首页 > 最新文献

Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things最新文献

英文 中文
A segmentation method for remote sensing image region on Riemannian manifolds 黎曼流形遥感图像区域分割方法
Hailong Zhu, Song Zhao, Xiping Duan
Focus on the issue of rotation and scale in-variance for remote sensing image(RSI) segmentation, a feature extraction and classification method is proposed based on differential space. A RSI is divided into many regions with different size, and all the covariance matrices of each region are calculated. Those covariance matrices construct a connected Riemannian manifold. The map relation between the Riemannian manifold and a Tangent space is built that contains an Exponent and a Logarithmic matrices computation. Furthermore, the distance measure is established on the Riemannian manifold. It is employed to segment regions of a RSI. Experiment results show that the method is efficient and has robust rotation and scale invariance.
针对遥感图像分割中的旋转和尺度方差问题,提出了一种基于差分空间的特征提取与分类方法。将RSI划分为多个大小不同的区域,计算每个区域的所有协方差矩阵。这些协方差矩阵构成一个连通的黎曼流形。建立了黎曼流形与正切空间之间的映射关系,其中包含一个指数矩阵和一个对数矩阵的计算。进一步,在黎曼流形上建立了距离测度。它被用来分割RSI的区域。实验结果表明,该方法是有效的,具有鲁棒的旋转和尺度不变性。
{"title":"A segmentation method for remote sensing image region on Riemannian manifolds","authors":"Hailong Zhu, Song Zhao, Xiping Duan","doi":"10.1109/ICAIOT.2015.7111530","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111530","url":null,"abstract":"Focus on the issue of rotation and scale in-variance for remote sensing image(RSI) segmentation, a feature extraction and classification method is proposed based on differential space. A RSI is divided into many regions with different size, and all the covariance matrices of each region are calculated. Those covariance matrices construct a connected Riemannian manifold. The map relation between the Riemannian manifold and a Tangent space is built that contains an Exponent and a Logarithmic matrices computation. Furthermore, the distance measure is established on the Riemannian manifold. It is employed to segment regions of a RSI. Experiment results show that the method is efficient and has robust rotation and scale invariance.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129417930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Virtual Endoscopy path planning 虚拟内窥镜路径规划研究
Hongxia Wang, Xiuzhen Wang
Some key techniques and realizations of Virtual Endoscopy are systematically investigated in this thesis. It consists of the reading of CT data, the pre-processing of medical images, the techniques of segment tissues, 3D Reconstruction and the techniques of path planning. Great stress is laid on 3D Reconstruction and the techniques of path planning in this thesis. The primary work of studies is as follows: First of all, Study the loading of the chest CT data and the pre-process of filtering and interpolation. Secondly, the semi-automatic thresholding algorithm based on thresholding segmentation is proposed. The CT images are segmented using the methods. In addition, Marching Cubes algorithms is improved in the process of VE rendering algorithm to improve the efficiency of rendering. Finally, based on the technique of distance transform method, this thesis puts forward a distance transform method on the basis of maximum-cost spanning tree, which is able to create central path quickly and to solve some branch questions.
本文对虚拟内窥镜的关键技术及其实现进行了系统的研究。它包括CT数据的读取、医学图像的预处理、组织分割技术、三维重建技术和路径规划技术。本文重点研究了三维重建和路径规划技术。研究的主要工作如下:首先,研究胸部CT数据的加载和滤波插值预处理。其次,提出了基于阈值分割的半自动阈值分割算法。利用该方法对CT图像进行分割。此外,在VE绘制算法的过程中对Marching Cubes算法进行了改进,提高了绘制效率。最后,本文在距离变换方法的基础上,提出了一种基于最大代价生成树的距离变换方法,该方法能够快速生成中心路径并解决一些分支问题。
{"title":"Research on Virtual Endoscopy path planning","authors":"Hongxia Wang, Xiuzhen Wang","doi":"10.1109/ICAIOT.2015.7111542","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111542","url":null,"abstract":"Some key techniques and realizations of Virtual Endoscopy are systematically investigated in this thesis. It consists of the reading of CT data, the pre-processing of medical images, the techniques of segment tissues, 3D Reconstruction and the techniques of path planning. Great stress is laid on 3D Reconstruction and the techniques of path planning in this thesis. The primary work of studies is as follows: First of all, Study the loading of the chest CT data and the pre-process of filtering and interpolation. Secondly, the semi-automatic thresholding algorithm based on thresholding segmentation is proposed. The CT images are segmented using the methods. In addition, Marching Cubes algorithms is improved in the process of VE rendering algorithm to improve the efficiency of rendering. Finally, based on the technique of distance transform method, this thesis puts forward a distance transform method on the basis of maximum-cost spanning tree, which is able to create central path quickly and to solve some branch questions.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134396382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Neural cognition and intelligent computing on the emotional symbols of cyber language 网络语言情感符号的神经认知与智能计算
Shuang Huang, Xuan Zhou, Weihui Dai, M. Ivanovi
This paper presented a mechanism model to describe the neural cognition of emotional symbols in cyber language, and discussed the subjective assessment of their emotional parameters in the PAD space. On this basis, an intelligent method was put forward for computing the dynamic emotional characteristics of the multi and mixed symbols in a cyber language message.
