首页 > 最新文献

2016 2nd IEEE International Conference on Computer and Communications (ICCC)最新文献

英文 中文
A prediction-based ACO algorithm to dynamic tasks scheduling in cloud environment 一种基于预测的蚁群算法用于云环境下的动态任务调度
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925194
Haitao Hu, Hongyan Wang
In recent years, cloud computing has gained more and more attention. Task and resource scheduling becomes one of the key problems in cloud computing. This paper refers to a new prediction-based algorithm based on Ant Colony Optimization which combines the available computing resources (referred as Virtual Machines, VMs) with arriving jobs with various Quality of Service constraints (QoS, defined by users). The traditional Ant Colony Optimization algorithms usually contain properties of computing resources but without taking users' constraints into consideration and ignore the heterogeneity of cloud resources. Therefore, an algorithm in this paper is proposed which classifies the jobs into two species. And then users' QoS constraints are sorted as well as computing resources according to their computing capabilities. This paper aims at proposing an ant colony optimization (ACO) algorithm to schedule jobs with various QoS parameters on VMs with different resource parameters. Experiment results show that the proposed prediction-based algorithm outperforms the ACO algorithm to some extent in finding the best dispatch of tasks to VMs.
近年来,云计算越来越受到人们的关注。任务和资源调度是云计算中的关键问题之一。本文提出了一种基于蚁群优化的基于预测的新算法,该算法将可用的计算资源(称为虚拟机,vm)与具有各种服务质量约束(QoS,由用户定义)的到达作业相结合。传统的蚁群优化算法通常包含计算资源的属性,但没有考虑用户的约束,忽略了云资源的异构性。因此,本文提出了一种将作业分为两类的算法。然后根据用户的计算能力对用户的QoS约束和计算资源进行排序。本文提出了一种蚁群优化算法,用于在不同资源参数的虚拟机上调度不同QoS参数的作业。实验结果表明,本文提出的基于预测的算法在寻找虚拟机任务的最佳调度方面优于蚁群算法。
{"title":"A prediction-based ACO algorithm to dynamic tasks scheduling in cloud environment","authors":"Haitao Hu, Hongyan Wang","doi":"10.1109/COMPCOMM.2016.7925194","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925194","url":null,"abstract":"In recent years, cloud computing has gained more and more attention. Task and resource scheduling becomes one of the key problems in cloud computing. This paper refers to a new prediction-based algorithm based on Ant Colony Optimization which combines the available computing resources (referred as Virtual Machines, VMs) with arriving jobs with various Quality of Service constraints (QoS, defined by users). The traditional Ant Colony Optimization algorithms usually contain properties of computing resources but without taking users' constraints into consideration and ignore the heterogeneity of cloud resources. Therefore, an algorithm in this paper is proposed which classifies the jobs into two species. And then users' QoS constraints are sorted as well as computing resources according to their computing capabilities. This paper aims at proposing an ant colony optimization (ACO) algorithm to schedule jobs with various QoS parameters on VMs with different resource parameters. Experiment results show that the proposed prediction-based algorithm outperforms the ACO algorithm to some extent in finding the best dispatch of tasks to VMs.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124414019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A superpixel method using 3-D geometry and normal priori information for RGB-D data 一种利用三维几何和法向先验信息处理RGB-D数据的超像素方法
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924773
Da Zhang, Songyang Lao, Kang Lai, Liang Bai
In recent years, a wide range of computer vision applications have relied upon superpixel. In an effort to generate superpixel segmentation for RGB-D images, we present a new efficient framework which combines color and spatial features and makes use of depth information as far as possible. It is performed by defining a measurement for the point cloud computed from depth map and distance between vertex normal. We use the distance of voxels to distinguish objects on depth map and use normal map to separate planes in the object. In this way, our method is able to generate superpixels both edge compact and plane fitting. Then we compare our proposed method with six state-of-the-art superpixel algorithms by considering their ability to adhere to image boundaries. The comparisons demonstrate that the performance of our method based on linear iterative clustering (SLIC) algorithm is superior to the most recent superpixel methods.
