首页 > 最新文献

2009 Fourth International Conference on Internet Computing for Science and Engineering最新文献

英文 中文
Speckle Noise Suppression Techniques for Ultrasound Images 超声图像的斑点噪声抑制技术
Changming Zhu, Jun Ni, Yan-bo Li, Guochang Gu
Speckle is a multiplicative noise that degrades the visual evaluation in ultrasound imaging. In medical ultrasound image processing, speckle noise suppression has become a very essential exercise for diagnose. The recent advancements in ultrasound devices necessitate the need of more robust despeckling techniques for enhancing ultrasound medical imaging in routine clinical practice. Many denoising techniques have been proposed for effective suppression of speckle noise. This paper compiles the performance of various techniques in medical B-mode ultrasound images.
斑点是一种乘性噪声,降低了超声成像的视觉评价。在医学超声图像处理中,斑点噪声抑制已成为诊断中必不可少的一项工作。近年来超声设备的发展需要更强大的消斑技术来增强超声医学成像在常规临床实践中的应用。为了有效地抑制散斑噪声,人们提出了许多去噪技术。本文整理了各种技术在医学b超图像中的表现。
{"title":"Speckle Noise Suppression Techniques for Ultrasound Images","authors":"Changming Zhu, Jun Ni, Yan-bo Li, Guochang Gu","doi":"10.1109/ICICSE.2009.26","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.26","url":null,"abstract":"Speckle is a multiplicative noise that degrades the visual evaluation in ultrasound imaging. In medical ultrasound image processing, speckle noise suppression has become a very essential exercise for diagnose. The recent advancements in ultrasound devices necessitate the need of more robust despeckling techniques for enhancing ultrasound medical imaging in routine clinical practice. Many denoising techniques have been proposed for effective suppression of speckle noise. This paper compiles the performance of various techniques in medical B-mode ultrasound images.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"5 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131958131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Data Cache Strategy Based on Colony Algorithm in Mobile Computing Environment 移动计算环境下基于群体算法的数据缓存策略
Yan Chu, Jianpei Zhang, C. Zhao
In mobile computing environments, the limited bandwidth of wireless communications, the weak capability of mobile computing equipments and the valuable power make it difficult for mobile devices to be maintained with the network all the time. Cache technique caches part of data in the clients to reduce the query of database server, so it solves the problem to some extent. Research on cache strategy for mobile computing environment has become an important research direction. Based on the analysis of existing cache strategy, we studied the cache strategy based on mobile agent further. In order to make Mobile Agents have the real and effective collaboration and not limited reference to the conceptual level, we use the ant colony algorithm to propose the data cache strategy based on ant colony algorithm. Finally, we give the experiment to show the superiority.
在移动计算环境下,无线通信的带宽有限,移动计算设备的能力较弱,功耗昂贵,使得移动设备难以随时与网络保持联系。缓存技术通过在客户端缓存部分数据,减少对数据库服务器的查询,在一定程度上解决了这个问题。移动计算环境下的缓存策略研究已成为一个重要的研究方向。在分析现有缓存策略的基础上,进一步研究了基于移动代理的缓存策略。为了使移动代理具有真实有效的协作,而不局限于概念层面的参考,我们利用蚁群算法提出了基于蚁群算法的数据缓存策略。最后通过实验证明了该方法的优越性。
{"title":"Data Cache Strategy Based on Colony Algorithm in Mobile Computing Environment","authors":"Yan Chu, Jianpei Zhang, C. Zhao","doi":"10.1109/ICICSE.2009.60","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.60","url":null,"abstract":"In mobile computing environments, the limited bandwidth of wireless communications, the weak capability of mobile computing equipments and the valuable power make it difficult for mobile devices to be maintained with the network all the time. Cache technique caches part of data in the clients to reduce the query of database server, so it solves the problem to some extent. Research on cache strategy for mobile computing environment has become an important research direction. Based on the analysis of existing cache strategy, we studied the cache strategy based on mobile agent further. In order to make Mobile Agents have the real and effective collaboration and not limited reference to the conceptual level, we use the ant colony algorithm to propose the data cache strategy based on ant colony algorithm. Finally, we give the experiment to show the superiority.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123797212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ontology Security Strategy of Security Data Integrity 安全数据完整性的本体安全策略
Yulong Meng, Guisheng Yin, Ke Geng
There exists a variety of heterogeneous data that need to be integrated within a secure domain. How to integrate the security data from various data source safely is a challenge for database researchers. In this paper, we introduce a new model for security data integrity, Weight-value-Extended MLS (WEMLS), which is development based on MLS. Compared with MLS, WEMLS can not only guarantee the security and integrity of data accessing, but also provide a more flexible mechanism for data accessing. Finally, WEMLS has been verified by proposing a security data integration model based on ontology.
