首页 > 最新文献

2009 Fifth International Conference on Information Assurance and Security最新文献

英文 中文
Visibility Estimation Based on Mean Shift 基于均值移位的可见性估计
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.81
Wenbing Chen, Xiaolei Zhang, Jianwei Yang
An algorithm is developed to estimate visibility from images captured by video cameras. We propose to smooth the captured image by mean shift and extract the landmark edge by an improved ADM. Then the visibility is estimated in terms of a simplified visibility definition. In comparison with traditional methods, our method not only remove the noise in landmark boundary region, but also make boundary region be more uniform and the extracted edge be more salient. Experimental results illustrate the effectiveness of our approach in visibility estimation.
提出了一种从摄像机拍摄的图像中估计能见度的算法。我们提出利用均值移位对捕获图像进行平滑处理,并利用改进的adm提取地标边缘,然后根据简化的可视性定义估计图像的可见度。与传统方法相比,该方法不仅消除了地标边界区域的噪声,而且使边界区域更加均匀,提取的边缘更加显著。实验结果表明了该方法在可见性估计中的有效性。
{"title":"Visibility Estimation Based on Mean Shift","authors":"Wenbing Chen, Xiaolei Zhang, Jianwei Yang","doi":"10.1109/IAS.2009.81","DOIUrl":"https://doi.org/10.1109/IAS.2009.81","url":null,"abstract":"An algorithm is developed to estimate visibility from images captured by video cameras. We propose to smooth the captured image by mean shift and extract the landmark edge by an improved ADM. Then the visibility is estimated in terms of a simplified visibility definition. In comparison with traditional methods, our method not only remove the noise in landmark boundary region, but also make boundary region be more uniform and the extracted edge be more salient. Experimental results illustrate the effectiveness of our approach in visibility estimation.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124215835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Lossless Hiding Technique Based on Reversible Contrast Mapping and Histogram Embedding Methods 一种基于可逆对比度映射和直方图嵌入的有效无损隐藏技术
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.113
T. Lu, Ying-Hsuan Huang
Lossless data hiding is a technique that used to embed secret message into media for generating the stego image. The receiver who obtains the stego image can extract the secret message from it and restore the original media via the extraction and recovery image algorithms. Coltuc and Chassery combined look-up table and reversible contrast mapping technique to generate a very fast watermarking embedding scheme in 2007. Their scheme is simple and the hiding capacity is high. In addition, the image quality of the stego image generated by their scheme is fine. However, in their method, absolute difference is used to control image distortion. If the value of the absolute difference is low, then the hiding capacity will be limited and decreased. Therefore, we apply the histogram technique to improve Coltuc and Chassery’s scheme. The experimental results show that the image quality of the proposed scheme is better than that of Coltuc and Chassery’s scheme.
无损数据隐藏是一种将秘密信息嵌入到媒体中以生成隐写图像的技术。接收方获取隐写图像后,可以从隐写图像中提取秘密信息,并通过提取和恢复图像算法恢复原始媒体。Coltuc和Chassery在2007年结合查找表和可逆对比映射技术生成了一种非常快速的水印嵌入方案。他们的方案简单,隐藏能力高。此外,该方案生成的隐写图像的图像质量良好。然而,在他们的方法中,使用绝对差分来控制图像失真。如果绝对差值较低,则隐藏能力将受到限制并降低。因此,我们采用直方图技术来改进Coltuc和Chassery的方案。实验结果表明,该方案的图像质量优于Coltuc和Chassery方案。
{"title":"An Effective Lossless Hiding Technique Based on Reversible Contrast Mapping and Histogram Embedding Methods","authors":"T. Lu, Ying-Hsuan Huang","doi":"10.1109/IAS.2009.113","DOIUrl":"https://doi.org/10.1109/IAS.2009.113","url":null,"abstract":"Lossless data hiding is a technique that used to embed secret message into media for generating the stego image. The receiver who obtains the stego image can extract the secret message from it and restore the original media via the extraction and recovery image algorithms. Coltuc and Chassery combined look-up table and reversible contrast mapping technique to generate a very fast watermarking embedding scheme in 2007. Their scheme is simple and the hiding capacity is high. In addition, the image quality of the stego image generated by their scheme is fine. However, in their method, absolute difference is used to control image distortion. If the value of the absolute difference is low, then the hiding capacity will be limited and decreased. Therefore, we apply the histogram technique to improve Coltuc and Chassery’s scheme. The experimental results show that the image quality of the proposed scheme is better than that of Coltuc and Chassery’s scheme.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126276312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Position Verification in Multi-hop Vehicular Networks 多跳车辆网络中的位置验证
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.345
Deepa Susan Rajan, Chetan Yeole, Harshad Nakade, Huirong Fu, Ye Zhu
Inter-vehicle communication is an emerging field of research which focuses on different ways of increasing safety and efficiency in future intelligent highways. However, the security in these inter vehicular communication is a major issue. Since the vehicular network does not have a fixed infrastructure, developing a security scheme in a highly dynamically changing environment is a major challenge. In this paper we are proposing two algorithms for verifying the position information claimed by other vehicles in a multi-hop vehicular network.
