首页 > 最新文献

2017 International Conference on Computing Intelligence and Information System (CIIS)最新文献

英文 中文
Network Traffic Anomaly Detection Based on Dynamic Programming 基于动态规划的网络流量异常检测
Qing Yu, Xi-Wu Gu
In this paper, an optimum dynamic programming (DP) based time-normalization algorithm is designed for Network traffic anomaly detection. The two sets of data matched namely the sample data and the actual data, will need to calculate the time normalized distance through dynamic programming so as to achieve the effect of the anomaly detection, and have been using dynamic programming matching symmetry. By analyzing the experimental data, the traffic anomaly detection based on symmetry dynamic programming verify the improvement in the accuracy.
本文设计了一种基于最优动态规划(DP)的网络流量异常检测时间归一化算法。对于匹配的两组数据即样本数据和实际数据,需要通过动态规划计算时间归一化距离,从而达到异常检测的效果,一直采用动态规划匹配对称。通过对实验数据的分析,验证了基于对称动态规划的流量异常检测精度的提高。
{"title":"Network Traffic Anomaly Detection Based on Dynamic Programming","authors":"Qing Yu, Xi-Wu Gu","doi":"10.1109/CIIS.2017.18","DOIUrl":"https://doi.org/10.1109/CIIS.2017.18","url":null,"abstract":"In this paper, an optimum dynamic programming (DP) based time-normalization algorithm is designed for Network traffic anomaly detection. The two sets of data matched namely the sample data and the actual data, will need to calculate the time normalized distance through dynamic programming so as to achieve the effect of the anomaly detection, and have been using dynamic programming matching symmetry. By analyzing the experimental data, the traffic anomaly detection based on symmetry dynamic programming verify the improvement in the accuracy.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121404744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Study on the Robustness Based on PID Fuzzy Controller 基于PID模糊控制器的鲁棒性研究
Q. Song, Yaochun Wu
Fuzzy control has lots of advantages compared with traditional PID control. Good performance can be obtained by fuzzy control without mathematic model of control object. Meanwhile, fuzzy controller is equipped with high stability and robustness. The characteristics of traditional PID control and fuzzy controls were integrated as fuzzy PID control, greatly enhancing performance of the controller. The work discussed the design of fuzzy parameter self-tuning PID controller. The performance of the controller was compared with traditional PID controller mainly from the robustness. Results indicated robustness of fuzzy PID controller is better after comparison.
与传统的PID控制相比,模糊控制具有许多优点。模糊控制不需要对控制对象建立数学模型,可以获得较好的控制效果。同时,模糊控制器具有较高的稳定性和鲁棒性。将传统PID控制和模糊控制的特点融合为模糊PID控制,大大提高了控制器的性能。讨论了模糊参数自整定PID控制器的设计。主要从鲁棒性方面比较了该控制器与传统PID控制器的性能。结果表明,模糊PID控制器具有较好的鲁棒性。
{"title":"Study on the Robustness Based on PID Fuzzy Controller","authors":"Q. Song, Yaochun Wu","doi":"10.1109/CIIS.2017.30","DOIUrl":"https://doi.org/10.1109/CIIS.2017.30","url":null,"abstract":"Fuzzy control has lots of advantages compared with traditional PID control. Good performance can be obtained by fuzzy control without mathematic model of control object. Meanwhile, fuzzy controller is equipped with high stability and robustness. The characteristics of traditional PID control and fuzzy controls were integrated as fuzzy PID control, greatly enhancing performance of the controller. The work discussed the design of fuzzy parameter self-tuning PID controller. The performance of the controller was compared with traditional PID controller mainly from the robustness. Results indicated robustness of fuzzy PID controller is better after comparison.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122825998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Best Performance Evaluation of Encryption Algorithms to Reduce Power Consumption in WSN 降低无线传感器网络功耗的加密算法的最佳性能评估
M. A. A. Sibahee, Songfeng Lu, Z. Hussien, M. Hussain, Keyan Abdul-Aziz Mutlaq, Z. Abduljabbar
Wireless Sensor Networks (WSNs), applications are growing rapidly, so the needs to protect such applications are increased. Cryptography plays a main role in information system security where encryption algorithm is the essential component of the security. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of four of the most common encryption algorithms namely: RC4, DES, and AES as a symmetric cipher and RSA for asymmetric cipher. A comparison has been conducted for those encryption algorithms at different settings such as different sizes of data blocks, different key size and finally encryption/decryption speed. Simulation results are given to demonstrate the effectiveness of each algorithm on power consuming.
