首页 > 最新文献

2016 2nd IEEE International Conference on Computer and Communications (ICCC)最新文献

英文 中文
A fast carrier acquisition architecture for high-dynamic weak signal based on GPU 基于GPU的高动态弱信号快速载波采集架构
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925033
Yue Guo, Rongke Liu, Yi Hou, Ling Zhao
In this paper, we present a graphics processing unit (GPU)-based architecture of carrier acquisition for high-dynamic weak signal in deep space communications. To achieve high performance, the carrier acquisition procedure is parallelized by exploiting the GPU's parallel operating characteristics. Based on computer unified device architecture (CUDA), different kernels are designed to map the different phases of carrier acquisition procedure. What's more, the kernels' efficiency are improved by optimizing the internal operation parallelism of kernels and lowering the memory access latency for threads. Besides, multiple CUDA streams are designed to hide the data transfer latency between host and device. Experimental results demonstrate that the proposed GPU-based architecture achieves more than 250.3 times speedup compared to CPU-based platform.
本文提出了一种基于图形处理器(GPU)的深空高动态弱信号载波采集体系结构。为了实现高性能,利用GPU的并行运行特性,对载波采集过程进行并行化处理。基于计算机统一设备体系结构(CUDA),设计了不同的内核来映射载波采集过程的不同阶段。此外,通过优化内核内部操作并行性和降低线程的内存访问延迟,提高了内核的效率。此外,设计了多个CUDA流来隐藏主机和设备之间的数据传输延迟。实验结果表明,与基于cpu的平台相比,基于gpu的架构实现了250.3倍以上的速度提升。
{"title":"A fast carrier acquisition architecture for high-dynamic weak signal based on GPU","authors":"Yue Guo, Rongke Liu, Yi Hou, Ling Zhao","doi":"10.1109/COMPCOMM.2016.7925033","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925033","url":null,"abstract":"In this paper, we present a graphics processing unit (GPU)-based architecture of carrier acquisition for high-dynamic weak signal in deep space communications. To achieve high performance, the carrier acquisition procedure is parallelized by exploiting the GPU's parallel operating characteristics. Based on computer unified device architecture (CUDA), different kernels are designed to map the different phases of carrier acquisition procedure. What's more, the kernels' efficiency are improved by optimizing the internal operation parallelism of kernels and lowering the memory access latency for threads. Besides, multiple CUDA streams are designed to hide the data transfer latency between host and device. Experimental results demonstrate that the proposed GPU-based architecture achieves more than 250.3 times speedup compared to CPU-based platform.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131739554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The subsequent transmission system of collaborative receiving terminal that based on fountain codes 基于喷泉码的协同接收终端后续传输系统
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925184
Wan Peng, Wang Feifei, Wang Jian
Since the sixth information revolution, people have entered the era of multimedia information. The transmission of information is no longer in a single way, people's demand for information exchange is more diversified, and the transmission of information environment is also more changeable. Then the collaborative receiving terminal based on fountain codes algorithm can meet all kinds of complex conditions in the current environment to achieve the transmitting and receiving of multimedia. The main work of this paper is a series of analysis and design of the subsequent transmission system of this terminal and to achieve the ultimate function by using the transfer mode that support TCP and UDP protocol.
自第六次信息革命以来,人们进入了多媒体信息时代。信息的传递不再是单一的方式,人们对信息交流的需求更加多样化,信息的传递环境也更加多变。然后基于喷泉码算法的协同接收终端可以满足当前环境下的各种复杂条件,实现多媒体的发送和接收。本文的主要工作是对该终端的后续传输系统进行一系列的分析和设计,并采用支持TCP和UDP协议的传输方式来实现最终的功能。
{"title":"The subsequent transmission system of collaborative receiving terminal that based on fountain codes","authors":"Wan Peng, Wang Feifei, Wang Jian","doi":"10.1109/COMPCOMM.2016.7925184","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925184","url":null,"abstract":"Since the sixth information revolution, people have entered the era of multimedia information. The transmission of information is no longer in a single way, people's demand for information exchange is more diversified, and the transmission of information environment is also more changeable. Then the collaborative receiving terminal based on fountain codes algorithm can meet all kinds of complex conditions in the current environment to achieve the transmitting and receiving of multimedia. The main work of this paper is a series of analysis and design of the subsequent transmission system of this terminal and to achieve the ultimate function by using the transfer mode that support TCP and UDP protocol.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121780476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis on the security of MIB objects defined in network device 分析网络设备中定义的MIB对象的安全性
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924868
Haiyan Liu, Yifei Huo
SNMP is currently the most widely used network management protocol which can examine the condition of network equipment and control them through visits MIB objects. It makes the network more convenient to manage while brings about new security challenges. Based on the analysis of the security threats brought by SNMP and the ways to attack a network through SNMP protocol, this paper designs several ways to analyze the security of MIB objects defined in a network device. At last it puts forward some corresponding security enhancement measures for management of SNMP, such as password setting, function selecting, software updating and proper SNMP configuring, etc. This article can be the reference of enhancing the security of the network managed by SNMP protocol.