车际通信是一个新兴的研究领域,主要研究如何在未来智能公路中提高安全性和效率。然而,这些车际通信的安全性是一个主要问题。由于车载网络没有固定的基础设施,因此在高度动态变化的环境中开发安全方案是一项重大挑战。在本文中,我们提出了两种算法来验证多跳车辆网络中其他车辆所声明的位置信息。
{"title":"Position Verification in Multi-hop Vehicular Networks","authors":"Deepa Susan Rajan, Chetan Yeole, Harshad Nakade, Huirong Fu, Ye Zhu","doi":"10.1109/IAS.2009.345","DOIUrl":"https://doi.org/10.1109/IAS.2009.345","url":null,"abstract":"Inter-vehicle communication is an emerging field of research which focuses on different ways of increasing safety and efficiency in future intelligent highways. However, the security in these inter vehicular communication is a major issue. Since the vehicular network does not have a fixed infrastructure, developing a security scheme in a highly dynamically changing environment is a major challenge. In this paper we are proposing two algorithms for verifying the position information claimed by other vehicles in a multi-hop vehicular network.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126282854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Practical Quantum No-key Protocol with Identification 具有身份的实用量子无密钥协议
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.106
Yang Wu, Li Yang
Quantum no-key protocol is a quantum realization of Shamir’s idea of no-key cryptosystem, which can be used to transport quantum and classical message secretly. It is beyond computational security. We give a practical quantum no-key protocol with mutual identification. In order to prevent MIM (man-in-the-middle) attack, we realize secure information transmission and identification by utilizing a short pre-shared secret bit sequence. And we use pseudo-random sequences to mix the photons which are used for information transmission and the photons which are used for identification. Pseudo-random sequence partly protects the secret sequence and makes our protocol more practical while do not weaken the security. We post a schematic diagram of the experimental set-up which is based on fiber communication system. Our protocol does not need entanglement, multi-qubit operation or classical communication.
量子无密钥协议是Shamir无密钥密码系统思想的量子实现,可用于秘密传输量子信息和经典信息。它超出了计算安全性。给出了一种实用的量子无密钥协议。为了防止MIM (man-in-the-middle)攻击,我们利用短的预共享密钥序列来实现信息的安全传输和识别。利用伪随机序列将用于信息传输的光子和用于识别的光子混合在一起。伪随机序列在一定程度上保护了保密序列,在不削弱协议安全性的前提下,提高了协议的实用性。本文给出了基于光纤通信系统的实验装置示意图。我们的协议不需要纠缠,不需要多量子比特操作,也不需要经典通信。
{"title":"Practical Quantum No-key Protocol with Identification","authors":"Yang Wu, Li Yang","doi":"10.1109/IAS.2009.106","DOIUrl":"https://doi.org/10.1109/IAS.2009.106","url":null,"abstract":"Quantum no-key protocol is a quantum realization of Shamir’s idea of no-key cryptosystem, which can be used to transport quantum and classical message secretly. It is beyond computational security. We give a practical quantum no-key protocol with mutual identification. In order to prevent MIM (man-in-the-middle) attack, we realize secure information transmission and identification by utilizing a short pre-shared secret bit sequence. And we use pseudo-random sequences to mix the photons which are used for information transmission and the photons which are used for identification. Pseudo-random sequence partly protects the secret sequence and makes our protocol more practical while do not weaken the security. We post a schematic diagram of the experimental set-up which is based on fiber communication system. Our protocol does not need entanglement, multi-qubit operation or classical communication.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129520341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Watermarking Relational Databases for Ownership Protection Based on DWT 基于DWT的所有权保护关系数据库水印
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.220
Chuanxian Jiang, Xiaowei Chen, Zhi Li
This paper primarily researches on the feasibility of embedding watermark to relational databases in the Discrete Wavelet Transform (DWT) domain. Watermark embedding is known to be difficult for relational databases. This paper focuses on the analysis of the wavelet high frequency coefficients of corresponding data and gives the definition of the intensive factor. By employing the linear correlation detecting method, this paper proposes the watermarking algorithm, which can embed the watermark into relational database successfully in DWT domain. The watermark can be distributed to different parts of the relational database. Experiments show that the embedded digital watermarks in the proposed algorithm are invisible and some degree of the robustness of the proposed algorithm against the commonly attacks that are used in databases processing.