存在各种各样需要集成到安全域中的异构数据。如何安全地集成来自不同数据源的安全数据是数据库研究人员面临的一个挑战。本文介绍了一种新的安全数据完整性模型,即权重值扩展MLS (Weight-value-Extended MLS, WEMLS)。与MLS相比,WEMLS不仅可以保证数据访问的安全性和完整性,还提供了更灵活的数据访问机制。最后,提出了一种基于本体的安全数据集成模型,对WEMLS进行了验证。
{"title":"Ontology Security Strategy of Security Data Integrity","authors":"Yulong Meng, Guisheng Yin, Ke Geng","doi":"10.1109/ICICSE.2009.43","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.43","url":null,"abstract":"There exists a variety of heterogeneous data that need to be integrated within a secure domain. How to integrate the security data from various data source safely is a challenge for database researchers. In this paper, we introduce a new model for security data integrity, Weight-value-Extended MLS (WEMLS), which is development based on MLS. Compared with MLS, WEMLS can not only guarantee the security and integrity of data accessing, but also provide a more flexible mechanism for data accessing. Finally, WEMLS has been verified by proposing a security data integration model based on ontology.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115215398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Localization Method for Spatial Information Grid in Underwater Environments 水下环境下空间信息网格的定位方法
Zhe Zhang, Min Song, Daxin Liu, Hongbin Wang
Position information is important for spatial information grids. In accurate position of datum may lead to mistake decisions or even disastrous actions. In this paper, we study the problem of localization for spatial information grid in underwater environments. There are many challenges facing the localization in underwater environments, because the unavailability of radio frequency. Besides, there are various uncontrolled effects disturbing distance estimation, hence degrades the accuracy of localization in underwater environments. We devise a new method to map distance information to measurement error in a virtual frame composed with beacons. Furthermore, we propose a linear transformation to infer the measurement error by which appropriate adjustments can be obtained to make accurate distance estimation. Simulation result show that the method proposed in this paper outperforms DV-Distance, especially when the number of beacons is low.
位置信息是空间信息网格的重要组成部分。在准确的基准位置可能导致错误的决定,甚至灾难性的行动。本文研究了水下环境下空间信息网格的定位问题。由于无线电频率的不可用性,水下环境下的定位面临着许多挑战。此外,在水下环境中,有各种不受控制的影响干扰距离估计,从而降低了定位精度。我们设计了一种在由信标组成的虚拟帧中,将距离信息映射到测量误差的新方法。此外,我们提出了一种线性变换来推断测量误差,通过适当的调整可以得到准确的距离估计。仿真结果表明,本文提出的方法优于DV-Distance算法,特别是在信标数较低的情况下。
{"title":"A Localization Method for Spatial Information Grid in Underwater Environments","authors":"Zhe Zhang, Min Song, Daxin Liu, Hongbin Wang","doi":"10.1109/ICICSE.2009.47","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.47","url":null,"abstract":"Position information is important for spatial information grids. In accurate position of datum may lead to mistake decisions or even disastrous actions. In this paper, we study the problem of localization for spatial information grid in underwater environments. There are many challenges facing the localization in underwater environments, because the unavailability of radio frequency. Besides, there are various uncontrolled effects disturbing distance estimation, hence degrades the accuracy of localization in underwater environments. We devise a new method to map distance information to measurement error in a virtual frame composed with beacons. Furthermore, we propose a linear transformation to infer the measurement error by which appropriate adjustments can be obtained to make accurate distance estimation. Simulation result show that the method proposed in this paper outperforms DV-Distance, especially when the number of beacons is low.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129470602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topology Awareness on Network Damage Assessment and Control Strategies Generation 基于拓扑感知的网络损伤评估与控制策略生成
Hui He, Hongli Zhang, Lihua Yin, Yongtan Liu
Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control and reduce damage done by a large-scale attack such as worm or DDOS attacks. Our work focuses on large network while previous works focuse on LANs. We proposed rules to choose these routers based on the network topology and based on risk assessment. Many topological factors are considered into the control strategy process, the control router sets selecting algorithm based on entropy was put forward. According to the incidents distribution on the topology, the factor of macroscopic epidemic status is proposed by the method of quantitative and qualitative analysis, which offers administrators the direct decisive advice to prevent network security event from overspreading and minimize the costs. At last, the experiment effectively proved the evaluation framework and the control algorithm.