SNMP是目前应用最广泛的网络管理协议,它可以通过访问MIB对象来检测网络设备的状态并对其进行控制。它使网络管理更加方便,同时也带来了新的安全挑战。本文在分析SNMP协议带来的安全威胁和通过SNMP协议攻击网络的方法的基础上,设计了几种方法来分析网络设备中定义的MIB对象的安全性。最后提出了相应的SNMP管理安全增强措施,如密码设置、功能选择、软件更新、SNMP配置等。本文可为提高SNMP协议管理的网络的安全性提供参考。
{"title":"Analysis on the security of MIB objects defined in network device","authors":"Haiyan Liu, Yifei Huo","doi":"10.1109/COMPCOMM.2016.7924868","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924868","url":null,"abstract":"SNMP is currently the most widely used network management protocol which can examine the condition of network equipment and control them through visits MIB objects. It makes the network more convenient to manage while brings about new security challenges. Based on the analysis of the security threats brought by SNMP and the ways to attack a network through SNMP protocol, this paper designs several ways to analyze the security of MIB objects defined in a network device. At last it puts forward some corresponding security enhancement measures for management of SNMP, such as password setting, function selecting, software updating and proper SNMP configuring, etc. This article can be the reference of enhancing the security of the network managed by SNMP protocol.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127576762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An RSSI-based localization method with outlier suppress for wireless sensor networks 基于rssi的无线传感器网络离群值抑制定位方法
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925097
Yan Ge, Zhi Zheng, Bo Yan, Jiao Yang, Yuxuan Yang, Huipeng Meng
A novel least square (LS) localization method for wireless sensor networks (WSNs) using received signal strength indicator (RSSI) is proposed in this paper. Unlike previous LS methods, the proposed method performs location calculation with the aid of the condition number of coordinate matrix to avoid the appearance of outliers. The threshold of condition number is introduced in this paper to avoid outliers while enhance the localization accuracy. Simulation results demonstrate that our approach can suppress outliers more efficiently, and improve the accuracy and stability of localization.
提出了一种基于接收信号强度指示器(RSSI)的无线传感器网络最小二乘定位方法。与以往的LS方法不同,该方法借助坐标矩阵的条件数进行定位计算,避免了异常点的出现。为了在提高定位精度的同时避免出现异常值,本文引入了条件数阈值。仿真结果表明,该方法可以有效地抑制异常点,提高定位的精度和稳定性。
{"title":"An RSSI-based localization method with outlier suppress for wireless sensor networks","authors":"Yan Ge, Zhi Zheng, Bo Yan, Jiao Yang, Yuxuan Yang, Huipeng Meng","doi":"10.1109/COMPCOMM.2016.7925097","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925097","url":null,"abstract":"A novel least square (LS) localization method for wireless sensor networks (WSNs) using received signal strength indicator (RSSI) is proposed in this paper. Unlike previous LS methods, the proposed method performs location calculation with the aid of the condition number of coordinate matrix to avoid the appearance of outliers. The threshold of condition number is introduced in this paper to avoid outliers while enhance the localization accuracy. Simulation results demonstrate that our approach can suppress outliers more efficiently, and improve the accuracy and stability of localization.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133326296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
EEG evidence for human mirror activity during observation of ambiguous shadow actions: Toward an analysis of humanoid robotic system 在观察模糊阴影动作时人类镜像活动的脑电图证据:对仿人机器人系统的分析
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924794
Huaping Zhu, Yaoru Sun
In this study, we investigated whether mere observation of ambiguous shadow motions with an anamorphic shape of a real hand would induce the human mirror neuron system (hMNS) activity and which aspects of the observed motion (i.e. the biologic property and the kinematical characteristic) are crucial to the hMNS activity. As an index of hMNS activity, EEG mu rhythm (8–13Hz) suppression at C3, Cz and C4 electrodes was examined during observation of ambiguous shadow motions with pre- and post-familiarisation compared to a flat geometrical shape movement (Baseline). The experimental results showed that no hMNS activity was found in pre-familiarisation condition even the anamorphic shadow was perceived as human hand. While, the hMNS activity was apparently found after a familiarisation process involves learning the kinematics features of the anamorphic shadow. Results reported here suggest that both biologic property and the kinematics features are crucial to the hMNS activity. The findings also may provide a new idea for the development of humanoid robotic system by modeling the human motion as two attribute set: biologic properties and kinematics primaries.
