首页 > 最新文献

2008 ISECS International Colloquium on Computing, Communication, Control, and Management最新文献

英文 中文
Research on Semantic Business Platform for Electric Power System 电力系统语义业务平台研究
Sheng Jia-gen, Liu Sifeng
For electric power business decision, the open Web is an important resource of knowledge. Unfortunately, traditional methods of knowledge acquiring, representing and organizing can not satisfy the requirements of semantic to support intelligent decision. Arming to these, a semantic platform oriented business intelligence named SP4BI is proposed by this paper, then two key technologies, model of Web knowledge representation and automatic algorithm of ontology acquiring, are illustrated. Knowledge on the Web are time-related and context-related, these properties are all be considered in representation model of Web knowledge. Meanwhile, the experiments of automatic acquiring electric power ontology show the validity of extracting properties and relations of concepts. Compared with existing methods, SP4BI platform provides a semantic supporting, and is a fundamental of machine reading and automatic reasoning.
对于电力企业决策来说,开放的Web是一个重要的知识资源。传统的知识获取、表示和组织方法已不能满足语义支持智能决策的要求。为此,本文提出了面向语义的商业智能平台SP4BI,并对其关键技术——Web知识表示模型和本体自动获取算法进行了阐述。Web上的知识具有时间相关性和上下文相关性,这些特性在Web知识的表示模型中都要加以考虑。同时,电力本体自动获取的实验也证明了概念属性和概念关系提取的有效性。与现有方法相比,SP4BI平台提供了语义支持,是实现机器阅读和自动推理的基础。
{"title":"Research on Semantic Business Platform for Electric Power System","authors":"Sheng Jia-gen, Liu Sifeng","doi":"10.1109/CCCM.2008.357","DOIUrl":"https://doi.org/10.1109/CCCM.2008.357","url":null,"abstract":"For electric power business decision, the open Web is an important resource of knowledge. Unfortunately, traditional methods of knowledge acquiring, representing and organizing can not satisfy the requirements of semantic to support intelligent decision. Arming to these, a semantic platform oriented business intelligence named SP4BI is proposed by this paper, then two key technologies, model of Web knowledge representation and automatic algorithm of ontology acquiring, are illustrated. Knowledge on the Web are time-related and context-related, these properties are all be considered in representation model of Web knowledge. Meanwhile, the experiments of automatic acquiring electric power ontology show the validity of extracting properties and relations of concepts. Compared with existing methods, SP4BI platform provides a semantic supporting, and is a fundamental of machine reading and automatic reasoning.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Double-Loop Hypercube: A New Scalable Interconnection Network for Massively Parallel Computing 双环超立方体:用于大规模并行计算的新型可扩展互连网络
Youyao Liu, Jungang Han
An important issue in the design of interconnection networks for massively parallel computers is scalability. A new scalable interconnection network topology, called double-loop hypercube (DLH), is proposed. The DLH network combines the positive features of hypercube topology, such as small diameter, high connectivity, symmetry and simple routing, and the scalability and constant node degree of a new double-loop topology. The DLH network can maintain a constant node degree regardless of the increase in the network size. The nodes of the DLH network adopt the hybrid coding combining Johnson code and Gray code. The hybrid coding scheme can make routing algorithms simple and efficient. Both unicasting and broadcasting routing algorithms are designed for the DLH network, and it is based on the hybrid coding scheme. A detailed analysis shows that the DLH network is a better interconnection network in the properties of topology and the performance of communication.