本文主要研究了离散小波变换(DWT)域中关系数据库嵌入水印的可行性。众所周知,水印嵌入是关系数据库的难点。本文重点分析了相应数据的小波高频系数,给出了密集因子的定义。本文采用线性相关检测方法,提出了一种能在DWT域中成功地将水印嵌入到关系数据库中的水印算法。水印可以分布到关系数据库的不同部分。实验表明,该算法中嵌入的数字水印是不可见的,并且对数据库处理中常见的攻击具有一定的鲁棒性。
{"title":"Watermarking Relational Databases for Ownership Protection Based on DWT","authors":"Chuanxian Jiang, Xiaowei Chen, Zhi Li","doi":"10.1109/IAS.2009.220","DOIUrl":"https://doi.org/10.1109/IAS.2009.220","url":null,"abstract":"This paper primarily researches on the feasibility of embedding watermark to relational databases in the Discrete Wavelet Transform (DWT) domain. Watermark embedding is known to be difficult for relational databases. This paper focuses on the analysis of the wavelet high frequency coefficients of corresponding data and gives the definition of the intensive factor. By employing the linear correlation detecting method, this paper proposes the watermarking algorithm, which can embed the watermark into relational database successfully in DWT domain. The watermark can be distributed to different parts of the relational database. Experiments show that the embedded digital watermarks in the proposed algorithm are invisible and some degree of the robustness of the proposed algorithm against the commonly attacks that are used in databases processing.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128539249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Emergency Command System for Geologic Disasters Prevention 地质灾害防治应急指挥系统
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.51
Wenbiao Peng, Chaojun Yan, Xinqiong Liu, Lihua Deng
The emergency command system is an important part in the project of warning, monitoring and geologic disasters prevention in the Three Gorges Reservoir Area, because it can provide a reliable technical guarantee. This paper describes a multimedia emergency command system based on satellite IP link. The characteristics include an on-the-spot information collection and transmission, an integrated emergency communications, an emergency commanding, an emergency dispatching and strategic decision analysis. The system can meet the need of emergency mobile command and is effective and practical. It enhances the efficiency of working for establishing interconnection of the discrete resources and realizing the commanding of emergency.
应急指挥系统是三峡库区预警监测和地质灾害防治工程的重要组成部分,能够提供可靠的技术保障。介绍了一种基于卫星IP链路的多媒体应急指挥系统。其特点包括现场信息采集与传输、应急综合通信、应急指挥、应急调度和战略决策分析。该系统能够满足应急机动指挥的需要,具有一定的实用性和有效性。提高了离散资源互联互通的工作效率,实现了应急指挥。
{"title":"Emergency Command System for Geologic Disasters Prevention","authors":"Wenbiao Peng, Chaojun Yan, Xinqiong Liu, Lihua Deng","doi":"10.1109/IAS.2009.51","DOIUrl":"https://doi.org/10.1109/IAS.2009.51","url":null,"abstract":"The emergency command system is an important part in the project of warning, monitoring and geologic disasters prevention in the Three Gorges Reservoir Area, because it can provide a reliable technical guarantee. This paper describes a multimedia emergency command system based on satellite IP link. The characteristics include an on-the-spot information collection and transmission, an integrated emergency communications, an emergency commanding, an emergency dispatching and strategic decision analysis. The system can meet the need of emergency mobile command and is effective and practical. It enhances the efficiency of working for establishing interconnection of the discrete resources and realizing the commanding of emergency.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124576083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression 基于遗传算法和Cox回归的医疗信息系统威胁识别
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.313
R. Ahmad, Ganthan Narayana Samy, Nuzulha Khilwani Ibrahim, P. Bath, Z. Ismail
Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which interest them (e.g., virus attack). Certain factors which may be important remain unexplored. In addition, lack of tools and technologies directed to limited number of threats traced in healthcare system. Thus it introduces bias in threat analysis. This study explored the use of biological computational termed Genetic Algorithm (GAs) combined with Cox regression (CoRGA) in identifying a potential threat for healthcare system. The results show that variable described “misused of e-mail” is the major information security threats for healthcare system. Results were compared with manual analysis using the same data, and it is shows that GAs not just introducing new threats for healthcare system but it was similar with others threats proposed by previous researches.