无线传感器网络(wsn)的应用正在迅速增长,因此对此类应用的保护需求也在增加。密码学在信息系统安全中占有重要地位,而加密算法是信息系统安全的重要组成部分。另一方面,这些算法消耗了大量的计算资源,如CPU时间、内存和电池电量。本文提供了四种最常见的加密算法的评估,即RC4, DES和AES作为对称密码和RSA作为非对称密码。比较了不同数据块大小、不同密钥大小、最终加解密速度等不同设置下的加密算法。仿真结果验证了各算法在功耗方面的有效性。
{"title":"The Best Performance Evaluation of Encryption Algorithms to Reduce Power Consumption in WSN","authors":"M. A. A. Sibahee, Songfeng Lu, Z. Hussien, M. Hussain, Keyan Abdul-Aziz Mutlaq, Z. Abduljabbar","doi":"10.1109/CIIS.2017.50","DOIUrl":"https://doi.org/10.1109/CIIS.2017.50","url":null,"abstract":"Wireless Sensor Networks (WSNs), applications are growing rapidly, so the needs to protect such applications are increased. Cryptography plays a main role in information system security where encryption algorithm is the essential component of the security. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of four of the most common encryption algorithms namely: RC4, DES, and AES as a symmetric cipher and RSA for asymmetric cipher. A comparison has been conducted for those encryption algorithms at different settings such as different sizes of data blocks, different key size and finally encryption/decryption speed. Simulation results are given to demonstrate the effectiveness of each algorithm on power consuming.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131261575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Non-redundant Distributed Database Allocation Technology Research 非冗余分布式数据库分配技术研究
Qiao Sun, Bu-qiao Deng, Lan-mei Fu, Jiasong Sun
Redundancy is a traditional technique for improving the reliability of distributed systems. In many scenes, system redundancy is not available or not feasible. How to assign the tasks of parallel applications to the distributed system's processors and maximize the reliability of the system becomes one of the important issues that need to be studied. This paper proposes a dynamic non-redundant data allocation method for distributed database system, which specifies the fragment update parameters and dynamic cost parameters, to find the best solution for reallocating redundant data. Specifically, we use the parameters to iterative estimate the reassignment of the fragment to the cost of the node, according to the choice of the lowest cost of the node for data migration. The result shows that this kind of scheme can make full use of the advantages of non-redundant data allocation and fasten the speech of communication, which can further improve the consistency and reliability of the distributed database system.
冗余是提高分布式系统可靠性的一种传统技术。在许多场景中,系统冗余是不可用的或不可行的。如何将并行应用的任务分配给分布式系统的处理器,最大限度地提高系统的可靠性成为需要研究的重要问题之一。本文提出了一种分布式数据库系统的动态非冗余数据分配方法,该方法规定了分片更新参数和动态代价参数,以寻找冗余数据的最佳重新分配方案。具体来说,我们根据选择成本最低的节点进行数据迁移,使用参数迭代估计片段重新分配给节点的成本。结果表明,该方案能充分利用分布式数据库系统无冗余数据分配的优势,加快通信语音,进一步提高分布式数据库系统的一致性和可靠性。
{"title":"Non-redundant Distributed Database Allocation Technology Research","authors":"Qiao Sun, Bu-qiao Deng, Lan-mei Fu, Jiasong Sun","doi":"10.1109/CIIS.2017.57","DOIUrl":"https://doi.org/10.1109/CIIS.2017.57","url":null,"abstract":"Redundancy is a traditional technique for improving the reliability of distributed systems. In many scenes, system redundancy is not available or not feasible. How to assign the tasks of parallel applications to the distributed system's processors and maximize the reliability of the system becomes one of the important issues that need to be studied. This paper proposes a dynamic non-redundant data allocation method for distributed database system, which specifies the fragment update parameters and dynamic cost parameters, to find the best solution for reallocating redundant data. Specifically, we use the parameters to iterative estimate the reassignment of the fragment to the cost of the node, according to the choice of the lowest cost of the node for data migration. The result shows that this kind of scheme can make full use of the advantages of non-redundant data allocation and fasten the speech of communication, which can further improve the consistency and reliability of the distributed database system.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132457963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Cloud Storage and Quick Keyword Based Retrieval System 安全云存储与基于关键字的快速检索系统
Song Lu, Abdulruhman I Ahmed Abomakhelb
