This study focuses on the faster exact single pattern string matching algorithms. In all solutions, two variants of BOM, EBOM and FBOM are very efficient. We improved them and presented two algorithms named Simplified-EBOM and Simplified-FBOM through removing the unnecessary branches and accomplishing the core calculation of the algorithm in a 1-dimensional array. The experimental results indicated that Simplified-EBOM is fast for short patterns and it is 12% faster than its basis algorithm on average.
{"title":"Fast Variants of the Backward-Oracle-Marching Algorithm","authors":"Hongbo Fan, Nianmin Yao, Haifeng Ma","doi":"10.1109/ICICSE.2009.53","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.53","url":null,"abstract":"This study focuses on the faster exact single pattern string matching algorithms. In all solutions, two variants of BOM, EBOM and FBOM are very efficient. We improved them and presented two algorithms named Simplified-EBOM and Simplified-FBOM through removing the unnecessary branches and accomplishing the core calculation of the algorithm in a 1-dimensional array. The experimental results indicated that Simplified-EBOM is fast for short patterns and it is 12% faster than its basis algorithm on average.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131474352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article introduces a numerical scheme to simulate aero acoustics propagation. The wave equation is discrete spatially with collocated finite volume method and Eulerian implicit method in time domain. The performance of the PC is greatly developed, so as expected the network can provide great computational capability. Based on this point, we developed a data structure system and parallel code. Two simple test cases have been done with the program and reasonable results were obtained.
{"title":"A Parallel 2D/3D Aero-acoustics Numerical Algorithm and Implementation","authors":"P. Ming, Minggang Zhu, Peng Hou, Wenping Zhang","doi":"10.1109/ICICSE.2009.33","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.33","url":null,"abstract":"This article introduces a numerical scheme to simulate aero acoustics propagation. The wave equation is discrete spatially with collocated finite volume method and Eulerian implicit method in time domain. The performance of the PC is greatly developed, so as expected the network can provide great computational capability. Based on this point, we developed a data structure system and parallel code. Two simple test cases have been done with the program and reasonable results were obtained.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132335755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
How to distinguish abnormal access from normal ones is the key problem in Distribution Denial of service(DDoS) attack detection. This research aims at finding out the major difference between the abnormal access and the normal ones in application layer. To this end, the paper conducts modeling on Web users’ access behaviors based on hidden Markov model(HMM) with multiple chains and puts forward a method to identify abnormal access. Tests on simulation data indicate that this model can undo Web users access to a certain degree and discern the abnormal access well.
{"title":"Access Model of Web Users Based on Multi-chains Hidden Markov Models","authors":"K. Zheng, Yixian Yang, Xiujuan Wang, Shize Guo","doi":"10.1109/ICICSE.2009.34","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.34","url":null,"abstract":"How to distinguish abnormal access from normal ones is the key problem in Distribution Denial of service(DDoS) attack detection. This research aims at finding out the major difference between the abnormal access and the normal ones in application layer. To this end, the paper conducts modeling on Web users’ access behaviors based on hidden Markov model(HMM) with multiple chains and puts forward a method to identify abnormal access. Tests on simulation data indicate that this model can undo Web users access to a certain degree and discern the abnormal access well.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126379294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to resolve the trust problem due to the opening, the dynamics, the anonymity and uncertainty of p2p system, this paper proposes a new p2p trust model by analyzing and improving the subjective logic, a new trust quantification formula with the negative events effect and the time effect is given, and a definition of risk is also presented, By doing this, we can evaluate the trust relationships between peers more precisely and prevent the hidden security dangers of cooperative cheat and slander more effectively, thus can resolve security problems exist in p2p environment more effectively.