面对大规模网络攻击的威胁,为了减轻网络攻击带来的进一步危害,应急响应具有重要意义。为了实现合理的控制策略,需要在网络中计算出最小的路由器数量,以控制和减少大规模攻击(如蠕虫攻击或DDOS攻击)所造成的破坏。我们的工作重点是大型网络,而以往的工作主要集中在局域网。提出了基于网络拓扑结构和风险评估的路由器选择规则。在控制策略过程中考虑了多种拓扑因素,提出了基于熵的控制路由器集选择算法。根据网络安全事件在拓扑上的分布情况,采用定量和定性分析相结合的方法,提出了宏观疫情因素,为管理者提供了直接的决策建议,以防止网络安全事件的过度蔓延,使成本最小化。最后,通过实验验证了评价框架和控制算法的有效性。
{"title":"Topology Awareness on Network Damage Assessment and Control Strategies Generation","authors":"Hui He, Hongli Zhang, Lihua Yin, Yongtan Liu","doi":"10.1109/ICICSE.2009.50","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.50","url":null,"abstract":"Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control and reduce damage done by a large-scale attack such as worm or DDOS attacks. Our work focuses on large network while previous works focuse on LANs. We proposed rules to choose these routers based on the network topology and based on risk assessment. Many topological factors are considered into the control strategy process, the control router sets selecting algorithm based on entropy was put forward. According to the incidents distribution on the topology, the factor of macroscopic epidemic status is proposed by the method of quantitative and qualitative analysis, which offers administrators the direct decisive advice to prevent network security event from overspreading and minimize the costs. At last, the experiment effectively proved the evaluation framework and the control algorithm.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115014248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Content-Based Self-Feedback E-government Network Security Model 基于内容的自反馈电子政务网络安全模型
Songzhu Xia, Jianpei Zhang, Jing Yang, Jun Ni
Based on the theories of the intrusion trapping and natural language understanding, oriented e-government affairs security issues, this paper proposed a content-based self-feedback model at the point of attackers. By this model, the concrete information under attacking can be focused and the attack methods would be ignored in a standard honey trap. With the supporting of honey nets, The target sensitivity is taken as the appraisement factor to demonstrate whether the information need be protected. Through adjusting the primitive feedback coefficients of the model, we can know the most important information as the attackers focusing on. At the same time, this paper introduced the concept of domain coefficients of the model. Through the experiments in the actual networks, it is the first successful model being of the prediction and feedback for e-government affairs.
基于入侵陷阱理论和自然语言理解理论,针对电子政务安全问题,提出了一种基于内容的攻击点自反馈模型。通过该模型,可以集中攻击的具体信息,而忽略标准美人计中的攻击方法。在蜜网的支持下,以目标灵敏度作为评价因子来评价信息是否需要保护。通过调整模型的原始反馈系数,我们可以知道攻击者关注的最重要信息。同时,引入了模型域系数的概念。通过在实际网络中的实验,该模型是第一个成功的电子政务预测与反馈模型。
{"title":"A Content-Based Self-Feedback E-government Network Security Model","authors":"Songzhu Xia, Jianpei Zhang, Jing Yang, Jun Ni","doi":"10.1109/ICICSE.2009.28","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.28","url":null,"abstract":"Based on the theories of the intrusion trapping and natural language understanding, oriented e-government affairs security issues, this paper proposed a content-based self-feedback model at the point of attackers. By this model, the concrete information under attacking can be focused and the attack methods would be ignored in a standard honey trap. With the supporting of honey nets, The target sensitivity is taken as the appraisement factor to demonstrate whether the information need be protected. Through adjusting the primitive feedback coefficients of the model, we can know the most important information as the attackers focusing on. At the same time, this paper introduced the concept of domain coefficients of the model. Through the experiments in the actual networks, it is the first successful model being of the prediction and feedback for e-government affairs.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115266219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Chromatic Statistical Landscape Features for Retrieval of Color Textured Images 用于彩色纹理图像检索的彩色统计景观特征
C. Xu, Xian Tong Zhen
This paper proposes a new texture description method named Chromatic Statistical Landscape Features(CSLF) for color images. The pro-hue pseudo intensity imageis extracted from a color image based on pro-hue pseudo function which measures the degree of a color containing the amount of the reference color component of hue. Besides prohue pseudo intensity image, the separate chromatic components saturation and intensity of a color image are also equivalent to two gray images. The graph of a gray image function is a rumpled surface appearing like a landscape, from which six novel texture feature curves are derived. In this way, eighteen feature curves can be obtained from the three gray images. The proposed Chromatic Statistical Landscape Features uses these eighteen feature curves to characterize the color texture and has been shown by systematic experiments to offer very high retrieval performance on the VisTex texture collection.