In recent years, Cloud Computing becomes more prevalent in data store domain. More and more sensitive to store information into the cloud, Due to the importance the protection of data privacy, to protect sensitive data, should be encrypted before outsourcing, which makes ineffective data utilization and a very challenging task. Although the protection of the privacy of the data has to be encrypted, There should be schemes allow a user to securely search over encrypted data through keywords and selectively retrieve the appropriate files interest. These techniques support only exact searchable over encryption. In this paper, find a solution to the problem of effective keyword search over encrypted cloud data while maintaining keyword privacy. Keyword search greatly enhances system usability by returning the matching files when users' searching inputs exactly match the predefined keywords. In our solution, we extract the keywords from the file and encrypted the keywords then added into the index. Instead of storing file and searchable index on a cloud system, the proposed system will store the file on cloud and store searchable index on a private server. Which greatly reduces network congestion and representation overheads, also retrieval fast for files, and reduces the storage by file compression With enhanced security using encryption techniques and permission to access the data, through accurate security analysis, we show that our proposed solution is secure and privacy-preserving, while correctly realizing the goal of retrieval data.
近年来,云计算在数据存储领域越来越流行。越来越多的敏感信息存储到云端,由于保护数据隐私的重要性,为了保护敏感数据,在外包之前应该进行加密,这使得无效的数据利用成为一项非常具有挑战性的任务。虽然数据的隐私保护必须加密,但应该有一些方案允许用户通过关键字安全地搜索加密的数据,并有选择地检索适当的文件兴趣。这些技术只支持精确的加密搜索。本文主要研究如何在保证关键字隐私的前提下,对加密的云数据进行有效的关键字搜索。当用户的搜索输入与预定义的关键字完全匹配时,关键字搜索将返回匹配的文件,从而大大提高了系统的可用性。在我们的解决方案中,我们从文件中提取关键字并对关键字进行加密,然后将其添加到索引中。该系统不再将文件和可搜索索引存储在云系统上,而是将文件存储在云上,并将可搜索索引存储在专用服务器上。该方法大大降低了网络拥塞和表示开销,而且文件检索速度快,通过压缩文件减少了存储空间,通过加密技术和访问权限增强了安全性,通过准确的安全性分析表明,该方案在正确实现数据检索目标的同时,具有安全性和保密性。
{"title":"Secure Cloud Storage and Quick Keyword Based Retrieval System","authors":"Song Lu, Abdulruhman I Ahmed Abomakhelb","doi":"10.1109/CIIS.2017.67","DOIUrl":"https://doi.org/10.1109/CIIS.2017.67","url":null,"abstract":"In recent years, Cloud Computing becomes more prevalent in data store domain. More and more sensitive to store information into the cloud, Due to the importance the protection of data privacy, to protect sensitive data, should be encrypted before outsourcing, which makes ineffective data utilization and a very challenging task. Although the protection of the privacy of the data has to be encrypted, There should be schemes allow a user to securely search over encrypted data through keywords and selectively retrieve the appropriate files interest. These techniques support only exact searchable over encryption. In this paper, find a solution to the problem of effective keyword search over encrypted cloud data while maintaining keyword privacy. Keyword search greatly enhances system usability by returning the matching files when users' searching inputs exactly match the predefined keywords. In our solution, we extract the keywords from the file and encrypted the keywords then added into the index. Instead of storing file and searchable index on a cloud system, the proposed system will store the file on cloud and store searchable index on a private server. Which greatly reduces network congestion and representation overheads, also retrieval fast for files, and reduces the storage by file compression With enhanced security using encryption techniques and permission to access the data, through accurate security analysis, we show that our proposed solution is secure and privacy-preserving, while correctly realizing the goal of retrieval data.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"6 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120835880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Confidence Interval Estimation Based on Ohba's Software Reliability Growth Model 基于Ohba软件可靠性增长模型的有效置信区间估计
Po-Chiang Tsai, Chih-Chiang Fang
Software reliability is an essential quality indicator which can provide critical messages for software managers. Due to fact that most of researchers might improperly infer the variance regarding the mean value function, its confidence interval would not conform to the real world situation. In this situation, software manager cannot accurately estimate the possible risk variation of software system by using the randomness of mean value function, and it might debase the practicability of applications. In this paper, Ohba's model is used to build the SRGM with confidence intervals that can help the software developers to effectively determine the optimal release time in practice.
