In cloud computing, an energy efficient resource allocation problem becomes more and more challenging. Multiple cloud servers can cooperate to establish a virtual machine pool to support internal users and to offer services to public cloud users. Game theory is used to solve the problem of resource allocation. In this paper, we study the cooperative behavior of multiple cloud servers and present the hierarchical cooperative game model for improve energy efficiency in Green Clouds. An evolutionary mechanism is proposed in this paper, which changes multiplexed strategies of the initial optimal solutions of different participants with minimizing their efficiency losses. The algorithms in the evolutionary mechanism take both optimization and fairness into account, which applies the game theory to the virtual machines deployment strategy to improve the efficiency in the public cloud environment. It is demonstrated that Nash equilibrium always exists if the resource allocation game has feasible solutions.
{"title":"An Evolutionary Game Theoretic Approach for Efficient Virtual Machine Deployment in Green Cloud","authors":"Ke Han, Xiaobo Cai, Hui Rong","doi":"10.1109/CSMA.2015.7","DOIUrl":"https://doi.org/10.1109/CSMA.2015.7","url":null,"abstract":"In cloud computing, an energy efficient resource allocation problem becomes more and more challenging. Multiple cloud servers can cooperate to establish a virtual machine pool to support internal users and to offer services to public cloud users. Game theory is used to solve the problem of resource allocation. In this paper, we study the cooperative behavior of multiple cloud servers and present the hierarchical cooperative game model for improve energy efficiency in Green Clouds. An evolutionary mechanism is proposed in this paper, which changes multiplexed strategies of the initial optimal solutions of different participants with minimizing their efficiency losses. The algorithms in the evolutionary mechanism take both optimization and fairness into account, which applies the game theory to the virtual machines deployment strategy to improve the efficiency in the public cloud environment. It is demonstrated that Nash equilibrium always exists if the resource allocation game has feasible solutions.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115571524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daqiao Zhang, Yong Xian, Jie Li, Gang Lei, Yan Chang
Aiming at the problems that the low convergent rate and easily failing into local extremum of the ant colony algorithm (ACA) in the process of path planning, a new method based on the chaos ant colony algorithm (CACA) is proposed. By adding the chaos disturbance factor into standard ACA, the ACA defects of fall into local optimum is effectively overcome and the searching efficiency is improved. By adding target guiding factor into ACA, the direction fuzzy exists in the ant's transfer is effectively avoided, the direction of the search is strengthened and the quality of result is improved. Through the path planning test considering the constraints of threats and turning radius, test results show that CACA can effectively avoid falling into local optimum, and get better penetration paths that meet the restraint conditions of threats and turning radius.
{"title":"UAV Path Planning Based on Chaos Ant Colony Algorithm","authors":"Daqiao Zhang, Yong Xian, Jie Li, Gang Lei, Yan Chang","doi":"10.1109/CSMA.2015.23","DOIUrl":"https://doi.org/10.1109/CSMA.2015.23","url":null,"abstract":"Aiming at the problems that the low convergent rate and easily failing into local extremum of the ant colony algorithm (ACA) in the process of path planning, a new method based on the chaos ant colony algorithm (CACA) is proposed. By adding the chaos disturbance factor into standard ACA, the ACA defects of fall into local optimum is effectively overcome and the searching efficiency is improved. By adding target guiding factor into ACA, the direction fuzzy exists in the ant's transfer is effectively avoided, the direction of the search is strengthened and the quality of result is improved. Through the path planning test considering the constraints of threats and turning radius, test results show that CACA can effectively avoid falling into local optimum, and get better penetration paths that meet the restraint conditions of threats and turning radius.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125356865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For the problems of energy constrained and the channel insecurity in group communication of WSN, we propose a self-healing group key management protocol based on polynomial and some algorithm. This protocol can recover the lost group key without transmitting message once more. The method can improve the security of the channel, while consuming less energy. The performance analysis of this protocol shows that we can achieve forward secrecy and backward secrecy and communication security with lower energy consumption, which can expand the range of applications of wireless sensor networks while improving life.
{"title":"An Efficient Self-Healing Group Key Management with Lower Storage for Wireless Sensor Network","authors":"Caixia Zhang, Lili Qu, Xiang-Dong Wang, Jianbin Xiong","doi":"10.1109/CSMA.2015.31","DOIUrl":"https://doi.org/10.1109/CSMA.2015.31","url":null,"abstract":"For the problems of energy constrained and the channel insecurity in group communication of WSN, we propose a self-healing group key management protocol based on polynomial and some algorithm. This protocol can recover the lost group key without transmitting message once more. The method can improve the security of the channel, while consuming less energy. The performance analysis of this protocol shows that we can achieve forward secrecy and backward secrecy and communication security with lower energy consumption, which can expand the range of applications of wireless sensor networks while improving life.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114615938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, an approach to decision making under hesitant fuzzy environment is developed with incomplete weight information and inter-correlations between attributes. Firstly, when the elements in an attribute set are correlative, Shapley value weighted correlation coefficient of hesitant fuzzy sets are defined that the length of hesitant fuzzy elements and the arrangement of their possible values are not considered. Secondly, the model for the optimal fuzzy measure on an attribute set is built when the weight information of attributes is partly known. Finally, to verify the practicality and feasibility of approach in this paper, the cloud computing products are evaluated.
