To allow frequent key-updates without increasing the risk of helper key-exposure, Hanaoka et al. proposed parallel key-insulated mechanism where distinct helpers are independently used in key updates. In this paper, we propose a new identity-based parallel key-insulated signature scheme which is provably secure without resorting to the random oracle methodology. Compared with the known identity-based parallel key-insulated signature (IBPKIS) scheme secure in the standard model, our scheme enjoys more efficient verification.
{"title":"A New Identity-Based Parallel Key-Insulated Signature Scheme without Random Oracles","authors":"Zhongmei Wan","doi":"10.1109/ISCID.2011.108","DOIUrl":"https://doi.org/10.1109/ISCID.2011.108","url":null,"abstract":"To allow frequent key-updates without increasing the risk of helper key-exposure, Hanaoka et al. proposed parallel key-insulated mechanism where distinct helpers are independently used in key updates. In this paper, we propose a new identity-based parallel key-insulated signature scheme which is provably secure without resorting to the random oracle methodology. Compared with the known identity-based parallel key-insulated signature (IBPKIS) scheme secure in the standard model, our scheme enjoys more efficient verification.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133421428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article uses factor analysis to determine the weight, and then combines the TOPSIS method to construct the regional technological innovation ability evaluation system. And I will select 10 primitive original indexes in 11 urban areas of Zhejiang. At last, discusses the deficiency and corresponding solution based on this analysis. This following will introduce how to use this method to conduct a comprehensive evaluation of technological innovation, and explore its significance, reflecting the reasonable and applicable.
{"title":"Application on the Evaluation of Technology Innovation Ability System of Urban Areas in Zhejiang Based on Factor Analysis Combined TOPSIS Method","authors":"Li-ping Xia, Yi Qin, Jiao Hu, Tingting Wang","doi":"10.1109/ISCID.2011.143","DOIUrl":"https://doi.org/10.1109/ISCID.2011.143","url":null,"abstract":"This article uses factor analysis to determine the weight, and then combines the TOPSIS method to construct the regional technological innovation ability evaluation system. And I will select 10 primitive original indexes in 11 urban areas of Zhejiang. At last, discusses the deficiency and corresponding solution based on this analysis. This following will introduce how to use this method to conduct a comprehensive evaluation of technological innovation, and explore its significance, reflecting the reasonable and applicable.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134474623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Textile and garment industry is the livelihood industry in china, but the apparel industry has high foreign trade dependence degree, thus, it is very necessary to predict exports of clothing effectively. In this paper, GM (1,1) model is applied to predict the apparel export volume in the next 3-5 years, adopt the data from1999 to 2008 in order to verify the model, the results show that the prediction accuracy is better, the forecast shows that china's garment exports are still on the momentum of rapid growth from 2011 to 2013, the situation is more optimistic.
{"title":"Applying GM (1,1) Model in China's Apparel Export Forecasting","authors":"Xia Li, F. Kong, Yingchun Liu, Yingbo Qin","doi":"10.1109/ISCID.2011.163","DOIUrl":"https://doi.org/10.1109/ISCID.2011.163","url":null,"abstract":"Textile and garment industry is the livelihood industry in china, but the apparel industry has high foreign trade dependence degree, thus, it is very necessary to predict exports of clothing effectively. In this paper, GM (1,1) model is applied to predict the apparel export volume in the next 3-5 years, adopt the data from1999 to 2008 in order to verify the model, the results show that the prediction accuracy is better, the forecast shows that china's garment exports are still on the momentum of rapid growth from 2011 to 2013, the situation is more optimistic.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130351920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhenhua Zhang, Jingyu Yang, Youpei Ye, Xiaorong Wu
The concept of intuitionistic fuzzy sets with parameters (IFSP) is first introduced in this paper. By analyzing the degree of hesitancy, this paper concentrates on the construction and application of intuitionistic fuzzy sets with single parameter (IFSSP). Finally, a pattern recognition example is given to demonstrate the application of IFSSP. The experimental results show that we can adjust the parameter to appropriate value to obtain the desired result, therefore, the method of IFSSP is more comprehensive and flexible than that of traditional intuitionistic fuzzy sets.
{"title":"Intuitionistic Fuzzy Sets with Single Parameter and its Application to Pattern Recognition","authors":"Zhenhua Zhang, Jingyu Yang, Youpei Ye, Xiaorong Wu","doi":"10.1109/ISCID.2011.90","DOIUrl":"https://doi.org/10.1109/ISCID.2011.90","url":null,"abstract":"The concept of intuitionistic fuzzy sets with parameters (IFSP) is first introduced in this paper. By analyzing the degree of hesitancy, this paper concentrates on the construction and application of intuitionistic fuzzy sets with single parameter (IFSSP). Finally, a pattern recognition example is given to demonstrate the application of IFSSP. The experimental results show that we can adjust the parameter to appropriate value to obtain the desired result, therefore, the method of IFSSP is more comprehensive and flexible than that of traditional intuitionistic fuzzy sets.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114403769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The article analyzed the situation of elevator and the elevator industry in China. This paper proposes an idea that programmable logic controller (PLC) control the hand elevator, and discusses the specific structure of the system and the method of implementation. Meanwhile, this paper analyzed hardware and software of the elevator system, used reasonable hardware and software together to achieve the objective that move with the elevator automation and simplified the control circuit, and the method greatly improved the reliability and stability of the elevator.
