Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073427
Qingxin Zhang
This paper discusses an optimal antiviral treatment strategy for the outbreak of influenza. The optimal control problem is formulated by minimizing the number of infected individuals at a minimal intervention cost. The existence of an optimal solution for the control problem is proved. In addition, with the Pontryagin's Maximum Principle, the time-varying optimal strategy of antiviral treatment is obtained.
{"title":"Optimal antiviral treatment strategies for the control of pandemic influenza","authors":"Qingxin Zhang","doi":"10.1109/ICCWAMTIP.2014.7073427","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073427","url":null,"abstract":"This paper discusses an optimal antiviral treatment strategy for the outbreak of influenza. The optimal control problem is formulated by minimizing the number of infected individuals at a minimal intervention cost. The existence of an optimal solution for the control problem is proved. In addition, with the Pontryagin's Maximum Principle, the time-varying optimal strategy of antiviral treatment is obtained.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126903499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073384
Hao Zhang, Shunfang Wang, Haiyan Ding
In order to solve the small sample problems and the linear inseparable problems caused by some nonlinear factors, this paper proposed a method to generate multiple virtual samples similar to the original images by its class, then all virtual samples were combined as a new database for training. The method not only helps to increase more samples, but strengthens the reliance of virtual samples on the samples in original database. Since the face images are high dimensional, principal component analysis (PCA) is used for dimension reduction and feature extraction. The experiments based on the ORL face database show that the recognition rates have been greatly improved and the recognition results are relatively stable with the increased sample method.
{"title":"Research of increasing virtual face samples for small sample problems and its applications in face recognition","authors":"Hao Zhang, Shunfang Wang, Haiyan Ding","doi":"10.1109/ICCWAMTIP.2014.7073384","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073384","url":null,"abstract":"In order to solve the small sample problems and the linear inseparable problems caused by some nonlinear factors, this paper proposed a method to generate multiple virtual samples similar to the original images by its class, then all virtual samples were combined as a new database for training. The method not only helps to increase more samples, but strengthens the reliance of virtual samples on the samples in original database. Since the face images are high dimensional, principal component analysis (PCA) is used for dimension reduction and feature extraction. The experiments based on the ORL face database show that the recognition rates have been greatly improved and the recognition results are relatively stable with the increased sample method.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126101652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073414
Tao Lin, Xiaoyun Liu, X. Zhang, Yan Ma, Z. Liu
Calculating morphological gradient is the key step of watershed algorithm. In this article, new tensorial similarity morphological gradient is defined based on the eight neighborhoods, and new tensor anisotropy morphological gradients are put forward, which are then used in the watershed segmentation framework to segment DTI image. The results of the segmentation experiments on the corpus callosum show that: Compared to other tensor anisotropy morphological gradients based watershed segmentation methods, the one based on newly proposed tensor anisotropy morphological gradients can more quickly and accurately position and depict the segmentation outline of the image, which can also better protect the edge information of the important region.
{"title":"New tensorial morphological gradients in DTI image segmentation algorithm","authors":"Tao Lin, Xiaoyun Liu, X. Zhang, Yan Ma, Z. Liu","doi":"10.1109/ICCWAMTIP.2014.7073414","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073414","url":null,"abstract":"Calculating morphological gradient is the key step of watershed algorithm. In this article, new tensorial similarity morphological gradient is defined based on the eight neighborhoods, and new tensor anisotropy morphological gradients are put forward, which are then used in the watershed segmentation framework to segment DTI image. The results of the segmentation experiments on the corpus callosum show that: Compared to other tensor anisotropy morphological gradients based watershed segmentation methods, the one based on newly proposed tensor anisotropy morphological gradients can more quickly and accurately position and depict the segmentation outline of the image, which can also better protect the edge information of the important region.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117301603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073419
Yuan Liang, K. Guo, Jian-Pin Li
In order to solve the problem of trusted authentication between terminals, as well as terminals and the server, and to establish a safe and reliable network environment, a remote attestation scheme design based on the identity and attribute certificates is proposed. Through a third-party certification body, which authenticates the identity and attributes of the Trusted Platform, this design ensures transitive trust between the platform and the server. Analysis results show that the design on the basis of the property-based remote attestation makes an increase of platform-based identity authentication. With the method of double certified, the reliability and privacy of the user's platform, as well as the security and confidentiality of the data during the certification process are ensured. This can enhance the credibility and security of the system between user platforms and servers.