本文提出了一种描述网络语言情感符号神经认知的机制模型,并讨论了情感符号在PAD空间中的主观评价。在此基础上,提出了一种计算网络语言信息中多符号和混合符号动态情感特征的智能方法。
{"title":"Neural cognition and intelligent computing on the emotional symbols of cyber language","authors":"Shuang Huang, Xuan Zhou, Weihui Dai, M. Ivanovi","doi":"10.1109/ICAIOT.2015.7111561","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111561","url":null,"abstract":"This paper presented a mechanism model to describe the neural cognition of emotional symbols in cyber language, and discussed the subjective assessment of their emotional parameters in the PAD space. On this basis, an intelligent method was put forward for computing the dynamic emotional characteristics of the multi and mixed symbols in a cyber language message.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121850364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Color image encryption algorithm with realitypreserving fractional discrete cosine transform and spatiotemporal chaotic mapping 具有保真分数阶离散余弦变换和时空混沌映射的彩色图像加密算法
Liang Ya-ru, Liu Guo-ping, Wu Jian-hua
A color image encryption scheme is proposed based on a reality-preserving fractional discrete cosine transform (RPFrDCT) and spatiotemporal chaotic mapping. The scrambling and diffusion operations are carried out after the RPFrDCT and make three components of image affect each other. The main advantages of this scheme are the real-valued output, the nonlinear manipulation, the high sensitiveness and high robustness to the cipher keys. Experimental results demonstrate that the proposed encryption scheme is feasible and effective.
提出了一种基于保真分数阶离散余弦变换(RPFrDCT)和时空混沌映射的彩色图像加密方案。在RPFrDCT之后进行置乱和扩散操作,使图像的三个分量相互影响。该方案的主要优点是实数输出、非线性处理、对密钥的高灵敏度和高鲁棒性。实验结果证明了该加密方案的可行性和有效性。
{"title":"Color image encryption algorithm with realitypreserving fractional discrete cosine transform and spatiotemporal chaotic mapping","authors":"Liang Ya-ru, Liu Guo-ping, Wu Jian-hua","doi":"10.1109/ICAIOT.2015.7111546","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111546","url":null,"abstract":"A color image encryption scheme is proposed based on a reality-preserving fractional discrete cosine transform (RPFrDCT) and spatiotemporal chaotic mapping. The scrambling and diffusion operations are carried out after the RPFrDCT and make three components of image affect each other. The main advantages of this scheme are the real-valued output, the nonlinear manipulation, the high sensitiveness and high robustness to the cipher keys. Experimental results demonstrate that the proposed encryption scheme is feasible and effective.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123887692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new cooperative spectrum sensing with radio environment map in cognitive radio networks 认知无线电网络中一种新的无线电环境图协同频谱感知方法
Yi Chen, Hang Zhang, Hang Hu, Qian Wang
Spectrum sensing is regarded as an important part of the CR network. Its detection accuracy is the key aspect which affects the performance of CR network. In this paper, a novel cooperative spectrum sensing based on radio environment map (REM) is proposed. This new algorithm utilizes the REM information of the primary users (PUs) and the secondary users (SUs) to raise the detective performance of the spectrum sensing. Simulations show that the detection accuracy is improved and this algorithm is more suitable for practice wireless channel because it needs no priori information of SNR.