近年来,广泛的计算机视觉应用都依赖于超像素。为了实现RGB-D图像的超像素分割,我们提出了一种结合颜色和空间特征并尽可能利用深度信息的高效框架。它是通过定义深度图和顶点法线之间距离计算的点云的测量值来实现的。我们使用体素的距离来区分深度图上的物体,使用法线贴图来区分物体中的平面。通过这种方式,我们的方法能够生成超像素的边缘压缩和平面拟合。然后,我们将所提出的方法与六种最先进的超像素算法进行比较,考虑它们对图像边界的粘附能力。对比结果表明,基于线性迭代聚类(SLIC)算法的方法性能优于最新的超像素方法。
{"title":"A superpixel method using 3-D geometry and normal priori information for RGB-D data","authors":"Da Zhang, Songyang Lao, Kang Lai, Liang Bai","doi":"10.1109/COMPCOMM.2016.7924773","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924773","url":null,"abstract":"In recent years, a wide range of computer vision applications have relied upon superpixel. In an effort to generate superpixel segmentation for RGB-D images, we present a new efficient framework which combines color and spatial features and makes use of depth information as far as possible. It is performed by defining a measurement for the point cloud computed from depth map and distance between vertex normal. We use the distance of voxels to distinguish objects on depth map and use normal map to separate planes in the object. In this way, our method is able to generate superpixels both edge compact and plane fitting. Then we compare our proposed method with six state-of-the-art superpixel algorithms by considering their ability to adhere to image boundaries. The comparisons demonstrate that the performance of our method based on linear iterative clustering (SLIC) algorithm is superior to the most recent superpixel methods.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114768115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speaker recognition based on wavelet packet decomposition and Volterra adaptive model 基于小波包分解和Volterra自适应模型的说话人识别
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925042
Jun Guo, Shuying Yang
The process of voice generation belongs to nonlinear system, and the voice signal is chaotic. The traditional Volterra model is generally 2 order truncation, a low order filter is used to estimate the speech signal, and prediction effect is not accurate. So, this paper proposes a feature extraction scheme based on the wavelet packet decomposition and Volterra adaptive model. Firstly, the speech signal will be decomposed by wavelet packet. Secondly, reconstruct the phase space for all sub-band signals. Thirdly, using second order Volterra series expansion and the linear adaptive FIR filter to estimate parameter vector H(n) and output signal U(n) for Volterra model, and weight vectors of Volterra filter are obtained for speaker recognition. Speaker recognition experiment is completed based on hidden Markov model. The experimental results show the extracted features have been obviously improved, especially in the noise environment.
语音生成过程属于非线性系统,语音信号是混沌的。传统的Volterra模型一般是2阶截断,使用低阶滤波器对语音信号进行估计,预测效果不准确。为此,本文提出了一种基于小波包分解和Volterra自适应模型的特征提取方案。首先,对语音信号进行小波包分解。其次,对各子带信号进行相空间重构。第三,利用二阶Volterra级数展开和线性自适应FIR滤波器对Volterra模型的参数向量H(n)和输出信号U(n)进行估计,得到Volterra滤波器的权值向量,用于说话人识别。基于隐马尔可夫模型完成了说话人识别实验。实验结果表明,提取的特征有了明显的改善,特别是在噪声环境下。
{"title":"Speaker recognition based on wavelet packet decomposition and Volterra adaptive model","authors":"Jun Guo, Shuying Yang","doi":"10.1109/COMPCOMM.2016.7925042","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925042","url":null,"abstract":"The process of voice generation belongs to nonlinear system, and the voice signal is chaotic. The traditional Volterra model is generally 2 order truncation, a low order filter is used to estimate the speech signal, and prediction effect is not accurate. So, this paper proposes a feature extraction scheme based on the wavelet packet decomposition and Volterra adaptive model. Firstly, the speech signal will be decomposed by wavelet packet. Secondly, reconstruct the phase space for all sub-band signals. Thirdly, using second order Volterra series expansion and the linear adaptive FIR filter to estimate parameter vector H(n) and output signal U(n) for Volterra model, and weight vectors of Volterra filter are obtained for speaker recognition. Speaker recognition experiment is completed based on hidden Markov model. The experimental results show the extracted features have been obviously improved, especially in the noise environment.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114981398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The research on WebGIS-based information integration and data analysis platform for China's Physical Fitness and the National Fitness Program 基于webgis的中国体质与全民健身计划信息集成与数据分析平台研究
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924680
Yaping Zhong, Weihong Hu
It is a lack of in-depth study on the comprehensive information services and assessment in the national physical fitness and the National Fitness Program. A WebGIS-based interactive platform was designed to collect and analyze national physical fitness-related indicators such as data from the National Fitness Program and the geographical and humanistic environments. Seven functional modules were designed for the platform. The core functional module of the platform is the analysis and evaluation subsystem. Five evaluation models were provided. Based on the canonical correlation analysis method, the internal relations were explored among the national physical fitness, the National Fitness Program, and the geographical and humanistic environment factors. This study provides a new approach for the analysis and evaluation of the national physical fitness monitoring data, as well as a reference for the future development of the National Fitness Program.