{"title":"The remote attestation design based on the identity and attribute certificates","authors":"Yuan Liang, K. Guo, Jian-Pin Li","doi":"10.1109/ICCWAMTIP.2014.7073419","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073419","url":null,"abstract":"In order to solve the problem of trusted authentication between terminals, as well as terminals and the server, and to establish a safe and reliable network environment, a remote attestation scheme design based on the identity and attribute certificates is proposed. Through a third-party certification body, which authenticates the identity and attributes of the Trusted Platform, this design ensures transitive trust between the platform and the server. Analysis results show that the design on the basis of the property-based remote attestation makes an increase of platform-based identity authentication. With the method of double certified, the reliability and privacy of the user's platform, as well as the security and confidentiality of the data during the certification process are ensured. This can enhance the credibility and security of the system between user platforms and servers.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121133124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073437
Fei Wang, Guang-ya Si, Baoliang Xiao, Yafeng Shi
Network-of-Networks (NoN) is the latest developments of Complex Network, which is suitable for researching problem of System-of-Systems(SoS). We put forward a conceptual model of military SoS based on NoN, the model can describe various dynamic and static factors of SoS effectively. The SoS is mapped into physical network, relationship network and interaction network. The interaction network is defined in the form of flows, and the relationships between different networks are analyzed qualitatively. The approach of instantiating the conceptual model is introduced, the method of analyzing base on the instantiated model is shown through an example of simulation.
{"title":"Ananalytic model of military system-of-systems based on network-of-networkstheory","authors":"Fei Wang, Guang-ya Si, Baoliang Xiao, Yafeng Shi","doi":"10.1109/ICCWAMTIP.2014.7073437","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073437","url":null,"abstract":"Network-of-Networks (NoN) is the latest developments of Complex Network, which is suitable for researching problem of System-of-Systems(SoS). We put forward a conceptual model of military SoS based on NoN, the model can describe various dynamic and static factors of SoS effectively. The SoS is mapped into physical network, relationship network and interaction network. The interaction network is defined in the form of flows, and the relationships between different networks are analyzed qualitatively. The approach of instantiating the conceptual model is introduced, the method of analyzing base on the instantiated model is shown through an example of simulation.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131123987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073366
Xiaojun Sun, G. Yan, Bo Zhang
For the multisensor linear discrete time-invariant systems with correlated noises, a reduced dimension weighted measurement fusion algorithm is presented. Furthermore, an optimal reduced dimension weighted measurement fusion white noise deconvolution estimator is given. Its computational burden is greatly reduced. A simulation example for a 3-sensor system with Bernoulli-Gaussian input white noise shows its effectiveness.
{"title":"A new optimal reduced dimension weighted fusion white noise estimator","authors":"Xiaojun Sun, G. Yan, Bo Zhang","doi":"10.1109/ICCWAMTIP.2014.7073366","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073366","url":null,"abstract":"For the multisensor linear discrete time-invariant systems with correlated noises, a reduced dimension weighted measurement fusion algorithm is presented. Furthermore, an optimal reduced dimension weighted measurement fusion white noise deconvolution estimator is given. Its computational burden is greatly reduced. A simulation example for a 3-sensor system with Bernoulli-Gaussian input white noise shows its effectiveness.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128118524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a new type of high precision double buffered MEMS acceleration seismometer is introduced. The MEMS sensor technology, Σ- delta 24 bits A/D conversion technology are adopted in our method. Furthermore, FPGA extended SDRAM is utilized for the implementation. Experiments show that the detector performance compared with France's DSU3 Sercel co, frequency response reaches 0-784Hz; Power consumption is 160 mV, which can realize the large volume of 128 Mbit cache. The dynamic range and band width has been greatly improved than traditional receiver, and the ability to resist electromagnetic interference is enhanced.