软件可靠性是一项重要的质量指标,可以为软件管理者提供关键的信息。由于大多数研究者对均值函数的方差推断不正确,其置信区间不符合现实情况。在这种情况下,软件管理者无法利用均值函数的随机性准确估计软件系统可能发生的风险变化,可能会降低应用的实用性。本文利用Ohba的模型构建具有置信区间的SRGM,帮助软件开发人员在实践中有效地确定最优发布时间。
{"title":"Effective Confidence Interval Estimation Based on Ohba's Software Reliability Growth Model","authors":"Po-Chiang Tsai, Chih-Chiang Fang","doi":"10.1109/CIIS.2017.38","DOIUrl":"https://doi.org/10.1109/CIIS.2017.38","url":null,"abstract":"Software reliability is an essential quality indicator which can provide critical messages for software managers. Due to fact that most of researchers might improperly infer the variance regarding the mean value function, its confidence interval would not conform to the real world situation. In this situation, software manager cannot accurately estimate the possible risk variation of software system by using the randomness of mean value function, and it might debase the practicability of applications. In this paper, Ohba's model is used to build the SRGM with confidence intervals that can help the software developers to effectively determine the optimal release time in practice.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120931467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Content-Based Image Retrieval Based on Multi-feature Fusion Optimized by Brain Storm Optimization 基于头脑风暴优化多特征融合的基于内容的图像检索
Hengjun Zhou, M. Jiang
With the fast development of information technology and increasing number of image database, how to retrieval a large amount of information from the image quickly and effectively becomes more and more important. Brain Storm Optimization (BSO) is simple, robust and has high searching precision. So it is applied into the image retrieval in this paper. Content-based image retrieval (CBIR) extracts the color, texture, shape and other low-level visual features of images to realize image matching. Compared with image retrieval based on single feature, image retrieval based on multi-feature fusion can fully represent image information. In the multi-feature fusion, the ratio of each feature selection is critical to the search result. Traditional method is manually set or proportional integration, which ignores the priority between the various features. This paper uses BSO for image retrieval. Color histogram, color moment, color structure descriptor, Tamura texture feature, GLCM texture, wavelet transform texture, Gabor transform texture, edge histogram descriptors and Hu invariant moment are extracted in the paper and BSO is used for image retrieval. Experiment results show that the proposed method can retrieval the target image accurately and improve the precision of the system.