对全民健身和全民健身计划的综合信息服务与评估缺乏深入的研究。设计了一个基于webgis的互动平台,用于收集和分析全民健身计划数据、地理和人文环境数据等全民体质相关指标。平台设计了7个功能模块。平台的核心功能模块是分析评估子系统。提出了5种评价模型。运用典型相关分析方法,探讨了国民体质、全民健身计划与地理、人文环境因素之间的内在关系。本研究为国民体质监测数据的分析与评价提供了一种新的途径,也为今后国民健身计划的制定提供了参考。
{"title":"The research on WebGIS-based information integration and data analysis platform for China's Physical Fitness and the National Fitness Program","authors":"Yaping Zhong, Weihong Hu","doi":"10.1109/COMPCOMM.2016.7924680","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924680","url":null,"abstract":"It is a lack of in-depth study on the comprehensive information services and assessment in the national physical fitness and the National Fitness Program. A WebGIS-based interactive platform was designed to collect and analyze national physical fitness-related indicators such as data from the National Fitness Program and the geographical and humanistic environments. Seven functional modules were designed for the platform. The core functional module of the platform is the analysis and evaluation subsystem. Five evaluation models were provided. Based on the canonical correlation analysis method, the internal relations were explored among the national physical fitness, the National Fitness Program, and the geographical and humanistic environment factors. This study provides a new approach for the analysis and evaluation of the national physical fitness monitoring data, as well as a reference for the future development of the National Fitness Program.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123432694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Trusted component model and supporting framework based on adaptive mechanism 基于自适应机制的可信组件模型和支持框架
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924845
Le Wei, Wei Wang, Z. Sheng, Wenqing Liu
According to the demand of credibility for the application software in the dynamic environment, the component technology is introduced into the development of the trusted service software to improve the software quality and development efficiency. Firstly, the basic idea to ensure the component credibility is described. Then an adaptive trusted component model is given and described in this paper. And subsequently an adaptive supporting framework is proposed. The framework can ensure the reliable performance of the component, can adjust the structure and behavior of the component depending on the change of runtime context adaptively, and can meet the needs of the upper application. Finally, the adaptive adjustment process of components is given based on the proposed model and framework.