{"title":"A Control System Design for Hand Elevator Based on PLC","authors":"Peng Wang","doi":"10.1109/ISCID.2011.27","DOIUrl":"https://doi.org/10.1109/ISCID.2011.27","url":null,"abstract":"The article analyzed the situation of elevator and the elevator industry in China. This paper proposes an idea that programmable logic controller (PLC) control the hand elevator, and discusses the specific structure of the system and the method of implementation. Meanwhile, this paper analyzed hardware and software of the elevator system, used reasonable hardware and software together to achieve the objective that move with the elevator automation and simplified the control circuit, and the method greatly improved the reliability and stability of the elevator.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114590097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multi-sensors system is designed for realizing autonomous mobile of outdoor robot. GPS, two laser range finders, encode, electronics compass and camera are used to obtain the feeling information for outdoor autonomous mobile robot. Based on multithread technology, the data acquisition program of outdoor autonomous mobile robot is developed. This method can improve data synchronism and real time from sensors. The data acquisition methods of every sensor are introduced. The key technology of realization method is given. The experimental results show that multisensory data acquisition method is effective.
{"title":"Multi-sensor Data Acquisition for an Autonomous Mobile Outdoor Robot","authors":"Miaolei Zhou, Wei Gao","doi":"10.1109/ISCID.2011.190","DOIUrl":"https://doi.org/10.1109/ISCID.2011.190","url":null,"abstract":"Multi-sensors system is designed for realizing autonomous mobile of outdoor robot. GPS, two laser range finders, encode, electronics compass and camera are used to obtain the feeling information for outdoor autonomous mobile robot. Based on multithread technology, the data acquisition program of outdoor autonomous mobile robot is developed. This method can improve data synchronism and real time from sensors. The data acquisition methods of every sensor are introduced. The key technology of realization method is given. The experimental results show that multisensory data acquisition method is effective.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121598657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a method for threat assessment(TA) based on Adaptive Intuitionistic Fuzzy Neural Network(AIFNN). Firstly, intuitionistic fuzzy proposition is defined and the concept of intuitionistic fuzzy reasoning is discussed and Takagi-Sugeno Kang intuitionistc fuzzy model is developed. Secondly, a model for TA on AIFNN based on Takagi-Sugeno Takagi-Sugeno Kang intuitionistc fuzzy model is established, the attribute functions, ie. membership and non-membership functions, and the inference rules of the system variables are devised with computational relations between layers of input and output and a synthesized computational expression of system outputs ascertained. Thirdly, a learning algorithm of neural based on the extended kalman algorithm is designed. Finally, the validity of the technique is checked and rationality of constructed model is verified by providing TA instances with 400 typical targets. The simulated results show that this method can enhance creditability of TA and improve quality of assessment with precision of synthetic values in reasoning output.
{"title":"Threat Assessment Based on Adaptive Intuitionistic Fuzzy Neural Network","authors":"Fan Yihong, Li Weimin, Z. Xiaoguang, Xie Xin","doi":"10.1109/ISCID.2011.73","DOIUrl":"https://doi.org/10.1109/ISCID.2011.73","url":null,"abstract":"This paper proposes a method for threat assessment(TA) based on Adaptive Intuitionistic Fuzzy Neural Network(AIFNN). Firstly, intuitionistic fuzzy proposition is defined and the concept of intuitionistic fuzzy reasoning is discussed and Takagi-Sugeno Kang intuitionistc fuzzy model is developed. Secondly, a model for TA on AIFNN based on Takagi-Sugeno Takagi-Sugeno Kang intuitionistc fuzzy model is established, the attribute functions, ie. membership and non-membership functions, and the inference rules of the system variables are devised with computational relations between layers of input and output and a synthesized computational expression of system outputs ascertained. Thirdly, a learning algorithm of neural based on the extended kalman algorithm is designed. Finally, the validity of the technique is checked and rationality of constructed model is verified by providing TA instances with 400 typical targets. The simulated results show that this method can enhance creditability of TA and improve quality of assessment with precision of synthetic values in reasoning output.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121071406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The research on information fusion of heterogeneous sensors from air or underwater is significant and difficult for either military or business. Apart from different principles of sensors, time-delay, target movement, detection probability, such factors affect performance of sensors in various environments prominently. This project proposes fusion algorithm of ASDP, which aims to resolve the joint detection performance for underwater objects. Analysis based on ADSP for joint detection in task fleet or other allied detective operations is calculated efficiently and understood easily. Simulation experiment results shows that ADSP is very helpful for commanders who acquire the whole detected region's profile of battle field to make right decisions, especially useful in early warning, the efficiency of target tracking, computation of probability of destroy and deployment optimization of anti-submarine forces.