提出了一种新的彩色图像纹理描述方法——彩色统计景观特征(Chromatic Statistical Landscape Features, CSLF)。基于pro-hue伪函数从彩色图像中提取pro-hue伪强度图像,该函数测量包含参考颜色分量的颜色的程度。除了伪强度图像外,彩色图像的单独色度分量饱和度和强度也相当于两幅灰度图像。灰度图像函数的图形是一个像风景一样的皱褶表面,从中导出了六条新的纹理特征曲线。这样可以从三幅灰度图像中得到18条特征曲线。所提出的彩色统计景观特征使用这18条特征曲线来表征颜色纹理,并通过系统的实验证明,在VisTex纹理集合上提供了非常高的检索性能。
{"title":"Chromatic Statistical Landscape Features for Retrieval of Color Textured Images","authors":"C. Xu, Xian Tong Zhen","doi":"10.1109/ICICSE.2009.12","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.12","url":null,"abstract":"This paper proposes a new texture description method named Chromatic Statistical Landscape Features(CSLF) for color images. The pro-hue pseudo intensity imageis extracted from a color image based on pro-hue pseudo function which measures the degree of a color containing the amount of the reference color component of hue. Besides prohue pseudo intensity image, the separate chromatic components saturation and intensity of a color image are also equivalent to two gray images. The graph of a gray image function is a rumpled surface appearing like a landscape, from which six novel texture feature curves are derived. In this way, eighteen feature curves can be obtained from the three gray images. The proposed Chromatic Statistical Landscape Features uses these eighteen feature curves to characterize the color texture and has been shown by systematic experiments to offer very high retrieval performance on the VisTex texture collection.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128145115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Adaptive Traffic Sampling Method for Anomaly Detection 一种自适应流量采样异常检测方法
Xiaobing He, Wu Yang, Qing Wang
The random packet sampling method is the simplest methodology for reducing the amount of packets that the network monitoring system has to process. However, the accuracy of anomaly detection is affected by the fact that this method biases a large IP flow. In order to reduce the impact of sampled traffic on network anomaly detecting, an adaptive traffic sampling method is proposed. This method is developed based on time stratification. Our adaptive method lies in an innovative scheme. It divides time into strata and then samples an incoming packet with a probalility, which is a decreasing function f of the predicted size of the flow the packet belongs to. Instead of data streaming algorithms, we use packet samples and a sampling probability to estimate flow size, thus to save resources. A force sampling is also employed to increase the accuracy of estimation of smaller flows. Experiments results show that our scheme is more accurate than traditional random packet sampling for estimating anomalous traffic, thus the performance of anomalous detecting is improved.
随机数据包抽样方法是减少网络监控系统必须处理的数据包数量的最简单的方法。然而,该方法存在较大的IP流偏差,影响了异常检测的准确性。为了减少采样流量对网络异常检测的影响,提出了一种自适应流量采样方法。该方法是基于时间分层的。我们的适应性方法在于一个创新的方案。它将时间分成不同的层,然后对传入的数据包进行概率采样,概率是数据包所属流预测大小的递减函数f。我们没有使用数据流算法,而是使用数据包样本和采样概率来估计流量大小,从而节省资源。为了提高小流量的估计精度,还采用了力采样。实验结果表明,该方法比传统的随机分组采样方法更准确地估计了异常流量,从而提高了异常检测的性能。
{"title":"An Adaptive Traffic Sampling Method for Anomaly Detection","authors":"Xiaobing He, Wu Yang, Qing Wang","doi":"10.1109/ICICSE.2009.32","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.32","url":null,"abstract":"The random packet sampling method is the simplest methodology for reducing the amount of packets that the network monitoring system has to process. However, the accuracy of anomaly detection is affected by the fact that this method biases a large IP flow. In order to reduce the impact of sampled traffic on network anomaly detecting, an adaptive traffic sampling method is proposed. This method is developed based on time stratification. Our adaptive method lies in an innovative scheme. It divides time into strata and then samples an incoming packet with a probalility, which is a decreasing function f of the predicted size of the flow the packet belongs to. Instead of data streaming algorithms, we use packet samples and a sampling probability to estimate flow size, thus to save resources. A force sampling is also employed to increase the accuracy of estimation of smaller flows. Experiments results show that our scheme is more accurate than traditional random packet sampling for estimating anomalous traffic, thus the performance of anomalous detecting is improved.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132495474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Formal Method for Verifying Production Knowledge Base 生产知识库验证的形式化方法
Hongtao Huang, Shaobin Huang, Tao Zhang
The most important thing of using model checking technology to verify production knowledge base is to build system model from rule set. It is a fundamental but time-consuming job. This paper presents an efficient formal method to verify production knowledge base. Two main contributions of this paper are as follows. Firstly, we propose a dynamic modeling method to build system model of knowledge base, this method utilizes the dynamic procedural nature of production rule to build system model, and it improves the modeling efficiency significantly; Secondly, a conditional transition system based on the standard transition system is given to represent system model, our conditional transition system contains the whole information about the actual state transition process, which solves the information loss problem of the static transition system built by static modeling method and improves the efficiency of error diagnosis.