在这项研究中,我们研究了仅仅观察具有变形形状的真手的模糊阴影运动是否会诱导人类镜像神经元系统(hMNS)的活动,以及观察到的运动的哪些方面(即生物学特性和运动学特征)对hMNS的活动至关重要。作为hMNS活动的指标,在观察熟悉前后的模糊阴影运动与平面几何形状运动时,研究了C3、Cz和C4电极上脑电mu节律(8-13Hz)的抑制(基线)。实验结果表明,在预熟悉条件下,即使变形阴影被认为是人手,也没有发现hMNS活性。然而,hMNS活动显然是在熟悉过程中发现的,包括学习变形阴影的运动学特征。本文报道的结果表明,生物特性和运动学特征对hMNS的活性都至关重要。研究结果还可以为仿人机器人系统的发展提供新的思路,将人体运动建模为两个属性集:生物属性和运动学基本属性。
{"title":"EEG evidence for human mirror activity during observation of ambiguous shadow actions: Toward an analysis of humanoid robotic system","authors":"Huaping Zhu, Yaoru Sun","doi":"10.1109/COMPCOMM.2016.7924794","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924794","url":null,"abstract":"In this study, we investigated whether mere observation of ambiguous shadow motions with an anamorphic shape of a real hand would induce the human mirror neuron system (hMNS) activity and which aspects of the observed motion (i.e. the biologic property and the kinematical characteristic) are crucial to the hMNS activity. As an index of hMNS activity, EEG mu rhythm (8–13Hz) suppression at C3, Cz and C4 electrodes was examined during observation of ambiguous shadow motions with pre- and post-familiarisation compared to a flat geometrical shape movement (Baseline). The experimental results showed that no hMNS activity was found in pre-familiarisation condition even the anamorphic shadow was perceived as human hand. While, the hMNS activity was apparently found after a familiarisation process involves learning the kinematics features of the anamorphic shadow. Results reported here suggest that both biologic property and the kinematics features are crucial to the hMNS activity. The findings also may provide a new idea for the development of humanoid robotic system by modeling the human motion as two attribute set: biologic properties and kinematics primaries.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133405054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey on visual tracking via convolutional neural networks 基于卷积神经网络的视觉跟踪研究进展
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924746
Jia Zhang, Lei Yang, Xiaoyu Wu
The paper summarized 13 classic methods of visual tracking and 9 methods combined with convolutional neural networks including some latest trackers and compared all these trackers in the same benchmark. After analyzing the results, we had some new idea for existing trackers.
本文总结了13种经典的视觉跟踪方法和9种与卷积神经网络结合的方法,其中包括一些最新的跟踪器,并在同一基准下对所有这些跟踪器进行了比较。在分析结果后,我们对现有的跟踪器有了一些新的想法。
{"title":"A survey on visual tracking via convolutional neural networks","authors":"Jia Zhang, Lei Yang, Xiaoyu Wu","doi":"10.1109/COMPCOMM.2016.7924746","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924746","url":null,"abstract":"The paper summarized 13 classic methods of visual tracking and 9 methods combined with convolutional neural networks including some latest trackers and compared all these trackers in the same benchmark. After analyzing the results, we had some new idea for existing trackers.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133417959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on algorithm of audio level compressor 音频级压缩算法研究
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925043
Sun Yuhang, L. Shanshan
A audio compressor is an important part of a audio processing system. The compression algorithm designed in this paper will be applied to audio compressor in the digital audio broadcasting transmitter. In this paper, an effective algorithm for dynamic control of the gain by taking mean square value is proposed, and two different audio signal from two channel processing schemes will be compared to get better one on the impact of compression. Then the algorithm is evaluated by the effect of compression of signal amplitude in the MATLAB simulation, and a scheme selected that signal is firstly dealt with to enhance the effect of the dual channel stereo and then is compressed is more suitable for the two channel audio compression from two schemes.