{"title":"A Trust Model Based on Subjective Logic","authors":"Wei Gao, Guoyin Zhang, Wei Chen, Yanmei Li","doi":"10.1109/ICICSE.2009.70","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.70","url":null,"abstract":"In order to resolve the trust problem due to the opening, the dynamics, the anonymity and uncertainty of p2p system, this paper proposes a new p2p trust model by analyzing and improving the subjective logic, a new trust quantification formula with the negative events effect and the time effect is given, and a definition of risk is also presented, By doing this, we can evaluate the trust relationships between peers more precisely and prevent the hidden security dangers of cooperative cheat and slander more effectively, thus can resolve security problems exist in p2p environment more effectively.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121169990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Video artificial text detection is a challenging problem of pattern recognition. Current methods which are usually based on edge, texture, connected domain, feature or learning are always limited by size, location, language of artificial text in video. To solve the problems mentioned above, this paper applied SOM (Self-Organizing Map) based on supervised learning to video artificial text detection. First, text features were extracted. And considering the video artificial text's limitations mentioned, artificial text’s location and gradient of each pixel were used as the features which were used to classify. Then three layers supervised SOM was proposed to classify the text and non-text areas in video image. At last, the morphologic operating was used to get a much more accurate result of text area. Experiments showed that this method could locate and detect artificial text area in video efficiently.
{"title":"Apply SOM to Video Artificial Text Area Detection","authors":"Jia Yu, Yan Wang","doi":"10.1109/ICICSE.2009.13","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.13","url":null,"abstract":"Video artificial text detection is a challenging problem of pattern recognition. Current methods which are usually based on edge, texture, connected domain, feature or learning are always limited by size, location, language of artificial text in video. To solve the problems mentioned above, this paper applied SOM (Self-Organizing Map) based on supervised learning to video artificial text detection. First, text features were extracted. And considering the video artificial text's limitations mentioned, artificial text’s location and gradient of each pixel were used as the features which were used to classify. Then three layers supervised SOM was proposed to classify the text and non-text areas in video image. At last, the morphologic operating was used to get a much more accurate result of text area. Experiments showed that this method could locate and detect artificial text area in video efficiently.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116440468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bitmap indices are widely used in massive and read-mostly datasets such as data warehouses and scientific databases. Recently, Bloom filters were used to encode bitmap indices into approximate bitmaps(AB). The salient advantage of this technique is that bitmaps can be directly accessed without decompression, and the query time is proportional in the size of the region being queried. This technique, however, introduces false positives due to the nature of Bloom filters, therefore, only approximate query results can be achieved. To eliminate false positives, we proposed a novel bitmap index encoding scheme, namely cascaded approximate bitmaps(CasAB) based on multi-level Bloom filter cascading, which can achieve precise query results at the cost of slightly more space and time overhead. An efficient CasAB construction algorithm and a query algorithm are given. Space and time complexities of CasAB are analyzed theoretically, and the minimum space size can be pre-computed based on the cardinality of the attribute. Experiments show that the query precision of CasAB is always 100% and space and time overhead is similar to that of AB.
{"title":"CasAB: Building Precise Bitmap Indices via Cascaded Bloom Filters","authors":"Zhuo Wang","doi":"10.1109/ICICSE.2009.19","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.19","url":null,"abstract":"Bitmap indices are widely used in massive and read-mostly datasets such as data warehouses and scientific databases. Recently, Bloom filters were used to encode bitmap indices into approximate bitmaps(AB). The salient advantage of this technique is that bitmaps can be directly accessed without decompression, and the query time is proportional in the size of the region being queried. This technique, however, introduces false positives due to the nature of Bloom filters, therefore, only approximate query results can be achieved. To eliminate false positives, we proposed a novel bitmap index encoding scheme, namely cascaded approximate bitmaps(CasAB) based on multi-level Bloom filter cascading, which can achieve precise query results at the cost of slightly more space and time overhead. An efficient CasAB construction algorithm and a query algorithm are given. Space and time complexities of CasAB are analyzed theoretically, and the minimum space size can be pre-computed based on the cardinality of the attribute. Experiments show that the query precision of CasAB is always 100% and space and time overhead is similar to that of AB.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121247875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hailing Wang, Guisheng Yin, Jing Zhang, Decai Wang, Jian Wang
This paper presents a new mesh simplification algorithm based on edge collapse, it combines surface curvature and quadric error metric, the position of a new vertex for edge collapse depends on multiple-weighted approach. The new algorithm can improve simplification rationality in procedure and preserve important features after simplification. In an addition, we do some experiments with comparing different simplified models, the results show that the new algorithm not only maintains the overall appearance for models, but also obtains better effectiveness.