根据动态环境下应用软件对可信度的要求,将构件技术引入可信服务软件开发中,以提高软件质量和开发效率。首先,阐述了保证构件可信度的基本思路。然后给出并描述了一种自适应可信组件模型。随后提出了一种自适应支撑框架。该框架能够保证组件的可靠性能,能够根据运行时上下文的变化自适应地调整组件的结构和行为,能够满足上层应用的需求。最后,给出了基于该模型和框架的构件自适应调整过程。
{"title":"Trusted component model and supporting framework based on adaptive mechanism","authors":"Le Wei, Wei Wang, Z. Sheng, Wenqing Liu","doi":"10.1109/COMPCOMM.2016.7924845","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924845","url":null,"abstract":"According to the demand of credibility for the application software in the dynamic environment, the component technology is introduced into the development of the trusted service software to improve the software quality and development efficiency. Firstly, the basic idea to ensure the component credibility is described. Then an adaptive trusted component model is given and described in this paper. And subsequently an adaptive supporting framework is proposed. The framework can ensure the reliable performance of the component, can adjust the structure and behavior of the component depending on the change of runtime context adaptively, and can meet the needs of the upper application. Finally, the adaptive adjustment process of components is given based on the proposed model and framework.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123500194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining approximate roles under important assignment 挖掘重要任务下的近似角色
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924918
Ning Pan, Zhiqiang Zhu, Liangsheng He, Lei Sun, Hang Su
Role Based Access Control (RBAC) has become the de facto access control model in recent years. In order to deploy RBAC, organizations have to define a set of roles from the existing user-permission assignment relationships, the process of which is called role mining. There have been many role mining algorithms proposed to devise a complete and correct set of roles which may not be very important because the user-permission assignment relationships are dynamic. This paper defines the δ-Approx Important Role Mining Problem (d-IRMP) which is proved to be NP-complete and proposes a heuristic bottom-up role mining algorithm that reduces the total number of roles with important assignments preserved at first. Furthermore, experiments were carried out with publicly available datasets to evaluate the approach and the results compared with other algorithms demonstrate the effectiveness of the proposed algorithm.
基于角色的访问控制(RBAC)近年来已成为事实上的访问控制模型。为了部署RBAC,组织必须从现有的用户权限分配关系中定义一组角色,这个过程称为角色挖掘。由于用户-权限分配关系是动态的,因此已经提出了许多角色挖掘算法来设计完整和正确的角色集,这些角色集可能不是很重要。本文定义了证明np完全的δ-近似重要角色挖掘问题(d-IRMP),提出了一种启发式自底向上的角色挖掘算法,该算法首先减少保留重要分配的角色总数。此外,利用公开的数据集进行了实验来评估该方法,并将结果与其他算法进行了比较,证明了该算法的有效性。
{"title":"Mining approximate roles under important assignment","authors":"Ning Pan, Zhiqiang Zhu, Liangsheng He, Lei Sun, Hang Su","doi":"10.1109/COMPCOMM.2016.7924918","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924918","url":null,"abstract":"Role Based Access Control (RBAC) has become the de facto access control model in recent years. In order to deploy RBAC, organizations have to define a set of roles from the existing user-permission assignment relationships, the process of which is called role mining. There have been many role mining algorithms proposed to devise a complete and correct set of roles which may not be very important because the user-permission assignment relationships are dynamic. This paper defines the δ-Approx Important Role Mining Problem (d-IRMP) which is proved to be NP-complete and proposes a heuristic bottom-up role mining algorithm that reduces the total number of roles with important assignments preserved at first. Furthermore, experiments were carried out with publicly available datasets to evaluate the approach and the results compared with other algorithms demonstrate the effectiveness of the proposed algorithm.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121963534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hardware implementation of the Temporal Noise Shaping decoder for DAB+ baseband chip 用于DAB+基带芯片的时序噪声整形解码器的硬件实现
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7925085
Hongsheng Zhang, Guoyu Wang, Mingying Lu, Renyi Zhu
Advanced Audio Coding (AAC) is adopted by the Digital Audio Broadcasting plus (DAB+) system, which is the upgraded version of DAB. The increasing demand of the portable DAB+ receivers requires low-cost, low-power DAB+ baseband chip. This brings the demand of hardware-architecture AAC decoders. This paper reports a hardware implementation of the Temporal Noise Shaping (TNS) decoder, which is an important tool in AAC to eliminate the pre-echo phenomenon. The proposed TNS decoder shares the process unit with other AAC blocks to save silicon area, and uses gated clock to reduce power consumption. The design consumes only 516 logic elements and 64*18 bits ROM. It has been integrated in a DAB+ baseband chip and works well for several DAB+ receivers.
