首页 > 最新文献

2016 International Conference on Computer, Information and Telecommunication Systems (CITS)最新文献

英文 中文
A simple frequency-domain equalizer over doubly-selective channel without feedback 一个简单的频域均衡器在双选择信道上无反馈
Zhuo Ma, W. Gao, Shuanyi Du, Bong-Kwon Kang
Frequency-domain equalization (FDE) is prior than time-domain equalization in complexity. FDE is based on the cyclic signal property within a data block. This means that the channel must remain constant during this time interval. But in fast fading environments, the channel is time-variant. In order to deal with this problem, a variety of sub-block based FDE techniques have been proposed, but these kinds of algorithms have very high complexity because a tentative equalization and decoding are necessary before sub-block processed. In many practical applications requiring high real-time attribution, processing speed of algorithms is more important than processing capacity, so we must sacrifice performance of algorithm in exchange for speed at this time. In this paper, a simple FDE algorithm without tentative equalization and decoding is proposed for fast fading channel. The proposed method reduces the complexity of algorithm by preserving partial of the frequency equalization result instead of tentative equalizing and decoding. Numerical simulation results show that this lower complexity of algorithm can also effectively decrease the intersymbol interference(ISI) in fast fading environment.
频域均衡(FDE)在复杂度上优于时域均衡。FDE基于数据块内的循环信号属性。这意味着通道在此时间间隔内必须保持恒定。但在快衰落环境下,信道是时变的。为了解决这一问题,人们提出了各种基于子块的FDE技术,但由于这些算法在处理子块之前需要进行暂定均衡和解码,因此复杂度很高。在许多需要高实时属性的实际应用中,算法的处理速度比处理能力更重要,因此此时必须牺牲算法的性能来换取速度。本文针对快速衰落信道,提出了一种简单的不需要暂定均衡和解码的FDE算法。该方法通过保留频率均衡结果的部分而不是暂定均衡和解码来降低算法的复杂度。数值仿真结果表明,这种较低复杂度的算法也能有效地降低快速衰落环境下的码间干扰。
{"title":"A simple frequency-domain equalizer over doubly-selective channel without feedback","authors":"Zhuo Ma, W. Gao, Shuanyi Du, Bong-Kwon Kang","doi":"10.1109/CITS.2016.7546422","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546422","url":null,"abstract":"Frequency-domain equalization (FDE) is prior than time-domain equalization in complexity. FDE is based on the cyclic signal property within a data block. This means that the channel must remain constant during this time interval. But in fast fading environments, the channel is time-variant. In order to deal with this problem, a variety of sub-block based FDE techniques have been proposed, but these kinds of algorithms have very high complexity because a tentative equalization and decoding are necessary before sub-block processed. In many practical applications requiring high real-time attribution, processing speed of algorithms is more important than processing capacity, so we must sacrifice performance of algorithm in exchange for speed at this time. In this paper, a simple FDE algorithm without tentative equalization and decoding is proposed for fast fading channel. The proposed method reduces the complexity of algorithm by preserving partial of the frequency equalization result instead of tentative equalizing and decoding. Numerical simulation results show that this lower complexity of algorithm can also effectively decrease the intersymbol interference(ISI) in fast fading environment.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131089879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit scoring using incremental learning algorithm for SVDD 信用评分采用增量学习算法进行SVDD
Yongquan Cai, Yuchen Jiang
Support Vector Data Description (SVDD) has a limitation for dealing with a large dataset or online learning tasks. This work investigates the practice of credit scoring and proposes a new incremental learning algorithm for SVDD based on Karush-Kuhn-Tucker (KKT) conditions and convex hull. Convex hull and part of newly added samples which violates KKT conditions are treated as new training samples instead of previous support vector and entire new arrived samples. The proposed method can achieve comparable training time with traditional incremental learning algorithm for SVDD while have similar classification accuracy with original SVDD.