医疗信息系统面临的信息安全威胁急剧增加。造成信息安全威胁的因素多种多样,许多研究人员只关注他们感兴趣的某些因素(如病毒攻击)。某些可能很重要的因素仍未被探索。此外,缺乏针对医疗保健系统中有限数量的威胁的工具和技术。因此,它在威胁分析中引入了偏见。本研究探讨了使用生物计算称为遗传算法(GAs)结合考克斯回归(CoRGA)在识别医疗保健系统的潜在威胁。结果表明,变量“电子邮件滥用”是医疗保健系统面临的主要信息安全威胁。结果与使用相同数据的人工分析结果进行了比较,表明GAs不仅为医疗保健系统引入了新的威胁,而且与以往研究提出的其他威胁相似。
{"title":"Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression","authors":"R. Ahmad, Ganthan Narayana Samy, Nuzulha Khilwani Ibrahim, P. Bath, Z. Ismail","doi":"10.1109/IAS.2009.313","DOIUrl":"https://doi.org/10.1109/IAS.2009.313","url":null,"abstract":"Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which interest them (e.g., virus attack). Certain factors which may be important remain unexplored. In addition, lack of tools and technologies directed to limited number of threats traced in healthcare system. Thus it introduces bias in threat analysis. This study explored the use of biological computational termed Genetic Algorithm (GAs) combined with Cox regression (CoRGA) in identifying a potential threat for healthcare system. The results show that variable described “misused of e-mail” is the major information security threats for healthcare system. Results were compared with manual analysis using the same data, and it is shows that GAs not just introducing new threats for healthcare system but it was similar with others threats proposed by previous researches.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"65 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130538084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks 一种高效的移动Ad Hoc网络匿名路由协议
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.267
Xiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang
Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the purpose of security and privacy concerns. But there are very few have been done about providing a valid method to detect malicious node and providing a trustworthy protection over whole network. In this paper, we introduce a localized trust management which can primarily remove malicious nodes, and propose an efficient anonymous routing protocol by node that participates in the protocol encrypts entire message with trust key and says Hello to its ancestor within expiration time. It makes malicious node can be detected and isolated from the network. In this way, a anonymous and secure route path can be established in a hostile environment. Meanwhile, it is able to efficiently against the Denial-of-Service (DoS) attack.
在移动自组织网络(MANET)中提供匿名路由一直是安全和隐私问题的热点问题。但是,在提供一种有效的方法来检测恶意节点并在整个网络中提供可靠的保护方面,研究还很少。在本文中,我们引入了一种本地化的信任管理方法,可以主要去除恶意节点,并提出了一种高效的匿名路由协议,该协议通过参与节点对整个消息进行信任密钥加密,并在有效时间内对其祖先说Hello。它使恶意节点能够被检测到并与网络隔离。通过这种方式,可以在恶意环境下建立匿名、安全的路由路径。同时,能够有效地抵御DoS (Denial-of-Service)攻击。
{"title":"An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks","authors":"Xiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang","doi":"10.1109/IAS.2009.267","DOIUrl":"https://doi.org/10.1109/IAS.2009.267","url":null,"abstract":"Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the purpose of security and privacy concerns. But there are very few have been done about providing a valid method to detect malicious node and providing a trustworthy protection over whole network. In this paper, we introduce a localized trust management which can primarily remove malicious nodes, and propose an efficient anonymous routing protocol by node that participates in the protocol encrypts entire message with trust key and says Hello to its ancestor within expiration time. It makes malicious node can be detected and isolated from the network. In this way, a anonymous and secure route path can be established in a hostile environment. Meanwhile, it is able to efficiently against the Denial-of-Service (DoS) attack.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131462345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
An Approach to Group Decision Making Based on Incomplete Linguistic Preference Relations 基于不完全语言偏好关系的群体决策方法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.204
Tien-Chin Wang, S. Peng, S. Hsu, Jui-Fang Chang
This study not only applies Multi-Criteria Decision Making with Incomplete Linguistic model (InlinPreRa) and uses horizontal, vertical and oblique pairwise comparison algorithms to construct but also expansion group decision making model. When the decision maker is carrying out the pairwise comparison, the following problems can be avoided: time pressure, lack of complete information, the decision maker is lack of this professional knowledge, or the information provided is unreal and thus it is difficult to obtain information.