频谱感知是CR网络的重要组成部分。其检测精度是影响CR网络性能的关键因素。提出了一种基于无线电环境图(REM)的协同频谱感知方法。该算法利用主用户(pu)和从用户(su)的REM信息,提高了频谱感知的检测性能。仿真结果表明,该算法不需要先验信噪比信息,提高了检测精度,更适合实际无线信道。
{"title":"A new cooperative spectrum sensing with radio environment map in cognitive radio networks","authors":"Yi Chen, Hang Zhang, Hang Hu, Qian Wang","doi":"10.1109/ICAIOT.2015.7111533","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111533","url":null,"abstract":"Spectrum sensing is regarded as an important part of the CR network. Its detection accuracy is the key aspect which affects the performance of CR network. In this paper, a novel cooperative spectrum sensing based on radio environment map (REM) is proposed. This new algorithm utilizes the REM information of the primary users (PUs) and the secondary users (SUs) to raise the detective performance of the spectrum sensing. Simulations show that the detection accuracy is improved and this algorithm is more suitable for practice wireless channel because it needs no priori information of SNR.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122277501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Internet of things approach for motion detection using Raspberry Pi 物联网方法的运动检测使用树莓派
Aamir Ansari, Mohamed H. Sedky, Neelam Sharma, Anurag Tyagi
Internet of things is the communication of anything with any other thing, the communication mainly transferring of use able data, for example a sensor in a room to monitor and control the temperature. It is estimated that by 2020 there will be about 50 billion internet-enabled devices. This paper aims to describe a security alarm system using low processing power chips using Internet of things which helps to monitor and get alarms when motion is detected and sends photos and videos to a cloud server. Moreover, Internet of things based application can be used remotely to view the activity and get notifications when motion is detected. The photos and videos are sent directly to a cloud server, when the cloud is not available then the data is stored locally on the Raspberry Pi and sent when the connection resumes. Therefore, advantages like these make this application ideal for monitoring homes in absence.
物联网是任何事物与任何其他事物之间的通信,通信主要是传输可用数据,例如房间里的传感器监测和控制温度。据估计,到2020年将有大约500亿台联网设备。本文旨在描述一种使用低处理能力芯片的安全报警系统,该系统使用物联网技术,在检测到运动时进行监控并发出警报,并将照片和视频发送到云服务器。此外,基于物联网的应用程序可以远程查看活动,并在检测到运动时获得通知。照片和视频直接发送到云服务器,当云不可用时,数据存储在树莓派本地,并在连接恢复时发送。因此,诸如此类的优点使该应用程序成为在家监控的理想选择。
{"title":"An Internet of things approach for motion detection using Raspberry Pi","authors":"Aamir Ansari, Mohamed H. Sedky, Neelam Sharma, Anurag Tyagi","doi":"10.1109/ICAIOT.2015.7111554","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111554","url":null,"abstract":"Internet of things is the communication of anything with any other thing, the communication mainly transferring of use able data, for example a sensor in a room to monitor and control the temperature. It is estimated that by 2020 there will be about 50 billion internet-enabled devices. This paper aims to describe a security alarm system using low processing power chips using Internet of things which helps to monitor and get alarms when motion is detected and sends photos and videos to a cloud server. Moreover, Internet of things based application can be used remotely to view the activity and get notifications when motion is detected. The photos and videos are sent directly to a cloud server, when the cloud is not available then the data is stored locally on the Raspberry Pi and sent when the connection resumes. Therefore, advantages like these make this application ideal for monitoring homes in absence.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124740598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Industrie 4.0: Enabling technologies 工业4.0:使能技术
J. Wan, Hu Cai, Keliang Zhou
With the development of industries, we have realized the third industrial revolution. Following the development of Cyber-Physical Systems (CPS), industrial wireless network and some other enabling technologies, the fourth industrial revolution is being gradually rolled out. This paper presents an overview of the background, concept, basic methods, major technologies and application scenarios for industrie 4.0. In our view, industrie 4.0 as an abstract concept can closely integrate the physical world with virtual world. This strategy of industrie 4.0 will lead to more and more people coming to participate in the manufacturing process and further popularize our products through CPS technology. The typical approach for industrie 4.0 is the social manufacturing. In fact, the social manufacturing can directly link our customers' need and our industries, but it must be based on the enabling technologies, such as embedded systems, wireless sensor network, industrial robots, 3D printing, cloud computing, and big data. Therefore, this paper in detail explains these concepts, advantages and the relations to industries. We can foresee that our life will be changed to be more efficient, fast, safe and convenient due to the development of industrie 4.0 in the near future.
