Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579330
Jifeng Sun, Jinhua Ouyang
An improved particle swarm optimization scheme for codebook design is proposed in this paper. By sorting the training vector, we select the initial codebook to enhance the diversity of search, and add stagnant judging algebra to prevent the algorithm falling into a local optimum. The simulation results prove that the improved method is reasonable.
{"title":"Codebook design of vector quantization based on improved particle swarm optimization","authors":"Jifeng Sun, Jinhua Ouyang","doi":"10.1109/ICACTE.2010.5579330","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579330","url":null,"abstract":"An improved particle swarm optimization scheme for codebook design is proposed in this paper. By sorting the training vector, we select the initial codebook to enhance the diversity of search, and add stagnant judging algebra to prevent the algorithm falling into a local optimum. The simulation results prove that the improved method is reasonable.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124881468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5578927
Qingbin Li, Junxiao Xue
This paper presents an approach that uses conformal mapping to flattening a 3D surface to 2D plane. We propose an algorithm by traversing the mesh in a region growing way. The algorithm is greedy and begins with a seed triangle which can be chosen freely. In each operation, we develop a piecewise linear mapping function that is conformal. In addition, at first step, we initialize the planar triangle which corresponding to the seed triangle. The initialization ensures that the seed triangle flattening process produce no distortion. And in other steps, we reduce the distortion by unifying the vertices in the plane. Our approach is efficient and fast enough.
{"title":"Conformal flattening of non-planar surface","authors":"Qingbin Li, Junxiao Xue","doi":"10.1109/ICACTE.2010.5578927","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5578927","url":null,"abstract":"This paper presents an approach that uses conformal mapping to flattening a 3D surface to 2D plane. We propose an algorithm by traversing the mesh in a region growing way. The algorithm is greedy and begins with a seed triangle which can be chosen freely. In each operation, we develop a piecewise linear mapping function that is conformal. In addition, at first step, we initialize the planar triangle which corresponding to the seed triangle. The initialization ensures that the seed triangle flattening process produce no distortion. And in other steps, we reduce the distortion by unifying the vertices in the plane. Our approach is efficient and fast enough.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125007508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579129
Yong Zhang, Linjie Zhu
To address the problem of less rare data and low detection accuracy, The paper proposes a heterogeneous classifier integrated by the random forests, support vector machines, clustering and Bayesian classifier to increase the detecting accuracy of rare class, and to detect rare class with the greatest weighted voting. Experimental results show that utilizing integration of heterogeneous classifiers in intrusion detection system can improve obviously detection precision and decrease false positive rate.
{"title":"Integration of heterogeneous classifiers for intrusion detection","authors":"Yong Zhang, Linjie Zhu","doi":"10.1109/ICACTE.2010.5579129","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579129","url":null,"abstract":"To address the problem of less rare data and low detection accuracy, The paper proposes a heterogeneous classifier integrated by the random forests, support vector machines, clustering and Bayesian classifier to increase the detecting accuracy of rare class, and to detect rare class with the greatest weighted voting. Experimental results show that utilizing integration of heterogeneous classifiers in intrusion detection system can improve obviously detection precision and decrease false positive rate.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125076473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579819
Z. Ahmad, Jamalul-lail Ab Manan, S. Sulaiman
Federated identity management system interconnects distributed island of identity management systems with federated identity standards with single sign-on facility. In an open environment, such as those of a federated identity management system a user single sign-on credentials, can easily fall prey to identity theft, or unlawful information gathering. It may use either existing account or new account fraud. In this paper, we present scenarios related to identity theft, unlawful information gathering and tracking. We show the main issue of lack of platform trust in platforms involve in federated systems and discussed the consequences of respective threats on them. In an effort to present a holistic approach to handle security, trust and privacy, we propose a user requirement model involving these core issues for federated identities. These requirements include system trustworthiness, hardware protected key generations, usability, efficiency, identity information validity, privacy, accountability and system robustness. In our proposed model, Trusted Platform Module (TPM), is the fundamental component which ties and binds all communicating platforms together in authentication, verification and trustworthiness of the platform.