大规模并行计算机互连网络设计中的一个重要问题是可扩展性。提出了一种新的可扩展互联网络拓扑结构——双环超立方体(double-loop hypercube, DLH)。DLH网络既具有超立方体拓扑的直径小、连通性高、对称、路由简单等优点,又具有新型双环拓扑的可扩展性和节点度恒定等优点。无论网络规模的增加,DLH网络都能保持节点度恒定。DLH网络的节点采用约翰逊码和格雷码相结合的混合编码。混合编码方案使路由算法简单、高效。针对DLH网络设计了单播和广播两种路由算法,并基于混合编码方案。详细分析表明,DLH网络在拓扑特性和通信性能方面都是一种较好的互连网络。
{"title":"Double-Loop Hypercube: A New Scalable Interconnection Network for Massively Parallel Computing","authors":"Youyao Liu, Jungang Han","doi":"10.1109/CCCM.2008.45","DOIUrl":"https://doi.org/10.1109/CCCM.2008.45","url":null,"abstract":"An important issue in the design of interconnection networks for massively parallel computers is scalability. A new scalable interconnection network topology, called double-loop hypercube (DLH), is proposed. The DLH network combines the positive features of hypercube topology, such as small diameter, high connectivity, symmetry and simple routing, and the scalability and constant node degree of a new double-loop topology. The DLH network can maintain a constant node degree regardless of the increase in the network size. The nodes of the DLH network adopt the hybrid coding combining Johnson code and Gray code. The hybrid coding scheme can make routing algorithms simple and efficient. Both unicasting and broadcasting routing algorithms are designed for the DLH network, and it is based on the hybrid coding scheme. A detailed analysis shows that the DLH network is a better interconnection network in the properties of topology and the performance of communication.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115487933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effectiveness of OLAP-Based Sales Analysis in Retail Enterprises 基于olap的销售分析在零售企业中的有效性
Chun-hua Ju, Minghua Han
Data warehouse and online analytical processing (OLAP) are two significant information technology (IT) strategies. To commercial enterprises, merchandise sales play important and special role. With the market competition getting fierce, managers see information as a critical resource and require methods that let them exploit it for competitive advantage. The development of data warehouse and OLAP make it possible to use these technologies to help managers' analysis and decision making. In this study, we take the case of a drugs retail enterprise, propose a drugs sales data cube and attempt to apply it to drugs sales data OLAP analysis. We give an OLAP structure based on Web. This paper provides the method to realize OLAP data analysis from Web pages through bedding office Web components, and realizes the OLAP multidimensional data analyses.
数据仓库和联机分析处理(OLAP)是两种重要的信息技术(IT)策略。商品销售对商业企业具有重要而特殊的作用。随着市场竞争的日益激烈,管理者将信息视为一种重要的资源,需要能够利用信息获得竞争优势的方法。数据仓库和OLAP的发展使得利用这些技术帮助管理人员进行分析和决策成为可能。本研究以某药品零售企业为例,提出了药品销售数据立方体,并尝试将其应用于药品销售数据OLAP分析。给出了一个基于Web的OLAP结构。本文提出了利用办公Web组件从Web页面实现OLAP数据分析的方法,实现了OLAP多维数据分析。
{"title":"Effectiveness of OLAP-Based Sales Analysis in Retail Enterprises","authors":"Chun-hua Ju, Minghua Han","doi":"10.1109/CCCM.2008.131","DOIUrl":"https://doi.org/10.1109/CCCM.2008.131","url":null,"abstract":"Data warehouse and online analytical processing (OLAP) are two significant information technology (IT) strategies. To commercial enterprises, merchandise sales play important and special role. With the market competition getting fierce, managers see information as a critical resource and require methods that let them exploit it for competitive advantage. The development of data warehouse and OLAP make it possible to use these technologies to help managers' analysis and decision making. In this study, we take the case of a drugs retail enterprise, propose a drugs sales data cube and attempt to apply it to drugs sales data OLAP analysis. We give an OLAP structure based on Web. This paper provides the method to realize OLAP data analysis from Web pages through bedding office Web components, and realizes the OLAP multidimensional data analyses.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114630906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research and Application of a Kalman Smoother Based on INS/GPS Integrated Navigation 基于INS/GPS组合导航的卡尔曼平滑研究与应用
Jian Rong, Haitao Zhang, Xiaochun Zhong, Ke Chen
A positioning algorithm based on a Kalman smoother is proposed, and the performance of the INS/GPS integrated navigation system is improved. In this paper, the error sources of inertial navigation system (INS) and Global Positioning System (GPS) are analyzed respectively, and then the error state models are set up. Furthermore, the INS/GPS integrated navigation system based on the information of GPS and INS is modeled and simulated, and the algorithm using the KF and the Rauch-Tung-smoother (RTS) filtering is compared. The numerical emulation demonstrates that the RTS filtering can greatly enhance the robustness and reliability of integrated navigation system. The system has obvious advantages of high accuracy.