支持向量数据描述(SVDD)在处理大型数据集或在线学习任务方面存在局限性。本文研究了信用评分的实践,并提出了一种新的基于KKT条件和凸包的SVDD增量学习算法。凸包和部分违反KKT条件的新增样本被视为新的训练样本,而不是之前的支持向量和整个新到达样本。该方法的训练时间与传统的SVDD增量学习算法相当,分类精度与原始SVDD相近。
{"title":"Credit scoring using incremental learning algorithm for SVDD","authors":"Yongquan Cai, Yuchen Jiang","doi":"10.1109/CITS.2016.7546435","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546435","url":null,"abstract":"Support Vector Data Description (SVDD) has a limitation for dealing with a large dataset or online learning tasks. This work investigates the practice of credit scoring and proposes a new incremental learning algorithm for SVDD based on Karush-Kuhn-Tucker (KKT) conditions and convex hull. Convex hull and part of newly added samples which violates KKT conditions are treated as new training samples instead of previous support vector and entire new arrived samples. The proposed method can achieve comparable training time with traditional incremental learning algorithm for SVDD while have similar classification accuracy with original SVDD.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131933326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study of cooperative diversity scheme based on visible light communication in VANETs VANETs中基于可见光通信的合作分集方案研究
Zongmin Cui, Peng Yue, Yao Ji
Enormous applications which are enabled using Vehicular Ad Hoc Networks (VANETs) require a both efficient and reliable data delivery. Visible Light Communication (VLC), which has high transmission rate without using Radio Frequency (RF) spectrum, is regard as a candidate for data transmission in VANETs. Since a VLC system requires a line-of-sight communication, the position and the posture of LEDs and receivers play key roles in VLC. Unfortunately the position and the posture always change with vehicle motion and may make the performance of VLC become severe and even result in the outage of VLC. In this paper, we present an improved Vehicle-to-Vehicle (V2V) model and an improved Vehicle-to-Infrastructure (V2I) model in consideration of the position and the posture. In order to get diversity gains and reduce the VLC interruption caused by vehicle motion, we propose a VLC based cooperative diversity scheme. Finally simulation results show that the cooperative diversity scheme can decrease the Bit-Error-Rate (BER) significantly and reduce the VLC interruption caused by vehicle motion.
使用车载自组织网络(vanet)的大量应用需要高效可靠的数据传输。可见光通信(VLC)在不使用射频(RF)频谱的情况下具有较高的传输速率,被认为是vanet中数据传输的候选技术。由于VLC系统需要视距通信,因此led和接收器的位置和姿态在VLC中起着关键作用。然而,位置和姿态总是随着车辆的运动而变化,这可能会使VLC的性能变得严重,甚至导致VLC的中断。本文提出了一种考虑位置和姿态的改进的车对车(V2V)模型和改进的车对基础设施(V2I)模型。为了获得分集增益,减少车辆运动造成的VLC中断,提出了一种基于VLC的合作分集方案。仿真结果表明,该合作分集方案能够显著降低误码率,减少车辆运动引起的VLC中断。
{"title":"Study of cooperative diversity scheme based on visible light communication in VANETs","authors":"Zongmin Cui, Peng Yue, Yao Ji","doi":"10.1109/CITS.2016.7546429","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546429","url":null,"abstract":"Enormous applications which are enabled using Vehicular Ad Hoc Networks (VANETs) require a both efficient and reliable data delivery. Visible Light Communication (VLC), which has high transmission rate without using Radio Frequency (RF) spectrum, is regard as a candidate for data transmission in VANETs. Since a VLC system requires a line-of-sight communication, the position and the posture of LEDs and receivers play key roles in VLC. Unfortunately the position and the posture always change with vehicle motion and may make the performance of VLC become severe and even result in the outage of VLC. In this paper, we present an improved Vehicle-to-Vehicle (V2V) model and an improved Vehicle-to-Infrastructure (V2I) model in consideration of the position and the posture. In order to get diversity gains and reduce the VLC interruption caused by vehicle motion, we propose a VLC based cooperative diversity scheme. Finally simulation results show that the cooperative diversity scheme can decrease the Bit-Error-Rate (BER) significantly and reduce the VLC interruption caused by vehicle motion.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132161493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A novel descriptor optimization method for multispectral images 一种新的多光谱图像描述子优化方法
Z. Fu, B. Luo, Chun Wu, Q. Qin
This paper presents an optimized descriptor method for multispectral images. The method proposed is based on LGHD (Log-Gabor Histogram Descriptor)[1]. Initially, all feature points are detected from Long wave Infrared and Visible spectrum images, and descripted by LGHD, then PCA (Principal Component Analysis) is used to reduce the dimension of the two different descriptors, finally the optimized descriptors are used to match the points. Experimental results show that proposed approach achieves a better matching performance than LGHD.
