for local networks is proposed. Normal service requests are characterized with the self-set, which is applied to monitor for suspicious service requests. The system correlates the suspicious service requests in the form of binary trees, and binary trees' anomaly values are monitored for worm attacks. Possible worm victims are determined from the binary trees. Based on the self-set, the worm victims' normal traffic is permitted while their worm activities are strictly contained. Experiments show the system contains worms effectively, and the detrimental effect of the system's deployment on normal network traffic is negligible.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114548993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6309027
Jing Shao, Guanxiang Wang, W. Guo
In this paper, an image-based flame pixel detection method is proposed. Based on detailed observation of the color distribution in RGB space, an algorithm to extract the candidate flame pixels is proposed. After removing the falsely extracted fire-like pixels, we restore the mistakenly removed flame faults and holes and reconstruct the flame region. The experimental results are compared with other methods. It shows a higher accuracy and robustness of fire detection by our proposed method. A high accuracy is necessary and important for the next step to detect fire dynamic features.
{"title":"An image-based fire detection method using color analysis","authors":"Jing Shao, Guanxiang Wang, W. Guo","doi":"10.1109/CSIP.2012.6309027","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6309027","url":null,"abstract":"In this paper, an image-based flame pixel detection method is proposed. Based on detailed observation of the color distribution in RGB space, an algorithm to extract the candidate flame pixels is proposed. After removing the falsely extracted fire-like pixels, we restore the mistakenly removed flame faults and holes and reconstruct the flame region. The experimental results are compared with other methods. It shows a higher accuracy and robustness of fire detection by our proposed method. A high accuracy is necessary and important for the next step to detect fire dynamic features.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114243527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6308926
L. Jun, Qiao Hua, Li Yan
Aiming to the disadvantage of the short lifetime due to the uneven distribution of the cluster head, and single-hop path communication style in the LEACH protocol. By analyzing the classic clumps and routing protocol LEACH, and changing the way of producing cluster head and the communication way between the base station, the modified algorithm reduces the setup time and the cluster head communication distance and balances the node energy consumption. The simulation results showed that the modified algorithm had efficiently reduced energy consumption of wireless sensor network nodes, and made survival time of network much longer than traditional LEACH algorithm.
{"title":"A modified LEACH algorithm in wireless sensor network based on NS2","authors":"L. Jun, Qiao Hua, Li Yan","doi":"10.1109/CSIP.2012.6308926","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6308926","url":null,"abstract":"Aiming to the disadvantage of the short lifetime due to the uneven distribution of the cluster head, and single-hop path communication style in the LEACH protocol. By analyzing the classic clumps and routing protocol LEACH, and changing the way of producing cluster head and the communication way between the base station, the modified algorithm reduces the setup time and the cluster head communication distance and balances the node energy consumption. The simulation results showed that the modified algorithm had efficiently reduced energy consumption of wireless sensor network nodes, and made survival time of network much longer than traditional LEACH algorithm.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114595417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6308836
Zhu Yu, Liu Yanjuan
As RFID (Radio Frequency Identification) technology plays an important role in IOT (Internet of Things), the research of intelligent bus-mounted system based on RFID is a hotspot to solve the traffic problems in recent years. This paper innovatively utilizes the embedded technology and RFID technology in the intelligent bus-mounted system, focuses on the working principle of RFID and anti-collision mechanism. This design uses ARM920T as core processor, and transplants Embedded Linux operating system into it, combined with special RF transmission and reception chips CC1100 to realize many kinds of function for buses, such as support traffic flow statistics, automatic broadcasting, buses real-time monitoring and intelligent scheduling. This system will be widely used and can meet the requirements of intelligent transportation.