提出了一种基于卡尔曼平滑的定位算法,提高了INS/GPS组合导航系统的性能。本文分别分析了惯性导航系统(INS)和全球定位系统(GPS)的误差来源,建立了误差状态模型。在此基础上,对基于GPS和INS信息的INS/GPS组合导航系统进行了建模和仿真,并对采用KF滤波和rauch - tung -smooth (RTS)滤波的算法进行了比较。数值仿真结果表明,RTS滤波能显著提高组合导航系统的鲁棒性和可靠性。该系统具有精度高的明显优点。
{"title":"Research and Application of a Kalman Smoother Based on INS/GPS Integrated Navigation","authors":"Jian Rong, Haitao Zhang, Xiaochun Zhong, Ke Chen","doi":"10.1109/CCCM.2008.314","DOIUrl":"https://doi.org/10.1109/CCCM.2008.314","url":null,"abstract":"A positioning algorithm based on a Kalman smoother is proposed, and the performance of the INS/GPS integrated navigation system is improved. In this paper, the error sources of inertial navigation system (INS) and Global Positioning System (GPS) are analyzed respectively, and then the error state models are set up. Furthermore, the INS/GPS integrated navigation system based on the information of GPS and INS is modeled and simulated, and the algorithm using the KF and the Rauch-Tung-smoother (RTS) filtering is compared. The numerical emulation demonstrates that the RTS filtering can greatly enhance the robustness and reliability of integrated navigation system. The system has obvious advantages of high accuracy.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121828486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Sliding Mode Control of Active and Reactive Power for Brushless Doubly-Fed Machine 无刷双馈电机有功功率的滑模控制
Xiaohong Wang, Jinming Yang, Xian-yong Zhang, Jie Wu
The brushless doubly-fed machine (BDFM) has prospect application in the wind energy conversion system (WECS) for its abilities of speed regulation and variable-speed constant-frequency. The decoupled control of the active and reactive power is crucial to the applications of the BDFM in WECS. The robust control strategy based on sliding mode theory is applied for the independent control of active and reactive power of the BDFM. The controller is designed through the Lyapunov stable theory to ensure the stability of controller and achieve the required control result. The effect of the proposed method is tested with the matlab/simulink software. Simulation results illustrate the good performance of the controller and proves the power control strategy's feasibility.
无刷双馈电机(BDFM)由于具有调速、变频等特性,在风能转换系统中具有广阔的应用前景。有功功率和无功功率的解耦控制是BDFM在WECS中应用的关键。采用基于滑模理论的鲁棒控制策略对BDFM的有功功率和无功功率进行独立控制。通过李雅普诺夫稳定理论对控制器进行设计,保证了控制器的稳定性,达到了要求的控制效果。通过matlab/simulink软件对该方法的效果进行了验证。仿真结果表明了该控制器的良好性能,验证了功率控制策略的可行性。
{"title":"Sliding Mode Control of Active and Reactive Power for Brushless Doubly-Fed Machine","authors":"Xiaohong Wang, Jinming Yang, Xian-yong Zhang, Jie Wu","doi":"10.1109/CCCM.2008.167","DOIUrl":"https://doi.org/10.1109/CCCM.2008.167","url":null,"abstract":"The brushless doubly-fed machine (BDFM) has prospect application in the wind energy conversion system (WECS) for its abilities of speed regulation and variable-speed constant-frequency. The decoupled control of the active and reactive power is crucial to the applications of the BDFM in WECS. The robust control strategy based on sliding mode theory is applied for the independent control of active and reactive power of the BDFM. The controller is designed through the Lyapunov stable theory to ensure the stability of controller and achieve the required control result. The effect of the proposed method is tested with the matlab/simulink software. Simulation results illustrate the good performance of the controller and proves the power control strategy's feasibility.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"32 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120850749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Equivalent Reformulations of Generalized Semi-infinite Min-Max Programming 广义半无限最小最大规划的等价重表述
Jinchuan Zhou, Mei-xia Li, Wenling Zhao, Xiuhua Xu
New equivalent reformulations of generalized semi-infinite min-max programming (GSMMP) is derived by addressing the perturbed problem of the lower-level programming. Based on these, we obtain an exact penalty representations for the lower-level programming, which allows us to convert (GSSMP) into the standard semi-infinite programming problems (SMMP) via a class of exact penalty functions, including not only the function used in [9] but also some smooth exact penalty functions as special cases.This fact makes it possible to solve (GSMMP) by using any available standard semi-infinite optimization algorithms.