随着工业的发展,我们已经实现了第三次工业革命。随着信息物理系统(CPS)、工业无线网络等使能技术的发展,第四次工业革命正在逐步展开。本文概述了工业4.0的背景、概念、基本方法、主要技术和应用场景。在我们看来,工业4.0作为一个抽象的概念,可以将物理世界与虚拟世界紧密结合。这一工业4.0战略将使越来越多的人参与到制造过程中来,并通过CPS技术进一步普及我们的产品。工业4.0的典型方法是社会化制造。事实上,社会制造可以直接将客户的需求和我们的产业联系起来,但它必须建立在使能技术的基础上,比如嵌入式系统、无线传感器网络、工业机器人、3D打印、云计算、大数据等。因此,本文详细阐述了这些概念、优势及其与产业的关系。我们可以预见,在不久的将来,由于工业4.0的发展,我们的生活将变得更加高效、快捷、安全、方便。
{"title":"Industrie 4.0: Enabling technologies","authors":"J. Wan, Hu Cai, Keliang Zhou","doi":"10.1109/ICAIOT.2015.7111555","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111555","url":null,"abstract":"With the development of industries, we have realized the third industrial revolution. Following the development of Cyber-Physical Systems (CPS), industrial wireless network and some other enabling technologies, the fourth industrial revolution is being gradually rolled out. This paper presents an overview of the background, concept, basic methods, major technologies and application scenarios for industrie 4.0. In our view, industrie 4.0 as an abstract concept can closely integrate the physical world with virtual world. This strategy of industrie 4.0 will lead to more and more people coming to participate in the manufacturing process and further popularize our products through CPS technology. The typical approach for industrie 4.0 is the social manufacturing. In fact, the social manufacturing can directly link our customers' need and our industries, but it must be based on the enabling technologies, such as embedded systems, wireless sensor network, industrial robots, 3D printing, cloud computing, and big data. Therefore, this paper in detail explains these concepts, advantages and the relations to industries. We can foresee that our life will be changed to be more efficient, fast, safe and convenient due to the development of industrie 4.0 in the near future.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125282416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 159
Classification of power-quality disturbances using PSO-MP and parametric dictionaries 基于PSO-MP和参数字典的电能质量扰动分类
Zhang Jun, Zeng Ping-ping, Ma Jian, Wu Jian-hua
This paper aims to develop a new scheme for the classification of power-quality disturbances (PQDs). We propose to employ two discriminative dictionaries, designed based on the structures of PQDs, to respectively decompose a disturbance signal. Matching pursuit optimized by particle swarm optimization (PSO-MP) is used as the decomposition method. Reconstruction errors after sparse coding are employed to coarsely classify the PQDs into two categories, corresponding to the two dictionaries. Next, the specific class can be identified by evaluating the value of parameters of atoms. One main advantage of the approach is that it does not require a training set as many other classification methods do. The PQDs considered in this paper include sag, swell, interruption, harmonic and oscillatory transient. Experimental results indicate that the proposed approach achieves a high classification accuracy and robustness against noise.