{"title":"An Efficient Mesh Simplification Algorithm","authors":"Hailing Wang, Guisheng Yin, Jing Zhang, Decai Wang, Jian Wang","doi":"10.1109/ICICSE.2009.42","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.42","url":null,"abstract":"This paper presents a new mesh simplification algorithm based on edge collapse, it combines surface curvature and quadric error metric, the position of a new vertex for edge collapse depends on multiple-weighted approach. The new algorithm can improve simplification rationality in procedure and preserve important features after simplification. In an addition, we do some experiments with comparing different simplified models, the results show that the new algorithm not only maintains the overall appearance for models, but also obtains better effectiveness.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116056702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Spatial concepts conversion in text-to-scene conversion system is one of the essential tasks. This paper provides a hybrid method to instantiate spatial concepts. The hybrid method is on clustering, cognition and rules. The spatial ontology with instantiation by the method is tested in the experiment of object display for natural language, and gets a good result.
{"title":"Spatial Ontology Instantiation for Text-to-Scene Conversion System","authors":"Hanjing Li, X. Xue, Sheng Li, T. Zhao","doi":"10.1109/ICICSE.2009.24","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.24","url":null,"abstract":"Spatial concepts conversion in text-to-scene conversion system is one of the essential tasks. This paper provides a hybrid method to instantiate spatial concepts. The hybrid method is on clustering, cognition and rules. The spatial ontology with instantiation by the method is tested in the experiment of object display for natural language, and gets a good result.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124606533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Correct software cost estimation is important in software engineering. So it is significant to reasonably evaluate current lots of software cost estimation methods and subsequently select the most suitable one. The evaluation framework of software cost estimation methods is brought forward. The framework summarizes all aspects that should be considered by estimation methods. Fuzzy-Grey comprehensive evaluation method which combines fuzzy evaluation and grey theory is used in the evaluation model of software cost estimation methods. It can make full use of fuzziness and grayness of evaluation information by experts which makes the evaluation more objective and accurate. Eventually, through an example the evaluation model is proved to be useful and feasible in software development project practice.
{"title":"Evaluation Model of Software Cost Estimation Methods Based on Fuzzy-Grey Theory","authors":"Bingzi Zhang, Rubo Zhang","doi":"10.1109/ICICSE.2009.63","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.63","url":null,"abstract":"Correct software cost estimation is important in software engineering. So it is significant to reasonably evaluate current lots of software cost estimation methods and subsequently select the most suitable one. The evaluation framework of software cost estimation methods is brought forward. The framework summarizes all aspects that should be considered by estimation methods. Fuzzy-Grey comprehensive evaluation method which combines fuzzy evaluation and grey theory is used in the evaluation model of software cost estimation methods. It can make full use of fuzziness and grayness of evaluation information by experts which makes the evaluation more objective and accurate. Eventually, through an example the evaluation model is proved to be useful and feasible in software development project practice.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116487985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Image segmentation plays an important role in both qualitative and quantitative analysis of medical ultrasound images. But the performance of the classical image-segmentation techniques degrades severely when they are applied to segment medical ultrasound images, for medical ultrasound images have features of poor contrast and strong speckle noise. Firstly, this article investigates and compiles some of the techniques mostly used in the segmentation of medical ultrasound images. Then a bibliographical survey of current research of medical ultrasound images segmentation is given in this paper. Finally, the general tendencies of medical ultrasound images segmentation are presented.
{"title":"General Tendencies in Segmentation of Medical Ultrasound Images","authors":"Changming Zhu, Jun Ni, Yan-bo Li, Guochang Gu","doi":"10.1109/ICICSE.2009.71","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.71","url":null,"abstract":"Image segmentation plays an important role in both qualitative and quantitative analysis of medical ultrasound images. But the performance of the classical image-segmentation techniques degrades severely when they are applied to segment medical ultrasound images, for medical ultrasound images have features of poor contrast and strong speckle noise. Firstly, this article investigates and compiles some of the techniques mostly used in the segmentation of medical ultrasound images. Then a bibliographical survey of current research of medical ultrasound images segmentation is given in this paper. Finally, the general tendencies of medical ultrasound images segmentation are presented.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130754292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}