{"title":"Intelligent bus-mounted system based on RFID","authors":"Zhu Yu, Liu Yanjuan","doi":"10.1109/CSIP.2012.6308836","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6308836","url":null,"abstract":"As RFID (Radio Frequency Identification) technology plays an important role in IOT (Internet of Things), the research of intelligent bus-mounted system based on RFID is a hotspot to solve the traffic problems in recent years. This paper innovatively utilizes the embedded technology and RFID technology in the intelligent bus-mounted system, focuses on the working principle of RFID and anti-collision mechanism. This design uses ARM920T as core processor, and transplants Embedded Linux operating system into it, combined with special RF transmission and reception chips CC1100 to realize many kinds of function for buses, such as support traffic flow statistics, automatic broadcasting, buses real-time monitoring and intelligent scheduling. This system will be widely used and can meet the requirements of intelligent transportation.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117310499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6309074
Hongliang Li
From the organization transmission, media operation has multiple functions. From a micro-layer, media operation provides various services to the media and coordinates the relationship between the game organizer and the media. From a macro-layer, media operation is to build the image of the game organizer in different circumstances and protect the game organizer. Sports Media Operation System of Beijing Olympic Games should have a clear organization structure, clarify the responsibilities and tasks, and build good relationship with relevant department. During the construction and development process of Sports Media Operation System of Beijing Olympic Games, the successful experience of foreign SID and past Olympic Games media operations has been fully absorbed and the unsuccessful lessons have been learned. Combining with the specific national conditions of Beijing Olympic Games and the self characteristics of media operation, a highly-efficient Sports Media Operation System of Beijing Olympic Games is constructed. It is suggested that the study and demonstration of Sports Media Operation System of Beijing Olympic Games should be enhanced.
{"title":"Study on the media operation provision system (SID) in Beijing Olympic Games","authors":"Hongliang Li","doi":"10.1109/CSIP.2012.6309074","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6309074","url":null,"abstract":"From the organization transmission, media operation has multiple functions. From a micro-layer, media operation provides various services to the media and coordinates the relationship between the game organizer and the media. From a macro-layer, media operation is to build the image of the game organizer in different circumstances and protect the game organizer. Sports Media Operation System of Beijing Olympic Games should have a clear organization structure, clarify the responsibilities and tasks, and build good relationship with relevant department. During the construction and development process of Sports Media Operation System of Beijing Olympic Games, the successful experience of foreign SID and past Olympic Games media operations has been fully absorbed and the unsuccessful lessons have been learned. Combining with the specific national conditions of Beijing Olympic Games and the self characteristics of media operation, a highly-efficient Sports Media Operation System of Beijing Olympic Games is constructed. It is suggested that the study and demonstration of Sports Media Operation System of Beijing Olympic Games should be enhanced.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115797435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6309116
Linna Huang, Guangzhong Liu
On the basis of the concept of right-shell-tree and left-shell-tree, a fast convex hull algorithm for scattered points based on a binary tree is put forward. It can dynamically reduce the scale of scattered point rapidly by removing a number of non-convex hull vertexes while finding each convex hull vertex. Normally, it can achieve linear time complexity. The algorithm obviates the judging process of the convex hull vertices' connected relation. It is applicable to any complex scattered points, and simple and easy to achieve.
{"title":"Proved quick convex hull algorithm for scattered points","authors":"Linna Huang, Guangzhong Liu","doi":"10.1109/CSIP.2012.6309116","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6309116","url":null,"abstract":"On the basis of the concept of right-shell-tree and left-shell-tree, a fast convex hull algorithm for scattered points based on a binary tree is put forward. It can dynamically reduce the scale of scattered point rapidly by removing a number of non-convex hull vertexes while finding each convex hull vertex. Normally, it can achieve linear time complexity. The algorithm obviates the judging process of the convex hull vertices' connected relation. It is applicable to any complex scattered points, and simple and easy to achieve.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115494285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6308957
J. Jiao, Huan Yu, Lu Wang, Zhanpeng Xia
This paper proposes an optimization scheme with regard to camping along the Colorado River, relevant data comes from MCM(The mathematical contest in modeling)2012[1], problem B. With purpose of precise formulation for the drifting-tour on the Colorado River[2], a multi-objective optimizing model is established with consideration of 4 factors. In particular, an intelligent match-search algorithm is designed to figure out the model solution. A series of flexible-pattern drifting approaches are finally worked out with the simulation and available for crafting-customers to select the crafting method. In the end, Robustness Analysis is completed as to verify the scheme.