本文旨在开发一种新的电能质量扰动分类方案。我们提出采用基于pqd结构设计的两个判别字典来分别分解干扰信号。分解方法采用粒子群优化算法(PSO-MP)优化匹配追踪。利用稀疏编码后的重构误差将pqd粗分类为两类,分别对应两个字典。接下来,可以通过计算原子参数的值来识别特定的类。该方法的一个主要优点是它不像许多其他分类方法那样需要训练集。本文考虑的PQDs包括暂态、膨胀、中断、谐波和振荡暂态。实验结果表明,该方法具有较高的分类精度和对噪声的鲁棒性。
{"title":"Classification of power-quality disturbances using PSO-MP and parametric dictionaries","authors":"Zhang Jun, Zeng Ping-ping, Ma Jian, Wu Jian-hua","doi":"10.1109/ICAIOT.2015.7111529","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111529","url":null,"abstract":"This paper aims to develop a new scheme for the classification of power-quality disturbances (PQDs). We propose to employ two discriminative dictionaries, designed based on the structures of PQDs, to respectively decompose a disturbance signal. Matching pursuit optimized by particle swarm optimization (PSO-MP) is used as the decomposition method. Reconstruction errors after sparse coding are employed to coarsely classify the PQDs into two categories, corresponding to the two dictionaries. Next, the specific class can be identified by evaluating the value of parameters of atoms. One main advantage of the approach is that it does not require a training set as many other classification methods do. The PQDs considered in this paper include sag, swell, interruption, harmonic and oscillatory transient. Experimental results indicate that the proposed approach achieves a high classification accuracy and robustness against noise.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124382912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A rank sequence method for detecting black hole attack in ad hoc network 一种自组织网络中黑洞攻击检测的秩序列方法
Xiong Kai, Yin Mingyong, Li Wenkang, Jiang Hong
This paper discusses one of the route security problems called the black hole attack. In the network, we can capture some AODV route tables to gain a rank sequences by using the FP-Growth, which is a data association rule mining. We choose the rank sequences for detecting the malicious node because the rank sequences are not sensitive to the noise interfered. A suspicious set consists of nodes which are selected by whether the rank of a node is changed in the sequence. Then, we use the DE-Cusum to distinguish the black hole route and normal one in the suspicious set. In this paper, the FP-Growth reflects an idea which is about reducing data dimensions. This algorithm excludes many normal nodes before the DE-Cusum detection because the normal node has a stable rank in a sequence. In the simulation, we use the NS2 to build a black hole attack scenario with 11 nodes. Simulation results show that the proposed algorithm can reduce much vain detection.
本文讨论了一种称为黑洞攻击的路由安全问题。在网络中,我们可以通过使用FP-Growth(一种数据关联规则挖掘)捕获一些AODV路由表来获得一个秩序列。由于秩序列对噪声干扰不敏感,我们选择秩序列来检测恶意节点。可疑集由节点组成,这些节点是根据节点在序列中的秩是否改变来选择的。然后,我们使用DE-Cusum在可疑集中区分黑洞路线和正常路线。在本文中,FP-Growth反映了一个关于减少数据维度的想法。该算法在DE-Cusum检测之前排除了许多正常节点,因为正常节点在序列中具有稳定的秩。在仿真中,我们使用NS2构建了一个有11个节点的黑洞攻击场景。仿真结果表明,该算法可以有效地减少无用检测。
{"title":"A rank sequence method for detecting black hole attack in ad hoc network","authors":"Xiong Kai, Yin Mingyong, Li Wenkang, Jiang Hong","doi":"10.1109/ICAIOT.2015.7111559","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111559","url":null,"abstract":"This paper discusses one of the route security problems called the black hole attack. In the network, we can capture some AODV route tables to gain a rank sequences by using the FP-Growth, which is a data association rule mining. We choose the rank sequences for detecting the malicious node because the rank sequences are not sensitive to the noise interfered. A suspicious set consists of nodes which are selected by whether the rank of a node is changed in the sequence. Then, we use the DE-Cusum to distinguish the black hole route and normal one in the suspicious set. In this paper, the FP-Growth reflects an idea which is about reducing data dimensions. This algorithm excludes many normal nodes before the DE-Cusum detection because the normal node has a stable rank in a sequence. In the simulation, we use the NS2 to build a black hole attack scenario with 11 nodes. Simulation results show that the proposed algorithm can reduce much vain detection.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116394712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
One methodology for spam review detection based on review coherence metrics 一种基于审查一致性度量的垃圾邮件审查检测方法
Xinkai Yang
In this paper, we propose an iterative computation framework to detect spam reviews based on coherent examination. We first define some reviews' coherent metrics to analyze review coherence in the granularity of sentence. Then the framework and its evaluation process are discussed in details.
在本文中,我们提出了一个基于相干检查的迭代计算框架来检测垃圾邮件评论。我们首先定义了一些评论的连贯度量,以分析句子粒度上的评论一致性。然后详细讨论了该框架及其评价过程。
{"title":"One methodology for spam review detection based on review coherence metrics","authors":"Xinkai Yang","doi":"10.1109/ICAIOT.2015.7111547","DOIUrl":"https://doi.org/10.1109/ICAIOT.2015.7111547","url":null,"abstract":"In this paper, we propose an iterative computation framework to detect spam reviews based on coherent examination. We first define some reviews' coherent metrics to analyze review coherence in the granularity of sentence. Then the framework and its evaluation process are discussed in details.","PeriodicalId":310429,"journal":{"name":"Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114920505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1