数字音频广播+ (Digital Audio Broadcasting plus, DAB+)系统采用高级音频编码(Advanced Audio Coding, AAC)技术,是DAB的升级版。便携式DAB+接收机的需求日益增长,需要低成本、低功耗的DAB+基带芯片。这就对AAC解码器的硬件架构提出了要求。本文报道了时域噪声整形(TNS)解码器的硬件实现,它是AAC中消除预回波现象的重要工具。本文提出的TNS解码器与其他AAC模块共享处理单元以节省硅面积,并使用门控时钟以降低功耗。该设计仅消耗516个逻辑元件和64*18位ROM,集成在DAB+基带芯片中,适用于多种DAB+接收机。
{"title":"Hardware implementation of the Temporal Noise Shaping decoder for DAB+ baseband chip","authors":"Hongsheng Zhang, Guoyu Wang, Mingying Lu, Renyi Zhu","doi":"10.1109/COMPCOMM.2016.7925085","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7925085","url":null,"abstract":"Advanced Audio Coding (AAC) is adopted by the Digital Audio Broadcasting plus (DAB+) system, which is the upgraded version of DAB. The increasing demand of the portable DAB+ receivers requires low-cost, low-power DAB+ baseband chip. This brings the demand of hardware-architecture AAC decoders. This paper reports a hardware implementation of the Temporal Noise Shaping (TNS) decoder, which is an important tool in AAC to eliminate the pre-echo phenomenon. The proposed TNS decoder shares the process unit with other AAC blocks to save silicon area, and uses gated clock to reduce power consumption. The design consumes only 516 logic elements and 64*18 bits ROM. It has been integrated in a DAB+ baseband chip and works well for several DAB+ receivers.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122081714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Facial expression recognition using LBP and LPQ based on Gabor wavelet transform 基于Gabor小波变换的LBP和LPQ面部表情识别
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924724
Borui Zhang, Guangyuan Liu, Guoqiang Xie
In this paper, a novel facial expression recognition method using local binary pattern (LBP) and local phase quantization (LPQ) based on Gabor face image is proposed. To capture the salient visual properties, the Gabor filter is firstly adopted to extract features of the face image among five scales and eight orientations. Then the Gabor image is encoded by the LBP operator and LPQ operator, respectively. Two-stage principal component analysis and linear discriminant analysis (PCA-LDA) approach are used to reduce the dimension of the fused feature combined by the Gabor LBP feature and Gabor LPQ feature. In the experiment, the classification is done by the multi-class SVM classifiers based on the Japanese female facial expression (JAFFE) database. The result shows that the proposed method outperforms many other approaches in this paper in terms of accuracy.
提出了一种基于Gabor人脸图像的局部二值模式(LBP)和局部相位量化(LPQ)的面部表情识别方法。为了捕获显著的视觉特性,首先采用Gabor滤波器对人脸图像进行5个尺度、8个方向的特征提取。然后分别用LBP算子和LPQ算子对Gabor图像进行编码。采用两阶段主成分分析和线性判别分析(PCA-LDA)方法对Gabor LBP特征和Gabor LPQ特征结合的融合特征进行降维处理。在实验中,使用基于日本女性面部表情(JAFFE)数据库的多类SVM分类器进行分类。结果表明,本文提出的方法在精度方面优于许多其他方法。
{"title":"Facial expression recognition using LBP and LPQ based on Gabor wavelet transform","authors":"Borui Zhang, Guangyuan Liu, Guoqiang Xie","doi":"10.1109/COMPCOMM.2016.7924724","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924724","url":null,"abstract":"In this paper, a novel facial expression recognition method using local binary pattern (LBP) and local phase quantization (LPQ) based on Gabor face image is proposed. To capture the salient visual properties, the Gabor filter is firstly adopted to extract features of the face image among five scales and eight orientations. Then the Gabor image is encoded by the LBP operator and LPQ operator, respectively. Two-stage principal component analysis and linear discriminant analysis (PCA-LDA) approach are used to reduce the dimension of the fused feature combined by the Gabor LBP feature and Gabor LPQ feature. In the experiment, the classification is done by the multi-class SVM classifiers based on the Japanese female facial expression (JAFFE) database. The result shows that the proposed method outperforms many other approaches in this paper in terms of accuracy.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116806327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Quantum homomorphic signature using coherent states 使用相干态的量子同态签名
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924865
Qing-bin Luo, Guowu Yang, Kun She, Xiaoyu Li, Yu-qi Wang
In this paper, a novel scheme for quantum homomorphic signature based on coherent states is proposed, which is an effective approach to identity authentication for multiple streams to enhance the security of quantum networks. The state used for signature are arbitrarily close in trace distance to states of O(log2n), if the length of the nodes' messages is n-bit. The scheme analysis shows that the scheme is a quantum group homomorphic signature scheme and the signature is unforgeable.