本研究运用inlinpreera多准则决策模型(Multi-Criteria Decision Making with Incomplete Linguistic model, inlinpreera),并运用水平、垂直和倾斜的两两比较算法构建和扩展群体决策模型。当决策者进行两两比较时,可以避免以下问题:时间紧迫,信息不完整,决策者缺乏该专业知识,或者提供的信息不真实,难以获得信息。
{"title":"An Approach to Group Decision Making Based on Incomplete Linguistic Preference Relations","authors":"Tien-Chin Wang, S. Peng, S. Hsu, Jui-Fang Chang","doi":"10.1109/IAS.2009.204","DOIUrl":"https://doi.org/10.1109/IAS.2009.204","url":null,"abstract":"This study not only applies Multi-Criteria Decision Making with Incomplete Linguistic model (InlinPreRa) and uses horizontal, vertical and oblique pairwise comparison algorithms to construct but also expansion group decision making model. When the decision maker is carrying out the pairwise comparison, the following problems can be avoided: time pressure, lack of complete information, the decision maker is lack of this professional knowledge, or the information provided is unreal and thus it is difficult to obtain information.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131596428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Hardware/Software Codesign of Resource Constrained Real-Time Systems 资源受限实时系统的软硬件协同设计
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.19
Chia-Cheng Lo, Jung-Guan Luo, Ming-Der Shieh
System-level design methods can provide a systematic and effective way of evaluating various design options, thus shortening the product development time. This paper relaxes the HC algorithm by considering the K best candidates in each clustering iteration to alleviate the possibility of being trapped in local minimum during hardware/software (HW/SW) partition. We also present an architecture mapping algorithm together with the defined sensitivity measure to further reduce the hardware requirement. Simulation results show that the complexity of exploration time can be greatly reduced with only little performance loss as compared to the exhaustive search. The proposed algorithm can thus provide a good compromise between exploration time and accuracy.
系统级设计方法可以提供一种系统有效的方法来评估各种设计方案,从而缩短产品开发时间。本文通过在每次聚类迭代中考虑K个最佳候选者来放宽HC算法,以减轻在硬件/软件(HW/SW)划分时陷入局部最小值的可能性。我们还提出了一种架构映射算法和定义的灵敏度度量,以进一步降低硬件要求。仿真结果表明,与穷举搜索相比,该方法可以大大降低搜索时间的复杂度,而性能损失很小。因此,该算法可以在探测时间和精度之间提供一个很好的折衷。
{"title":"Hardware/Software Codesign of Resource Constrained Real-Time Systems","authors":"Chia-Cheng Lo, Jung-Guan Luo, Ming-Der Shieh","doi":"10.1109/IAS.2009.19","DOIUrl":"https://doi.org/10.1109/IAS.2009.19","url":null,"abstract":"System-level design methods can provide a systematic and effective way of evaluating various design options, thus shortening the product development time. This paper relaxes the HC algorithm by considering the K best candidates in each clustering iteration to alleviate the possibility of being trapped in local minimum during hardware/software (HW/SW) partition. We also present an architecture mapping algorithm together with the defined sensitivity measure to further reduce the hardware requirement. Simulation results show that the complexity of exploration time can be greatly reduced with only little performance loss as compared to the exhaustive search. The proposed algorithm can thus provide a good compromise between exploration time and accuracy.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121669423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 Fifth International Conference on Information Assurance and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1