随着信息技术的快速发展和图像数据库数量的不断增加,如何快速有效地从图像中检索大量信息变得越来越重要。头脑风暴优化算法具有简单、鲁棒性好、搜索精度高等特点。因此,本文将其应用到图像检索中。基于内容的图像检索(CBIR)通过提取图像的颜色、纹理、形状等底层视觉特征来实现图像匹配。与基于单一特征的图像检索相比,基于多特征融合的图像检索能更全面地表示图像信息。在多特征融合中,各特征选择的比例对搜索结果至关重要。传统的方法是手动设置或比例积分,忽略了各种特征之间的优先级。本文采用BSO进行图像检索。本文提取了颜色直方图、颜色矩、颜色结构描述子、Tamura纹理特征、GLCM纹理、小波变换纹理、Gabor变换纹理、边缘直方图描述子和Hu不变矩,并利用BSO进行图像检索。实验结果表明,该方法能够准确地检索目标图像,提高了系统的精度。
{"title":"Content-Based Image Retrieval Based on Multi-feature Fusion Optimized by Brain Storm Optimization","authors":"Hengjun Zhou, M. Jiang","doi":"10.1109/CIIS.2017.20","DOIUrl":"https://doi.org/10.1109/CIIS.2017.20","url":null,"abstract":"With the fast development of information technology and increasing number of image database, how to retrieval a large amount of information from the image quickly and effectively becomes more and more important. Brain Storm Optimization (BSO) is simple, robust and has high searching precision. So it is applied into the image retrieval in this paper. Content-based image retrieval (CBIR) extracts the color, texture, shape and other low-level visual features of images to realize image matching. Compared with image retrieval based on single feature, image retrieval based on multi-feature fusion can fully represent image information. In the multi-feature fusion, the ratio of each feature selection is critical to the search result. Traditional method is manually set or proportional integration, which ignores the priority between the various features. This paper uses BSO for image retrieval. Color histogram, color moment, color structure descriptor, Tamura texture feature, GLCM texture, wavelet transform texture, Gabor transform texture, edge histogram descriptors and Hu invariant moment are extracted in the paper and BSO is used for image retrieval. Experiment results show that the proposed method can retrieval the target image accurately and improve the precision of the system.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"393 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122994705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MCIR: A Multi-modal Image Registration Algorithm Based on Membrane Computing 基于膜计算的多模态图像配准算法
Zhilv Gao, Chengfang Zhang
In order to realize the rapid and exact image registration, a multi-modal image registration algorithm under the framework of membrane computing is proposed in this paper, which is named as MCIR algorithm. First, a cell-like P system of membrane structure is designed. Each object in membranes represents a group of transform parameters of floated images. All objects are constantly evolved by the group intelligent algorithm, which obtains the best parameters and transforms them into upper-layer membrane. At the same time, the best objects between the same layers transport randomly in the process of evolution. Finally, the global optimal object is stored in the skin membrane. The proposed MCIR algorithm is evaluated on the multi-modal image, such as the computer tomography (CT) images of the brain, the visible images, and the thermal infrared images. Our algorithm is superior to other methods in terms of properties of global convergence and obtains better registration accuracy and robustness.
为了实现快速准确的图像配准,本文提出了一种膜计算框架下的多模态图像配准算法,称为MCIR算法。首先,设计了膜结构的类细胞P体系。膜中的每个对象代表一组浮动图像的变换参数。通过群体智能算法对所有目标进行不断演化,得到最优参数并将其转化为上层膜。同时,同一层间的最佳目标在演化过程中会随机迁移。最后,将全局最优目标存储在皮肤膜中。提出的MCIR算法在多模态图像上进行了评估,如大脑的计算机断层扫描(CT)图像、可见光图像和热红外图像。该算法在全局收敛性方面优于其他方法,具有更好的配准精度和鲁棒性。
{"title":"MCIR: A Multi-modal Image Registration Algorithm Based on Membrane Computing","authors":"Zhilv Gao, Chengfang Zhang","doi":"10.1109/CIIS.2017.46","DOIUrl":"https://doi.org/10.1109/CIIS.2017.46","url":null,"abstract":"In order to realize the rapid and exact image registration, a multi-modal image registration algorithm under the framework of membrane computing is proposed in this paper, which is named as MCIR algorithm. First, a cell-like P system of membrane structure is designed. Each object in membranes represents a group of transform parameters of floated images. All objects are constantly evolved by the group intelligent algorithm, which obtains the best parameters and transforms them into upper-layer membrane. At the same time, the best objects between the same layers transport randomly in the process of evolution. Finally, the global optimal object is stored in the skin membrane. The proposed MCIR algorithm is evaluated on the multi-modal image, such as the computer tomography (CT) images of the brain, the visible images, and the thermal infrared images. Our algorithm is superior to other methods in terms of properties of global convergence and obtains better registration accuracy and robustness.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122149292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application of Phase Space Reconstruction in a Few-Channel EEG-NIRS Bimodal Brain-Computer Interface System 相空间重构在少通道脑电-近红外双峰脑机接口系统中的应用
Yuchen Xie, Qing Yang, Pan Lin, Y. Leng, Yuankui Yang, Haixian Wang, S. Ge
We developed a highly accurate, few-channel, bimodal electroencephalograph (EEG) and near-infrared spectroscopy (NIRS) brain-computer interface (BCI) system by developing new methods for signal processing and feature extraction. For data processing, we performed source analysis of EEG and NIRS signals to select the best channels from which to build a few-channel system. For EEG feature extraction, we used phase space reconstruction to convert EEG few-channel signals into multichannel signals, facilitating the extraction of EEG features by common spatial pattern. The Hurst exponent of the selected 10 channels constituted the extracted NIRS data feature. For pattern classification, we fused EEG and NIRS features together and used the support vector machine classification method. The average accuracy of bimodal EEG-NIRS was significantly higher than that of either EEG or NIRS as unimodal techniques.