本文提出了一种基于相干态的量子同态签名方案,该方案是一种有效的多流身份认证方法,可提高量子网络的安全性。如果节点的消息长度为n位,则用于签名的状态在跟踪距离上任意接近于0 (log2n)。方案分析表明,该方案是一个量子群同态签名方案,且签名不可伪造。
{"title":"Quantum homomorphic signature using coherent states","authors":"Qing-bin Luo, Guowu Yang, Kun She, Xiaoyu Li, Yu-qi Wang","doi":"10.1109/COMPCOMM.2016.7924865","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924865","url":null,"abstract":"In this paper, a novel scheme for quantum homomorphic signature based on coherent states is proposed, which is an effective approach to identity authentication for multiple streams to enhance the security of quantum networks. The state used for signature are arbitrarily close in trace distance to states of O(log2n), if the length of the nodes' messages is n-bit. The scheme analysis shows that the scheme is a quantum group homomorphic signature scheme and the signature is unforgeable.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123964434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new semantics-based android malware detection 一种新的基于语义的android恶意软件检测
Pub Date : 2016-10-01 DOI: 10.1109/COMPCOMM.2016.7924936
Xiaohan Zhang, Z. Jin
With its high market share, the Android platform has become a growing target for mobile malware, which posed great threat to customers' safety. Meanwhile, malwares employed various techniques, take code obfuscation for example, to evade detection. The commercial mobile anti-malware products, however, are vulnerable to common code transformation techniques. This paper proposes an enhanced malware detection approach which combines advantage of static analysis and performance of ensemble learning to improve Android malware detection accuracy. The model extracts semantics-based features which can resist common obfuscation techniques, and also uses feature collection from code and app characteristics through static analysis. Real-world malware samples are used to evaluate the model and the results of experiments have proved that this approach improved the efficiency with AUC of 2.06% higher than previous approach.
Android平台拥有很高的市场份额,越来越成为手机恶意软件的攻击目标,对用户的安全构成了极大的威胁。同时,恶意软件采用各种技术,以代码混淆为例,逃避检测。然而,商用移动反恶意软件产品容易受到普通代码转换技术的攻击。本文提出了一种结合静态分析优势和集成学习性能的增强恶意软件检测方法,以提高Android恶意软件检测的准确率。该模型提取基于语义的特征,这些特征可以抵抗常见的混淆技术,并通过静态分析从代码和应用程序特征中收集特征。利用实际恶意软件样本对模型进行了评估,实验结果表明,该方法提高了效率,AUC比之前的方法提高了2.06%。
{"title":"A new semantics-based android malware detection","authors":"Xiaohan Zhang, Z. Jin","doi":"10.1109/COMPCOMM.2016.7924936","DOIUrl":"https://doi.org/10.1109/COMPCOMM.2016.7924936","url":null,"abstract":"With its high market share, the Android platform has become a growing target for mobile malware, which posed great threat to customers' safety. Meanwhile, malwares employed various techniques, take code obfuscation for example, to evade detection. The commercial mobile anti-malware products, however, are vulnerable to common code transformation techniques. This paper proposes an enhanced malware detection approach which combines advantage of static analysis and performance of ensemble learning to improve Android malware detection accuracy. The model extracts semantics-based features which can resist common obfuscation techniques, and also uses feature collection from code and app characteristics through static analysis. Real-world malware samples are used to evaluate the model and the results of experiments have proved that this approach improved the efficiency with AUC of 2.06% higher than previous approach.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125925821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2016 2nd IEEE International Conference on Computer and Communications (ICCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1