通过求解底层规划的摄动问题,导出了广义半无限最小最大规划的新的等价重表述。在此基础上,我们得到了低级规划的精确惩罚表示,这使得我们可以通过一类精确惩罚函数将(GSSMP)转化为标准的半无限规划问题(SMMP),这些精确惩罚函数不仅包括[9]中使用的函数,还包括一些光滑的精确惩罚函数作为特例。这一事实使得使用任何可用的标准半无限优化算法求解(GSMMP)成为可能。
{"title":"Equivalent Reformulations of Generalized Semi-infinite Min-Max Programming","authors":"Jinchuan Zhou, Mei-xia Li, Wenling Zhao, Xiuhua Xu","doi":"10.1109/CCCM.2008.196","DOIUrl":"https://doi.org/10.1109/CCCM.2008.196","url":null,"abstract":"New equivalent reformulations of generalized semi-infinite min-max programming (GSMMP) is derived by addressing the perturbed problem of the lower-level programming. Based on these, we obtain an exact penalty representations for the lower-level programming, which allows us to convert (GSSMP) into the standard semi-infinite programming problems (SMMP) via a class of exact penalty functions, including not only the function used in [9] but also some smooth exact penalty functions as special cases.This fact makes it possible to solve (GSMMP) by using any available standard semi-infinite optimization algorithms.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123890988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Practical Key Issuing Scheme in Identity-Based Cryptosystem 基于身份的密码系统中一个实用的密钥发布方案
Chang-ji Wang, Jing Liu
Secure key issuing in identity-based public key cryptosystems is a challenging task due to the inherent drawback of key escrow and the requirement for secure channel between the private key generator (PKG) and users. In this paper, we propose a practical key issuing scheme. User registers at a local registration authority in off-line manner, local registration authority signs and delivers authenticated userpsilas information to multiple PKGs in batch manner. The master key is generated by PKGs based on secure distributed key generation protocol, which solves the key escrow problem. The secure channel between the user and the PKGs are not needed by using blinding technique. The proposed scheme is more efficient than those of existing key issuing schemes and the security is proved under random oracle model.
由于密钥托管的固有缺点以及私钥生成器(PKG)和用户之间需要安全通道,在基于身份的公钥密码系统中,安全密钥发布是一项具有挑战性的任务。本文提出了一种实用的密钥发布方案。用户通过旁路方式在本地注册机构注册,本地注册机构签名,并将认证后的用户信息批量下发到多个pkg中。主密钥由pki基于安全的分布式密钥生成协议生成,解决了密钥托管问题。通过使用盲化技术,用户和pkg之间不需要安全通道。该方案比现有的密钥发布方案效率更高,并在随机oracle模型下证明了该方案的安全性。
{"title":"A Practical Key Issuing Scheme in Identity-Based Cryptosystem","authors":"Chang-ji Wang, Jing Liu","doi":"10.1109/CCCM.2008.302","DOIUrl":"https://doi.org/10.1109/CCCM.2008.302","url":null,"abstract":"Secure key issuing in identity-based public key cryptosystems is a challenging task due to the inherent drawback of key escrow and the requirement for secure channel between the private key generator (PKG) and users. In this paper, we propose a practical key issuing scheme. User registers at a local registration authority in off-line manner, local registration authority signs and delivers authenticated userpsilas information to multiple PKGs in batch manner. The master key is generated by PKGs based on secure distributed key generation protocol, which solves the key escrow problem. The secure channel between the user and the PKGs are not needed by using blinding technique. The proposed scheme is more efficient than those of existing key issuing schemes and the security is proved under random oracle model.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Constrained 2D Sketch Generation Based on Image Contour Detect 基于图像轮廓检测的约束二维素描生成
Shen Ying, Chen Zhiyang, Cai Zhiyong
We proposed a method to auto-extract contour sketch from color image. Firstly, we get binary image through OTSU method, and then trace the contour of the binary image. Secondly, map the contour to the specified sketch plane. We use Hough Transform to detect all possible line segments in the contour, use Randomized Circle Detection algorithm to get all possible circular arcs, and then determine the break points of the contour according to the constraints between the fitted line segments and circular arcs. Finally, we refit the curve set by the global constraint formula based on the estimated curve type and constraints. Examples show that the method can recognize the curve type and corresponding constraints accurately, and can extract contour sketch from the color image as expected.