{"title":"Algorithm of ASDP Based on Heterogeneous Sensors","authors":"Xiaoyong Wu, Gang Liu, Tao Jing","doi":"10.1109/ISCID.2011.31","DOIUrl":"https://doi.org/10.1109/ISCID.2011.31","url":null,"abstract":"The research on information fusion of heterogeneous sensors from air or underwater is significant and difficult for either military or business. Apart from different principles of sensors, time-delay, target movement, detection probability, such factors affect performance of sensors in various environments prominently. This project proposes fusion algorithm of ASDP, which aims to resolve the joint detection performance for underwater objects. Analysis based on ADSP for joint detection in task fleet or other allied detective operations is calculated efficiently and understood easily. Simulation experiment results shows that ADSP is very helpful for commanders who acquire the whole detected region's profile of battle field to make right decisions, especially useful in early warning, the efficiency of target tracking, computation of probability of destroy and deployment optimization of anti-submarine forces.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124285831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computing all minimal hitting sets (MHSs) is a key step of model-based diagnosis. A novel method to compute all MHSs called Binary-label HSSE is put forward, which combines HSSE-tree and binary label. In the method, binary digits is used to mark the real elements of the nodes, and effective pruning and expanding strategies are used to avoid the main problem of HSSE-tree, the explosive growth of the expanded nodes and supersets of MHSs along with the dimension of the problems. Additionally, computing between binary digits can avoid the traverse of every element in a node when judging whether the node is a MHS, which also contributes to the significant decrease of the run time. At last, the data structure of Binary-label HSSE is changed to dynamic array from dynamic linked list, which further decreases the run time of the method. Simulation results show that Binary-label HSSE method costs much less space and time than HSSE-tree method.
{"title":"A Method of Combining HSSE-tree and Binary Label to Compute All Minimal Hitting Sets","authors":"W. Feng, Min Du, Qi Zhao, Dong Wang","doi":"10.1109/ISCID.2011.107","DOIUrl":"https://doi.org/10.1109/ISCID.2011.107","url":null,"abstract":"Computing all minimal hitting sets (MHSs) is a key step of model-based diagnosis. A novel method to compute all MHSs called Binary-label HSSE is put forward, which combines HSSE-tree and binary label. In the method, binary digits is used to mark the real elements of the nodes, and effective pruning and expanding strategies are used to avoid the main problem of HSSE-tree, the explosive growth of the expanded nodes and supersets of MHSs along with the dimension of the problems. Additionally, computing between binary digits can avoid the traverse of every element in a node when judging whether the node is a MHS, which also contributes to the significant decrease of the run time. At last, the data structure of Binary-label HSSE is changed to dynamic array from dynamic linked list, which further decreases the run time of the method. Simulation results show that Binary-label HSSE method costs much less space and time than HSSE-tree method.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128265920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An evolutionary algorithm (EA) is designed and then is used to solve constrained optimization problems in this paper. The difference of the proposed algorithm from other EAs stays in combination of two crossover operators: one is affine crossover which inherits characteristics of the parents by using function continuity, one is uniform crossover which preserves some discrete genes of the parents by using Darwin's principle. Since both crossovers are independent to some extent, population diversity could be well maintained, then the new EA (denoted FUXEA) could enhance capacity in global search. The FUXEA algorithm is compared with some state-of-the-art algorithms which were published in a best journal in evolutionary computation area, and 13 widely used constraint benchmark problems to test the algorithm. The experimental results suggest it outperforms to or not worse than others, especially for the problems with many local optima, it performs much better.
{"title":"An Effective Combination of Genetic Operators in Evolutionary Algorithm","authors":"Qing Zhang, Sanyou Zeng, Zhengjun Li, Hongyong Jing","doi":"10.1109/ISCID.2011.35","DOIUrl":"https://doi.org/10.1109/ISCID.2011.35","url":null,"abstract":"An evolutionary algorithm (EA) is designed and then is used to solve constrained optimization problems in this paper. The difference of the proposed algorithm from other EAs stays in combination of two crossover operators: one is affine crossover which inherits characteristics of the parents by using function continuity, one is uniform crossover which preserves some discrete genes of the parents by using Darwin's principle. Since both crossovers are independent to some extent, population diversity could be well maintained, then the new EA (denoted FUXEA) could enhance capacity in global search. The FUXEA algorithm is compared with some state-of-the-art algorithms which were published in a best journal in evolutionary computation area, and 13 widely used constraint benchmark problems to test the algorithm. The experimental results suggest it outperforms to or not worse than others, especially for the problems with many local optima, it performs much better.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128871264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}