提出了一种优化的多光谱图像描述符方法。提出的方法基于LGHD (Log-Gabor直方图描述符)[1]。首先从长波红外和可见光谱图像中检测到所有特征点,并对其进行LGHD描述,然后使用主成分分析(PCA)对两种不同描述符进行降维,最后使用优化后的描述符进行点匹配。实验结果表明,该方法比LGHD具有更好的匹配性能。
{"title":"A novel descriptor optimization method for multispectral images","authors":"Z. Fu, B. Luo, Chun Wu, Q. Qin","doi":"10.1109/CITS.2016.7546457","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546457","url":null,"abstract":"This paper presents an optimized descriptor method for multispectral images. The method proposed is based on LGHD (Log-Gabor Histogram Descriptor)[1]. Initially, all feature points are detected from Long wave Infrared and Visible spectrum images, and descripted by LGHD, then PCA (Principal Component Analysis) is used to reduce the dimension of the two different descriptors, finally the optimized descriptors are used to match the points. Experimental results show that proposed approach achieves a better matching performance than LGHD.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132314290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving physical layer security in underlay D2D communication via Stackelberg game based power control 通过基于Stackelberg游戏的功率控制提高底层D2D通信的物理层安全性
Wanbing He, Wei Zhang, Wei Bai, Yueming Cai, Xinrong Guan, Junyue Qu
Device-to-Device (D2D) communication has advantages of improving the spectral resource efficiency. But unfortunately, it brings about interference and potential secrecy hazard. In this paper, a Stackelberg game based power control algorithm is provided to enhance the physical layer security underlaying D2D communication by utilizing the interference. Then, a mathematical model based on Stackelberg game is set up, in which we regard the secrecy energy efficiency as the utility function. After that, the existence and uniqueness of the Stackelberg Equilibrium is proved. In addition, a power control algorithm is offered, which can iteratively converge to the Stackelberg Equilibrium. Finally the simulation results show that by applying the provided algorithm, both the cellular user and the D2D pair have the secrecy energy efficiency improved.
D2D (Device-to-Device)通信具有提高频谱资源利用率的优点。但不幸的是,它带来了干扰和潜在的保密风险。本文提出了一种基于Stackelberg博弈的功率控制算法,利用干扰增强D2D通信的物理层安全性。然后,建立了一个基于Stackelberg博弈的数学模型,将保密能量效率作为效用函数。然后,证明了Stackelberg均衡的存在唯一性。此外,还提出了一种可迭代收敛到Stackelberg平衡点的功率控制算法。仿真结果表明,采用该算法,蜂窝用户和D2D对的保密能量效率都得到了提高。
{"title":"Improving physical layer security in underlay D2D communication via Stackelberg game based power control","authors":"Wanbing He, Wei Zhang, Wei Bai, Yueming Cai, Xinrong Guan, Junyue Qu","doi":"10.1109/CITS.2016.7546390","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546390","url":null,"abstract":"Device-to-Device (D2D) communication has advantages of improving the spectral resource efficiency. But unfortunately, it brings about interference and potential secrecy hazard. In this paper, a Stackelberg game based power control algorithm is provided to enhance the physical layer security underlaying D2D communication by utilizing the interference. Then, a mathematical model based on Stackelberg game is set up, in which we regard the secrecy energy efficiency as the utility function. After that, the existence and uniqueness of the Stackelberg Equilibrium is proved. In addition, a power control algorithm is offered, which can iteratively converge to the Stackelberg Equilibrium. Finally the simulation results show that by applying the provided algorithm, both the cellular user and the D2D pair have the secrecy energy efficiency improved.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129231735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Air pollution source estimation profiling via mobile sensor networks 基于移动传感器网络的空气污染源估算分析
Xue Yang, Junzhao Du, Sicong Liu, Rui Li, Hui Liu
The atmospheric environment is facing increasing threats from industrial pollutions. This paper presents an air pollution source estimation algorithm using mobile sensor networks. We propose a continuous point source model of pollution under windy conditions. Then we use quadrocopters which equipped with sensors that can detect pollutants to collect concentration information. Based on the collected information, we take advantage of the maximum likelihood estimation method to estimate the diffusion parameters. To improve the accuracy of the estimation of diffusion source position and make the quadrocopter approaching the source, we further propose a scheduling strategy based on the particle swarm optimizer basis. We conduct extensive experiments to show the effectiveness of our proposed approach.