{"title":"User requirement model for federated identities threats","authors":"Z. Ahmad, Jamalul-lail Ab Manan, S. Sulaiman","doi":"10.1109/ICACTE.2010.5579819","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579819","url":null,"abstract":"Federated identity management system interconnects distributed island of identity management systems with federated identity standards with single sign-on facility. In an open environment, such as those of a federated identity management system a user single sign-on credentials, can easily fall prey to identity theft, or unlawful information gathering. It may use either existing account or new account fraud. In this paper, we present scenarios related to identity theft, unlawful information gathering and tracking. We show the main issue of lack of platform trust in platforms involve in federated systems and discussed the consequences of respective threats on them. In an effort to present a holistic approach to handle security, trust and privacy, we propose a user requirement model involving these core issues for federated identities. These requirements include system trustworthiness, hardware protected key generations, usability, efficiency, identity information validity, privacy, accountability and system robustness. In our proposed model, Trusted Platform Module (TPM), is the fundamental component which ties and binds all communicating platforms together in authentication, verification and trustworthiness of the platform.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125128756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579443
Xiajiong Shen, Qing Cong, Sheng Wang
Locality Preserving Projection is a method which can extract the feature and reduce dimensionality effectively, which has been widely used in face recognition. However, it is also an unsupervised method, and it is an image vector-based method, needing to covert the face image into a vector. This conversion not only breaks the local structural information, but also brings lots of problems, such as the dimension of these converted vectors is too high and encounters the small sample size problem. And it is also an unsupervised method and has no directly relation to classification. In order to improve the performance of LPP, we present a method named Two-Dimensional Discriminant Locality Preserving Projection for extracting the feature and reduce dimensionality and apply it in face recognition. Experimental results on ORL and Yale databases suggest that the proposed 2DDLPP provides a better way to solve these problems and achieves lower error rates.
{"title":"Face recognition based on Two-Dimensional Discriminant Locality Preserving Projection","authors":"Xiajiong Shen, Qing Cong, Sheng Wang","doi":"10.1109/ICACTE.2010.5579443","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579443","url":null,"abstract":"Locality Preserving Projection is a method which can extract the feature and reduce dimensionality effectively, which has been widely used in face recognition. However, it is also an unsupervised method, and it is an image vector-based method, needing to covert the face image into a vector. This conversion not only breaks the local structural information, but also brings lots of problems, such as the dimension of these converted vectors is too high and encounters the small sample size problem. And it is also an unsupervised method and has no directly relation to classification. In order to improve the performance of LPP, we present a method named Two-Dimensional Discriminant Locality Preserving Projection for extracting the feature and reduce dimensionality and apply it in face recognition. Experimental results on ORL and Yale databases suggest that the proposed 2DDLPP provides a better way to solve these problems and achieves lower error rates.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125146146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579403
Zhao Ping, Du Chao, Yu Zhou
The PID control as a popularly control method that is used in the control system, this control method is still adopted in many practical applications of the process currently. The paper mainly discusses the classical PID tuning methods, and on the basis of the method, which achieve a small unmanned helicopter longitudinal PID control parameters optimization by introducing the idea of genetic algorithm. The performance of control system is assured when adopting genetic algorithms. The simulation results comparing with the classical PID tuning methods shows that PID controller that is designed with genetic algorithms is better flexibility, and can obtain the better control effect.
{"title":"Small unmanned helicopter longitudinal control PID parameter optimization based on genetic algorithm","authors":"Zhao Ping, Du Chao, Yu Zhou","doi":"10.1109/ICACTE.2010.5579403","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579403","url":null,"abstract":"The PID control as a popularly control method that is used in the control system, this control method is still adopted in many practical applications of the process currently. The paper mainly discusses the classical PID tuning methods, and on the basis of the method, which achieve a small unmanned helicopter longitudinal PID control parameters optimization by introducing the idea of genetic algorithm. The performance of control system is assured when adopting genetic algorithms. The simulation results comparing with the classical PID tuning methods shows that PID controller that is designed with genetic algorithms is better flexibility, and can obtain the better control effect.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"10 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125190958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579051
Wenjuan Wang, Yongquan Yu, Shoujian Lan
This paper analyze the influential factors of bus traffic volume. Use the concept of matter-element and correlation function to establish prediction model, the prediction results can be obtained by means of cluster analysis. Through analyzing and calculating the historical data of Guangzhou City, the results show that the model in the bus traffic volume is valid.