{"title":"Cloud Computing Products Selection Based on Shapley Value Weighted Correlation Coefficient of HFSs","authors":"Li He, Ao Pei","doi":"10.1109/CSMA.2015.19","DOIUrl":"https://doi.org/10.1109/CSMA.2015.19","url":null,"abstract":"In this paper, an approach to decision making under hesitant fuzzy environment is developed with incomplete weight information and inter-correlations between attributes. Firstly, when the elements in an attribute set are correlative, Shapley value weighted correlation coefficient of hesitant fuzzy sets are defined that the length of hesitant fuzzy elements and the arrangement of their possible values are not considered. Secondly, the model for the optimal fuzzy measure on an attribute set is built when the weight information of attributes is partly known. Finally, to verify the practicality and feasibility of approach in this paper, the cloud computing products are evaluated.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134313722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we designed IIC into adjustable IP (Intelligent Property) core to shorten the develop cycle of IIC interface and improve the reconstruct ability of the system. In SOPC Builder, the hardware design code of IIC was integrated and defined as a port signal type, forming a called IP core. As a result, the development efficiency of the system is enhanced, the reliability of the system become high and the design of the system is less complicated.
{"title":"The Design and Simulation of IIC Communication SOPC Core Based on Avalon Bus","authors":"Hong-Gu Ji, Yabin Wang, Xiaofeng Li, Tao Jia","doi":"10.1109/CSMA.2015.33","DOIUrl":"https://doi.org/10.1109/CSMA.2015.33","url":null,"abstract":"In this paper, we designed IIC into adjustable IP (Intelligent Property) core to shorten the develop cycle of IIC interface and improve the reconstruct ability of the system. In SOPC Builder, the hardware design code of IIC was integrated and defined as a port signal type, forming a called IP core. As a result, the development efficiency of the system is enhanced, the reliability of the system become high and the design of the system is less complicated.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128623570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The sea surveying instruments ask the deep-sea submerged buoy for the ability of adjusting its attitude. The paper deals with the attitude control issue of the deep-sea submerged buoy under the sea current. Firstly, the six degree of freedom motion equation of the submerged buoy is predigested to two vertical section models. Secondly, based on the input-output linearization technique, a state feedback control law is presented for submerged buoy's attitude control system. The controller is implemented by four thrusters. Finally, numerical simulations are presented to validate the proposed controller. It is shown that the proposed controller exhibits relatively high effectiveness.
{"title":"Attitude Control Simulation of Deep-Sea Submerged Buoy Using Four Thrusters","authors":"Dehong Ge, Hai Zhu","doi":"10.1109/CSMA.2015.61","DOIUrl":"https://doi.org/10.1109/CSMA.2015.61","url":null,"abstract":"The sea surveying instruments ask the deep-sea submerged buoy for the ability of adjusting its attitude. The paper deals with the attitude control issue of the deep-sea submerged buoy under the sea current. Firstly, the six degree of freedom motion equation of the submerged buoy is predigested to two vertical section models. Secondly, based on the input-output linearization technique, a state feedback control law is presented for submerged buoy's attitude control system. The controller is implemented by four thrusters. Finally, numerical simulations are presented to validate the proposed controller. It is shown that the proposed controller exhibits relatively high effectiveness.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121692927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aircraft detection is the challenging task in optical remote sensing image processing system. Due to the shadow affection, the accuracy of detection results getting lower. Therefore, a method of the land aircraft detection which based on shadow affection in optical remote sensing image has been proposed. First, utilizing the anisotropic diffusion method to filter the noise in image, and analyzing the characteristics of gray-scale image to locate shadow regions and candidate target areas. Then, segmentation is performed on the filter able image to highlight the target. Next, we use the morphology operation to strengthen the target area connectedness. Finally, making full use of the aircraft features for target representation, it will reflecting the aircraft target prior-knowledge, at the same time, the accuracy of detection results will be greatly enhancement. Experimental results reveal the feasibility and validity of the proposed approach in detection aircrafts in optical remote sensing images.