提出了一种从彩色图像中自动提取轮廓草图的方法。首先通过OTSU法得到二值图像,然后对二值图像进行轮廓跟踪。其次,将轮廓线映射到指定的草图平面上。我们使用Hough变换检测轮廓中所有可能的线段,使用随机化圆检测算法得到所有可能的圆弧,然后根据拟合的线段与圆弧之间的约束确定轮廓的断点。最后,根据估计的曲线类型和约束条件,利用全局约束公式对曲线集进行重构。实例表明,该方法能准确识别曲线类型和约束条件,并能按预期从彩色图像中提取轮廓草图。
{"title":"Constrained 2D Sketch Generation Based on Image Contour Detect","authors":"Shen Ying, Chen Zhiyang, Cai Zhiyong","doi":"10.1109/CCCM.2008.306","DOIUrl":"https://doi.org/10.1109/CCCM.2008.306","url":null,"abstract":"We proposed a method to auto-extract contour sketch from color image. Firstly, we get binary image through OTSU method, and then trace the contour of the binary image. Secondly, map the contour to the specified sketch plane. We use Hough Transform to detect all possible line segments in the contour, use Randomized Circle Detection algorithm to get all possible circular arcs, and then determine the break points of the contour according to the constraints between the fitted line segments and circular arcs. Finally, we refit the curve set by the global constraint formula based on the estimated curve type and constraints. Examples show that the method can recognize the curve type and corresponding constraints accurately, and can extract contour sketch from the color image as expected.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Integration Scheme of Robust and Fragile for Secured Digital Watermarking 一种新的鲁棒和脆弱的安全数字水印集成方案
Lin Zhang, F. Qian, Yi Gao, Yuesheng Zhu
In this paper, a new integration scheme of robust and fragile for secured digital watermarking is developed and implemented. The proposed method uses symmetric encryption algorithm, error correcting code and random permutation to process the original watermark information, and then embeds it into the blue component of image in robust process. In fragile process, a session key and the red component of image are hashed, and then the hashed value is encrypted by using the receiverpsilas public key, finally the encrypted message is embedded into the least significant bit (LSB) of the image. Our results have shown that the proposed scheme can resist white noise, cropping, median filter and JPEG compressing distortions, and can be used for image verification and identity authentication.
本文提出并实现了一种新的鲁棒和脆弱的安全数字水印集成方案。该方法采用对称加密算法、纠错码和随机排列对原始水印信息进行处理,然后在鲁棒性处理中将其嵌入到图像的蓝色分量中。在脆弱进程中,先对会话密钥和图像的红色部分进行哈希,然后使用接收方的公钥对哈希值进行加密,最后将加密后的消息嵌入到图像的最低有效位(LSB)中。实验结果表明,该算法能够抵抗白噪声、裁剪、中值滤波和JPEG压缩失真,可用于图像验证和身份认证。
{"title":"A New Integration Scheme of Robust and Fragile for Secured Digital Watermarking","authors":"Lin Zhang, F. Qian, Yi Gao, Yuesheng Zhu","doi":"10.1109/CCCM.2008.358","DOIUrl":"https://doi.org/10.1109/CCCM.2008.358","url":null,"abstract":"In this paper, a new integration scheme of robust and fragile for secured digital watermarking is developed and implemented. The proposed method uses symmetric encryption algorithm, error correcting code and random permutation to process the original watermark information, and then embeds it into the blue component of image in robust process. In fragile process, a session key and the red component of image are hashed, and then the hashed value is encrypted by using the receiverpsilas public key, finally the encrypted message is embedded into the least significant bit (LSB) of the image. Our results have shown that the proposed scheme can resist white noise, cropping, median filter and JPEG compressing distortions, and can be used for image verification and identity authentication.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129233376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research and Design on P2P Based Reliable Reputation Management System 基于P2P的可靠信誉管理系统的研究与设计
Shouqiang Liu, Deyu Qi, Baogang Chen
Since the anonymity and openness of P2P,in P2P networks,services may be misused by providing tampered files, viruses and Trojan Horses. But existing researches on reputation system for P2P networks are still limited to the resistance of some attacks. This paper provides a new measure by adding a server into the reputation system to record all userspsila actions, such as uploading, downloading, judging and getting judgments, defending the attack etc. It is proved to be feasible and efficient. Finally, Conclusion and some prospects are proposed.
由于P2P的匿名性和开放性,在P2P网络中,服务可能会被滥用,提供篡改文件、病毒和特洛伊木马。但是现有的P2P网络信誉系统的研究仍然局限于对某些攻击的抵抗。本文提出了一种新的措施,即在信誉系统中增加一个服务器来记录用户的所有行为,如上传、下载、判断和接受判断、防御攻击等。实践证明,该方法是可行的、有效的。最后,对全文进行了总结和展望。
{"title":"Research and Design on P2P Based Reliable Reputation Management System","authors":"Shouqiang Liu, Deyu Qi, Baogang Chen","doi":"10.1109/CCCM.2008.383","DOIUrl":"https://doi.org/10.1109/CCCM.2008.383","url":null,"abstract":"Since the anonymity and openness of P2P,in P2P networks,services may be misused by providing tampered files, viruses and Trojan Horses. But existing researches on reputation system for P2P networks are still limited to the resistance of some attacks. This paper provides a new measure by adding a server into the reputation system to record all userspsila actions, such as uploading, downloading, judging and getting judgments, defending the attack etc. It is proved to be feasible and efficient. Finally, Conclusion and some prospects are proposed.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130948426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2008 ISECS International Colloquium on Computing, Communication, Control, and Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1