音频压缩器是音频处理系统的重要组成部分。本文所设计的压缩算法将应用于数字音频广播发射机中的音频压缩器。本文提出了一种采用均方值法动态控制增益的有效算法,并对两种声道处理方案下的两种音频信号进行了比较,以获得较好的压缩效果。然后在MATLAB仿真中通过对信号幅度的压缩效果进行评价,从两种方案中选择一种先对信号进行处理以增强双声道立体声效果再进行压缩的方案更适合双声道音频压缩。
{"title":"Research on algorithm of audio level compressor","authors":"Sun Yuhang, L. Shanshan","doi":"10.1109/COMPCOMM.2016.7925043","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925043","url":null,"abstract":"A audio compressor is an important part of a audio processing system. The compression algorithm designed in this paper will be applied to audio compressor in the digital audio broadcasting transmitter. In this paper, an effective algorithm for dynamic control of the gain by taking mean square value is proposed, and two different audio signal from two channel processing schemes will be compared to get better one on the impact of compression. Then the algorithm is evaluated by the effect of compression of signal amplitude in the MATLAB simulation, and a scheme selected that signal is firstly dealt with to enhance the effect of the dual channel stereo and then is compressed is more suitable for the two channel audio compression from two schemes.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133621625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimal on-line strategy for walking in streets with minimal sensing 基于最小感知的街道行走在线优化策略
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924833
Qi Wei, X. Tan
This paper considers the problem of walking in the street with a mobile robot. The robot starts from a point s to search the target point t. The robot is equipped with a minimal sensing sensor that can only detect the discontinuities in depth information (or gaps), but has no prior knowledge of the street. The performance of our strategy is measured in terms of the competitive ratio, with respect to the length of the optimal path for walking in the street with complete knowledge. We propose a new 9-competitive strategy, and prove that it is optimal by showing a matching lower bound, whereas the previous best approach proposed by Tabatabaei et al. has a competitive ratio of 11.
本文研究了移动机器人在街道上行走的问题。机器人从点s开始搜索目标点t。机器人配备最小传感传感器,只能检测深度信息中的不连续(或间隙),但不具有街道的先验知识。我们的策略的表现是根据竞争比率来衡量的,相对于在街上行走的最佳路径的长度。我们提出了一种新的9竞争策略,并通过给出一个匹配的下界来证明它是最优的,而之前Tabatabaei等人提出的最佳策略的竞争比为11。
{"title":"An optimal on-line strategy for walking in streets with minimal sensing","authors":"Qi Wei, X. Tan","doi":"10.1109/COMPCOMM.2016.7924833","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924833","url":null,"abstract":"This paper considers the problem of walking in the street with a mobile robot. The robot starts from a point s to search the target point t. The robot is equipped with a minimal sensing sensor that can only detect the discontinuities in depth information (or gaps), but has no prior knowledge of the street. The performance of our strategy is measured in terms of the competitive ratio, with respect to the length of the optimal path for walking in the street with complete knowledge. We propose a new 9-competitive strategy, and prove that it is optimal by showing a matching lower bound, whereas the previous best approach proposed by Tabatabaei et al. has a competitive ratio of 11.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132215447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Gaussian Mixture Model based prediction method of movie rating 基于高斯混合模型的电影评级预测方法
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925073
Jia-xing Zhu, Yijun Guo, Jianjun Hao, Jianfeng Li, Duo Chen
Nowadays, with the increasing usage of the internet, the movie ratings on the SNS website related to movies influence our choice of movies remarkably. However, a newly released film has insufficient rating counts to reflect the quality of the movie, and it can not avoid the influence of malicious rating by some people. Therefore, this paper proposes a method of rating prediction based on Gaussian Mixture Model (GMM), enabled by imitating rating behavior of audience. Meanwhile, this model can avoid the influence of malicious rating because GMM is not sensitive to exception. In GMM, 4 features of the movies are taken into consideration. In order to verify the validity of our model, data from Douban website is used in the implementation. Experimental results exhibit the effectiveness of the method and an improved performance of rating prediction is achieved compared with the benchmark of linear regression.