{"title":"Aircraft Detection Based on Shadow Affect in Optical Remotely Sensed Imagery","authors":"Xuan Li, Yunqing Liu","doi":"10.1109/CSMA.2015.50","DOIUrl":"https://doi.org/10.1109/CSMA.2015.50","url":null,"abstract":"Aircraft detection is the challenging task in optical remote sensing image processing system. Due to the shadow affection, the accuracy of detection results getting lower. Therefore, a method of the land aircraft detection which based on shadow affection in optical remote sensing image has been proposed. First, utilizing the anisotropic diffusion method to filter the noise in image, and analyzing the characteristics of gray-scale image to locate shadow regions and candidate target areas. Then, segmentation is performed on the filter able image to highlight the target. Next, we use the morphology operation to strengthen the target area connectedness. Finally, making full use of the aircraft features for target representation, it will reflecting the aircraft target prior-knowledge, at the same time, the accuracy of detection results will be greatly enhancement. Experimental results reveal the feasibility and validity of the proposed approach in detection aircrafts in optical remote sensing images.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122458912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Particle Dynamic Analysis (PDA) is an optical technique used to measure the size and velocity of spherical particles simultaneously. This technique has already been widely applied in various industries, such as physics, and power engineering. A comprehensive numerical study of measurement on construction and urban spaces is presented in this paper. The techniques of PAD were adopted in this study to predict a method that can precisely measure architecture and urban spaces, as well as, an additional method that was designed and used for this paper. The simulation structure of Tongji Residential Estate is also established and tested successfully with PDA technique. By comparison of the particle velocity in the required points of the subject in the experiment, this method can measure architecture and urban spaces effectively and precisely. Furthermore, it has many typical features such as non-contact measurement, no interference to flow field, and fast dynamic response. The recommended PDA techniques and associated devices provide an effective, as well as, powerful support to architecture and urban construction.
{"title":"Measurement Application of Particle Dynamic Analysis","authors":"Peijun Yu","doi":"10.1109/CSMA.2015.36","DOIUrl":"https://doi.org/10.1109/CSMA.2015.36","url":null,"abstract":"Particle Dynamic Analysis (PDA) is an optical technique used to measure the size and velocity of spherical particles simultaneously. This technique has already been widely applied in various industries, such as physics, and power engineering. A comprehensive numerical study of measurement on construction and urban spaces is presented in this paper. The techniques of PAD were adopted in this study to predict a method that can precisely measure architecture and urban spaces, as well as, an additional method that was designed and used for this paper. The simulation structure of Tongji Residential Estate is also established and tested successfully with PDA technique. By comparison of the particle velocity in the required points of the subject in the experiment, this method can measure architecture and urban spaces effectively and precisely. Furthermore, it has many typical features such as non-contact measurement, no interference to flow field, and fast dynamic response. The recommended PDA techniques and associated devices provide an effective, as well as, powerful support to architecture and urban construction.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123305040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The popular database MySQL provides many cryptographic encryption functions to protect the privacy of its data storage. In this paper, we investigate the inner principle and security of encryption functions in three main categories and indicate that most of them are not secure as MySQL has claimed in the official manual document. By exploiting the vulnerability of these functions, we present some practical and effective attacks explicitly. Moreover, we also give some pieces of solution and suggestion to enhance the security of these functions in the application.
{"title":"The Security Analysis of MySQL's Encryption Functions","authors":"Lijun Zhang, Jia Fan, Yu Zhou","doi":"10.1109/CSMA.2015.8","DOIUrl":"https://doi.org/10.1109/CSMA.2015.8","url":null,"abstract":"The popular database MySQL provides many cryptographic encryption functions to protect the privacy of its data storage. In this paper, we investigate the inner principle and security of encryption functions in three main categories and indicate that most of them are not secure as MySQL has claimed in the official manual document. By exploiting the vulnerability of these functions, we present some practical and effective attacks explicitly. Moreover, we also give some pieces of solution and suggestion to enhance the security of these functions in the application.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124175290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the technology of target detection based on broadcasting satellite passive radar. This paper presents the characteristic of broadcasting satellite signals and its ambiguity function. Calculates the maximum detection distance by analyzing the power loss and the gain of signal processing. Demonstrates the necessity of depressing the direct satellite signals. The conclusion of this paper is: The broadcasting satellite signal is suitable for passive radar target detection. The detection distance can achieve 100km with 36MHz signal bandwidth, 60dB gain of antenna, 1s integrated time. Appropriate methods is necessary to depress the direct wave received from the side lobe of echo antenna. The possibility of this target detection method is proved by the experiment results in this paper.
{"title":"Target Detection Technology in Passive Radar Based on Broadcasting Satellite Signals","authors":"Qintian Yu, Huafeng Peng","doi":"10.1109/CSMA.2015.45","DOIUrl":"https://doi.org/10.1109/CSMA.2015.45","url":null,"abstract":"Aiming at the technology of target detection based on broadcasting satellite passive radar. This paper presents the characteristic of broadcasting satellite signals and its ambiguity function. Calculates the maximum detection distance by analyzing the power loss and the gain of signal processing. Demonstrates the necessity of depressing the direct satellite signals. The conclusion of this paper is: The broadcasting satellite signal is suitable for passive radar target detection. The detection distance can achieve 100km with 36MHz signal bandwidth, 60dB gain of antenna, 1s integrated time. Appropriate methods is necessary to depress the direct wave received from the side lobe of echo antenna. The possibility of this target detection method is proved by the experiment results in this paper.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131219749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}