本文针对Colorado River沿河露营提出了一种优化方案,相关数据来源于MCM(the mathematical contest in modeling)2012[1],问题b。为精确制定Colorado River漂流游[2],建立了考虑4个因素的多目标优化模型。特别地,设计了一种智能匹配搜索算法来求解模型解。最后通过仿真得到了一系列柔性漂移方法,可供加工客户选择加工方法。最后,通过鲁棒性分析对方案进行了验证。
{"title":"An optimization scheme for camping along Colorado River of crafting-trip","authors":"J. Jiao, Huan Yu, Lu Wang, Zhanpeng Xia","doi":"10.1109/CSIP.2012.6308957","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6308957","url":null,"abstract":"This paper proposes an optimization scheme with regard to camping along the Colorado River, relevant data comes from MCM(The mathematical contest in modeling)2012[1], problem B. With purpose of precise formulation for the drifting-tour on the Colorado River[2], a multi-objective optimizing model is established with consideration of 4 factors. In particular, an intelligent match-search algorithm is designed to figure out the model solution. A series of flexible-pattern drifting approaches are finally worked out with the simulation and available for crafting-customers to select the crafting method. In the end, Robustness Analysis is completed as to verify the scheme.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"395 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123247645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6308871
Yanyan Qu, Zhengxiang Li
Based on the Digital Radio Mondiale(DRM) System specification, symbol timing and fractional frequency offset estimation for DRM receiving signal are achieved with the aid of cyclic prefix within the OFDM symbols. The redundancy of the signal is exploited without extra auxiliary data. The algorithm can work well with less bandwidth especially in capturing stage of symbol synchronization and tracking stage of frequency synchronization.
{"title":"Research on frequency and timing synchronization for orthogonal frequency division multiplexing in DRM System","authors":"Yanyan Qu, Zhengxiang Li","doi":"10.1109/CSIP.2012.6308871","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6308871","url":null,"abstract":"Based on the Digital Radio Mondiale(DRM) System specification, symbol timing and fractional frequency offset estimation for DRM receiving signal are achieved with the aid of cyclic prefix within the OFDM symbols. The redundancy of the signal is exploited without extra auxiliary data. The algorithm can work well with less bandwidth especially in capturing stage of symbol synchronization and tracking stage of frequency synchronization.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123726032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-24DOI: 10.1109/CSIP.2012.6309069
Cai Qiu-ru, L. Ye, Xi Haixu, Liu Yijun, Guangping Zhu
Telecom industry is a typical data-intensive industry where data mining applications will enable a good guidance on marketing strategies, and the cluster analysis can be used in customer segmentation. The paper makes a detailed and comprehensive analysis of classic K-means clustering algorithm, and proposes the modeling process for telecom customer segmentation according to the principle of the algorithm. A resolution of customer segmentation for the Changzhou telecom in Jiangsu province is proposed, and practical results show that the clustering technology based on the K-means method provides an effective and successful resolution of customer segmentation for Telecom, bringing services closer to the customers.
{"title":"Telecom customer segmentation based on cluster analysis","authors":"Cai Qiu-ru, L. Ye, Xi Haixu, Liu Yijun, Guangping Zhu","doi":"10.1109/CSIP.2012.6309069","DOIUrl":"https://doi.org/10.1109/CSIP.2012.6309069","url":null,"abstract":"Telecom industry is a typical data-intensive industry where data mining applications will enable a good guidance on marketing strategies, and the cluster analysis can be used in customer segmentation. The paper makes a detailed and comprehensive analysis of classic K-means clustering algorithm, and proposes the modeling process for telecom customer segmentation according to the principle of the algorithm. A resolution of customer segmentation for the Changzhou telecom in Jiangsu province is proposed, and practical results show that the clustering technology based on the K-means method provides an effective and successful resolution of customer segmentation for Telecom, bringing services closer to the customers.","PeriodicalId":193335,"journal":{"name":"2012 International Conference on Computer Science and Information Processing (CSIP)","volume":"422 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122916342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}