利用模型检查技术对生产知识库进行验证,最重要的是根据规则集建立系统模型。这是一项基本但耗时的工作。本文提出了一种有效的形式化方法来验证生产知识库。本文的两个主要贡献如下。首先,提出了一种建立知识库系统模型的动态建模方法,该方法利用生产规则的动态程序性来建立系统模型,显著提高了建模效率;其次,在标准转换系统的基础上给出了一个条件转换系统来表示系统模型,我们的条件转换系统包含了实际状态转换过程的全部信息,解决了采用静态建模方法构建的静态转换系统的信息丢失问题,提高了错误诊断的效率。
{"title":"A Formal Method for Verifying Production Knowledge Base","authors":"Hongtao Huang, Shaobin Huang, Tao Zhang","doi":"10.1109/ICICSE.2009.14","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.14","url":null,"abstract":"The most important thing of using model checking technology to verify production knowledge base is to build system model from rule set. It is a fundamental but time-consuming job. This paper presents an efficient formal method to verify production knowledge base. Two main contributions of this paper are as follows. Firstly, we propose a dynamic modeling method to build system model of knowledge base, this method utilizes the dynamic procedural nature of production rule to build system model, and it improves the modeling efficiency significantly; Secondly, a conditional transition system based on the standard transition system is given to represent system model, our conditional transition system contains the whole information about the actual state transition process, which solves the information loss problem of the static transition system built by static modeling method and improves the efficiency of error diagnosis.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intelligent Image Identification to Human Cells 人体细胞的智能图像识别
Duan Jun, Zhao Yang, J. Ni
the paper presents an image processing, aiming at understanding and exploring the image identification technology for human cells. The paper reports several algorithm improvements in the processing including the Gauss-Laplace algorithm that makes image of human cells be identified effectively, and combination of texture match that using pixels statistics method makes several algorithms together. With the consideration of the precision of image recognition, we combine image texture characteristics with other image processing technology. The texture characteristics of human cells are considered as specific information to be added in the knowledge-based biological systems. The knowledge reasoning is introduced and knowledge storage is established using artificial intelligence process of identifying the human cells
本文提出了一种图像处理方法,旨在理解和探索人体细胞的图像识别技术。本文报道了几种算法在处理上的改进,包括高斯-拉普拉斯算法使人体细胞图像得到有效的识别,以及结合像素统计方法的纹理匹配使几种算法结合在一起。考虑到图像识别的精度,我们将图像纹理特征与其他图像处理技术相结合。人类细胞的纹理特征被认为是在基于知识的生物系统中添加的特定信息。引入知识推理,利用人工智能识别人体细胞的过程建立知识存储
{"title":"Intelligent Image Identification to Human Cells","authors":"Duan Jun, Zhao Yang, J. Ni","doi":"10.1109/ICICSE.2009.40","DOIUrl":"https://doi.org/10.1109/ICICSE.2009.40","url":null,"abstract":"the paper presents an image processing, aiming at understanding and exploring the image identification technology for human cells. The paper reports several algorithm improvements in the processing including the Gauss-Laplace algorithm that makes image of human cells be identified effectively, and combination of texture match that using pixels statistics method makes several algorithms together. With the consideration of the precision of image recognition, we combine image texture characteristics with other image processing technology. The texture characteristics of human cells are considered as specific information to be added in the knowledge-based biological systems. The knowledge reasoning is introduced and knowledge storage is established using artificial intelligence process of identifying the human cells","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130360572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 Fourth International Conference on Internet Computing for Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1