{"title":"The design of high precision double buffer MEMS acceleration seismometer","authors":"Ping Gan, Huan Yu, Zhuo Chen, Dong Lianli, Xiaohu Shen, Ming Yu, Yu Zhang, Cailan Zeng, Xiaosong Zhang","doi":"10.1109/ICCWAMTIP.2014.7073424","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073424","url":null,"abstract":"In this paper, a new type of high precision double buffered MEMS acceleration seismometer is introduced. The MEMS sensor technology, Σ- delta 24 bits A/D conversion technology are adopted in our method. Furthermore, FPGA extended SDRAM is utilized for the implementation. Experiments show that the detector performance compared with France's DSU3 Sercel co, frequency response reaches 0-784Hz; Power consumption is 160 mV, which can realize the large volume of 128 Mbit cache. The dynamic range and band width has been greatly improved than traditional receiver, and the ability to resist electromagnetic interference is enhanced.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"os18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127921635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073458
Yuehao Yan, C. Li, Rong Wang
With the rapidly development of microelectronics technology, control theory, four shaft rotor unmanned aerial vehicle technology has been dramatically improved. In this paper, a fast intelligent building model and setting process have been proposed, which are based on the research of the key technology of four shaft rotor unmanned aerial vehicle, this model and setting process has been proved plausibly and correctly with experiments.
{"title":"Research on key technologies of unmanned aerial vehicle intelligent four shaft rotor","authors":"Yuehao Yan, C. Li, Rong Wang","doi":"10.1109/ICCWAMTIP.2014.7073458","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073458","url":null,"abstract":"With the rapidly development of microelectronics technology, control theory, four shaft rotor unmanned aerial vehicle technology has been dramatically improved. In this paper, a fast intelligent building model and setting process have been proposed, which are based on the research of the key technology of four shaft rotor unmanned aerial vehicle, this model and setting process has been proved plausibly and correctly with experiments.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"39 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134224861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073359
Riming Wang, Jiu-chao Feng
Cramer-Rao Lower Bound (CRLB) of location estimation under Gaussian distribution is widely used in localization applications. However, under the environments with dynamical obstacles, the existing CRLB does not represent the effect of the non-line-of-sight (NLOS) bias caused by dynamical obstacles. In this paper, based on received signal strength (RSS) measurements, a uniform random variable is used to model the NLOS bias effect. Furthermore, The corresponding maximum likelihood estimator (MLE) and CRLB under the joint distribution of Gaussian distribution and uniform distribution are derived. Numerical results validate that the proposed MLE and CRLB are effective in environments with dynamic obstacles.
{"title":"Cramer-rao lower bound for localization in environments with dynamical obstacles","authors":"Riming Wang, Jiu-chao Feng","doi":"10.1109/ICCWAMTIP.2014.7073359","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073359","url":null,"abstract":"Cramer-Rao Lower Bound (CRLB) of location estimation under Gaussian distribution is widely used in localization applications. However, under the environments with dynamical obstacles, the existing CRLB does not represent the effect of the non-line-of-sight (NLOS) bias caused by dynamical obstacles. In this paper, based on received signal strength (RSS) measurements, a uniform random variable is used to model the NLOS bias effect. Furthermore, The corresponding maximum likelihood estimator (MLE) and CRLB under the joint distribution of Gaussian distribution and uniform distribution are derived. Numerical results validate that the proposed MLE and CRLB are effective in environments with dynamic obstacles.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124965509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The previous electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding prices before the opening stage. It results in the malicious bidder wining the auction with an optimal bidding price. This paper proposes a sealed-bid auction scheme without third party to get over this drawback. The proposed scheme adopts the ideal of the conditionally anonymous ring signcryption to guarantee the secure requirements of sealed- bid electronic auction.
{"title":"Sealed-BID electronic auction without the third party","authors":"Shaobo Li, Xiao Li, Ming-Xing He, Shengke Zeng, Xiaolong Tang","doi":"10.1109/ICCWAMTIP.2014.7073421","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073421","url":null,"abstract":"The previous electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding prices before the opening stage. It results in the malicious bidder wining the auction with an optimal bidding price. This paper proposes a sealed-bid auction scheme without third party to get over this drawback. The proposed scheme adopts the ideal of the conditionally anonymous ring signcryption to guarantee the secure requirements of sealed- bid electronic auction.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124105849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}