{"title":"Prediction of bus traffic volume based on extension cluster model","authors":"Wenjuan Wang, Yongquan Yu, Shoujian Lan","doi":"10.1109/ICACTE.2010.5579051","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579051","url":null,"abstract":"This paper analyze the influential factors of bus traffic volume. Use the concept of matter-element and correlation function to establish prediction model, the prediction results can be obtained by means of cluster analysis. Through analyzing and calculating the historical data of Guangzhou City, the results show that the model in the bus traffic volume is valid.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123474699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579513
L. Huran
A new theory of gearing: high order contact meshing theory of gearing is presented in this paper. We believe that this kind of gear profile is most suitable in both the contact and bending fatigue strength. From careful analysis and deep going investigation, we think that it is the profile of equal conjugate curvature with high order of contact, and analyzed the forming principle of this kind of profile. In this paper our aim is to deduce the theory to form this kind of profile, and produce the proto type of reducer of this kind of spiral bevel gear.
{"title":"The computer simulation of the spiral bevel gear with equal conjugate curvature","authors":"L. Huran","doi":"10.1109/ICACTE.2010.5579513","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579513","url":null,"abstract":"A new theory of gearing: high order contact meshing theory of gearing is presented in this paper. We believe that this kind of gear profile is most suitable in both the contact and bending fatigue strength. From careful analysis and deep going investigation, we think that it is the profile of equal conjugate curvature with high order of contact, and analyzed the forming principle of this kind of profile. In this paper our aim is to deduce the theory to form this kind of profile, and produce the proto type of reducer of this kind of spiral bevel gear.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125504683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579236
Chun-yu He, Jia-shan Jin, Song-bin Liu
LORA plays an important role in the supportability analysis of vessel equipment. There are much less LORA models dealing with few data, so, an optimization model based on LINGO is offered to solve the 3I3R vessel equipment, which is solved by programming. Finally, the model of LORA is practical and effective validated by a case.
{"title":"Optimization model of vessel equipment LORA based on LINGO","authors":"Chun-yu He, Jia-shan Jin, Song-bin Liu","doi":"10.1109/ICACTE.2010.5579236","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579236","url":null,"abstract":"LORA plays an important role in the supportability analysis of vessel equipment. There are much less LORA models dealing with few data, so, an optimization model based on LINGO is offered to solve the 3I3R vessel equipment, which is solved by programming. Finally, the model of LORA is practical and effective validated by a case.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125551528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579261
Yuehua Gao, Jing Li, Jun Han, Xiuping Zhang
Expert system development environment directly affects the efficiency and quality of development of expert system. According to modular machine tool spindle box's design complexity and design goals of multiple solutions, it identifies modular machine tool spindle box expert system platform is the Pro/Engineer. Its development tools are Visual C++6.0 and Pro/Toolkit, its database management system is Access. It has shortened modular machine tool spindle box expert system development cycle, not only increases flexibility of development process, but also laid the foundation for the main axle box subsequent CAM/CAE/CAPP.
专家系统开发环境直接影响到专家系统开发的效率和质量。根据组合机床主轴箱的设计复杂性和多种方案的设计目标,确定了组合机床主轴箱专家系统平台为Pro/Engineer。其开发工具为Visual c++ 6.0和Pro/Toolkit,数据库管理系统为Access。缩短了组合机床主轴箱专家系统的开发周期,不仅增加了开发过程的灵活性,而且为主轴箱后续的CAM/CAE/CAPP奠定了基础。
{"title":"Modular machine tool spindle box expert system development environment design","authors":"Yuehua Gao, Jing Li, Jun Han, Xiuping Zhang","doi":"10.1109/ICACTE.2010.5579261","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579261","url":null,"abstract":"Expert system development environment directly affects the efficiency and quality of development of expert system. According to modular machine tool spindle box's design complexity and design goals of multiple solutions, it identifies modular machine tool spindle box expert system platform is the Pro/Engineer. Its development tools are Visual C++6.0 and Pro/Toolkit, its database management system is Access. It has shortened modular machine tool spindle box expert system development cycle, not only increases flexibility of development process, but also laid the foundation for the main axle box subsequent CAM/CAE/CAPP.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126767341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}