我们通过开发新的信号处理和特征提取方法,开发了一种高精度,少通道,双峰脑电图(EEG)和近红外光谱(NIRS)脑机接口(BCI)系统。在数据处理方面,我们对EEG和NIRS信号进行了源分析,从中选择最佳通道构建少通道系统。在脑电信号特征提取方面,我们采用相空间重构的方法,将脑电信号的少通道信号转换成多通道信号,利用共同的空间模式提取脑电信号特征。选取的10个通道的Hurst指数构成提取的近红外光谱数据特征。在模式分类方面,我们将脑电特征和近红外特征融合在一起,采用支持向量机分类方法。双峰脑电图-近红外光谱的平均准确率显著高于单峰脑电图或近红外光谱。
{"title":"Application of Phase Space Reconstruction in a Few-Channel EEG-NIRS Bimodal Brain-Computer Interface System","authors":"Yuchen Xie, Qing Yang, Pan Lin, Y. Leng, Yuankui Yang, Haixian Wang, S. Ge","doi":"10.1109/CIIS.2017.19","DOIUrl":"https://doi.org/10.1109/CIIS.2017.19","url":null,"abstract":"We developed a highly accurate, few-channel, bimodal electroencephalograph (EEG) and near-infrared spectroscopy (NIRS) brain-computer interface (BCI) system by developing new methods for signal processing and feature extraction. For data processing, we performed source analysis of EEG and NIRS signals to select the best channels from which to build a few-channel system. For EEG feature extraction, we used phase space reconstruction to convert EEG few-channel signals into multichannel signals, facilitating the extraction of EEG features by common spatial pattern. The Hurst exponent of the selected 10 channels constituted the extracted NIRS data feature. For pattern classification, we fused EEG and NIRS features together and used the support vector machine classification method. The average accuracy of bimodal EEG-NIRS was significantly higher than that of either EEG or NIRS as unimodal techniques.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131361080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mathematical Modeling of Pursuit-Evasion System for Video Surveillance Network 视频监控网络追逃系统的数学建模
Wenjun Wang, Fanliang Bu
This paper mainly proposed a kind of algorithm based on moving object detection and direction recognition, with a variety of data in video surveillance system, constructing a moving objects trajectories system with a combination of artificial and video surveillance system, to find escape routes of suspects accurately and make work easy for investigators. This system was created by Python language, MySQL database language and Open CV direction recognition technology, completing usage of map, creating database structure and recognizing the direction of a moving object, to predict object moving direction.
本文主要提出了一种基于运动物体检测和方向识别的算法,结合视频监控系统中的各种数据,构建一个人工与视频监控系统相结合的运动物体轨迹系统,准确地找到犯罪嫌疑人的逃跑路线,方便侦查人员工作。本系统采用Python语言、MySQL数据库语言和Open CV方向识别技术,完成地图的使用,创建数据库结构,识别运动物体的方向,预测物体的运动方向。
{"title":"Mathematical Modeling of Pursuit-Evasion System for Video Surveillance Network","authors":"Wenjun Wang, Fanliang Bu","doi":"10.1109/CIIS.2017.48","DOIUrl":"https://doi.org/10.1109/CIIS.2017.48","url":null,"abstract":"This paper mainly proposed a kind of algorithm based on moving object detection and direction recognition, with a variety of data in video surveillance system, constructing a moving objects trajectories system with a combination of artificial and video surveillance system, to find escape routes of suspects accurately and make work easy for investigators. This system was created by Python language, MySQL database language and Open CV direction recognition technology, completing usage of map, creating database structure and recognizing the direction of a moving object, to predict object moving direction.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130016276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 International Conference on Computing Intelligence and Information System (CIIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1