在互联网日益普及的今天,与电影相关的SNS网站上的电影评分对我们的电影选择影响很大。然而,一部新上映的电影没有足够的评分计数来反映电影的质量,也无法避免一些人恶意评分的影响。因此,本文提出了一种基于高斯混合模型(GMM)的评分预测方法,该方法通过模仿观众的评分行为来实现。同时,由于GMM对异常不敏感,该模型可以避免恶意评分的影响。在GMM中,考虑了电影的4个特征。为了验证模型的有效性,我们使用了豆瓣网站的数据进行实现。实验结果表明了该方法的有效性,与基准线性回归相比,评级预测的性能得到了提高。
{"title":"Gaussian Mixture Model based prediction method of movie rating","authors":"Jia-xing Zhu, Yijun Guo, Jianjun Hao, Jianfeng Li, Duo Chen","doi":"10.1109/COMPCOMM.2016.7925073","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925073","url":null,"abstract":"Nowadays, with the increasing usage of the internet, the movie ratings on the SNS website related to movies influence our choice of movies remarkably. However, a newly released film has insufficient rating counts to reflect the quality of the movie, and it can not avoid the influence of malicious rating by some people. Therefore, this paper proposes a method of rating prediction based on Gaussian Mixture Model (GMM), enabled by imitating rating behavior of audience. Meanwhile, this model can avoid the influence of malicious rating because GMM is not sensitive to exception. In GMM, 4 features of the movies are taken into consideration. In order to verify the validity of our model, data from Douban website is used in the implementation. Experimental results exhibit the effectiveness of the method and an improved performance of rating prediction is achieved compared with the benchmark of linear regression.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134417774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
eCK-security authenticated key agreement protocol based on CDH assumption 基于CDH假设的eck安全认证密钥协议
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924695
Mengzhi Liu, Yanli Zhao, Shuying Chen
By far, the extended Canetti-Krawczyk (eCK) model still is one of strongest security model for authenticated key exchange (AKE) protocols. In this paper, a secure authenticated key agreement protocol named SAKA is analyzed in the model, the results show that the SAKA protocol does not support forward security which all key exchange protocol should satisfy. Furthermore, it does not meet security goals of the eCK model. In order to overcome all of above flaws, a variant of SAKA protocol is proposed based on Computation Diffie-Hellman assumption, and secure analysis shows that the new protocol has some good security properties including perfect forward secrecy and known session key excepting those desired security properties that SAKA has. Furthermore, fewer number of modular exponentiation indicates that the new scheme is more efficient.
迄今为止,扩展的Canetti-Krawczyk (eCK)模型仍然是身份验证密钥交换(AKE)协议中最强的安全模型之一。本文在模型中对安全认证密钥协议SAKA进行了分析,结果表明SAKA协议不支持所有密钥交换协议都应满足的前向安全性。此外,它不符合eCK模型的安全目标。为了克服上述缺陷,提出了一种基于计算Diffie-Hellman假设的SAKA协议的变体,安全分析表明,新协议具有SAKA所具有的完美前向保密和会话密钥已知等良好的安全特性。此外,较少的模幂次表明新方案的效率更高。
{"title":"eCK-security authenticated key agreement protocol based on CDH assumption","authors":"Mengzhi Liu, Yanli Zhao, Shuying Chen","doi":"10.1109/COMPCOMM.2016.7924695","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924695","url":null,"abstract":"By far, the extended Canetti-Krawczyk (eCK) model still is one of strongest security model for authenticated key exchange (AKE) protocols. In this paper, a secure authenticated key agreement protocol named SAKA is analyzed in the model, the results show that the SAKA protocol does not support forward security which all key exchange protocol should satisfy. Furthermore, it does not meet security goals of the eCK model. In order to overcome all of above flaws, a variant of SAKA protocol is proposed based on Computation Diffie-Hellman assumption, and secure analysis shows that the new protocol has some good security properties including perfect forward secrecy and known session key excepting those desired security properties that SAKA has. Furthermore, fewer number of modular exponentiation indicates that the new scheme is more efficient.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134540928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 2nd IEEE International Conference on Computer and Communications (ICCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1