大气环境正面临着工业污染日益严重的威胁。提出了一种基于移动传感器网络的空气污染源估计算法。我们提出了一个有风条件下的连续点源污染模型。然后我们用装有传感器的四轴飞行器来收集污染物的浓度信息。根据收集到的信息,利用极大似然估计方法估计扩散参数。为了提高扩散源位置估计的精度,使四旋翼飞行器接近扩散源,我们进一步提出了基于粒子群优化器的调度策略。我们进行了大量的实验来证明我们提出的方法的有效性。
{"title":"Air pollution source estimation profiling via mobile sensor networks","authors":"Xue Yang, Junzhao Du, Sicong Liu, Rui Li, Hui Liu","doi":"10.1109/CITS.2016.7546456","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546456","url":null,"abstract":"The atmospheric environment is facing increasing threats from industrial pollutions. This paper presents an air pollution source estimation algorithm using mobile sensor networks. We propose a continuous point source model of pollution under windy conditions. Then we use quadrocopters which equipped with sensors that can detect pollutants to collect concentration information. Based on the collected information, we take advantage of the maximum likelihood estimation method to estimate the diffusion parameters. To improve the accuracy of the estimation of diffusion source position and make the quadrocopter approaching the source, we further propose a scheduling strategy based on the particle swarm optimizer basis. We conduct extensive experiments to show the effectiveness of our proposed approach.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116792859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Behavior analysis of self-evolving botnets 自进化僵尸网络的行为分析
Takanori Kudo, Tomotaka Kimura, Yoshiaki Inoue, Hirohisa Aman, K. Hirata
Machine learning techniques have been achieving significant performance improvements in various kinds of tasks, and they are getting applied in many research fields. While we benefit from such techniques in many ways, they can be a serious security threat to the Internet if malicious attackers become able to utilize them to detect software vulnerabilities. This paper introduces a new concept of self-evolving botnets, where computing resources of infected hosts are exploited to discover unknown vulnerabilities in non-infected hosts. We propose a stochastic epidemic model that incorporates such a feature of botnets, and show its behaviors through numerical experiments and simulations.
机器学习技术已经在各种任务中取得了显著的性能改进,并在许多研究领域得到了应用。虽然我们在许多方面受益于这些技术,但如果恶意攻击者能够利用它们来检测软件漏洞,它们可能会对Internet构成严重的安全威胁。本文引入了自进化僵尸网络的新概念,利用受感染主机的计算资源发现未受感染主机的未知漏洞。我们提出了一个包含僵尸网络这一特征的随机流行病模型,并通过数值实验和模拟来展示其行为。
{"title":"Behavior analysis of self-evolving botnets","authors":"Takanori Kudo, Tomotaka Kimura, Yoshiaki Inoue, Hirohisa Aman, K. Hirata","doi":"10.1109/CITS.2016.7546428","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546428","url":null,"abstract":"Machine learning techniques have been achieving significant performance improvements in various kinds of tasks, and they are getting applied in many research fields. While we benefit from such techniques in many ways, they can be a serious security threat to the Internet if malicious attackers become able to utilize them to detect software vulnerabilities. This paper introduces a new concept of self-evolving botnets, where computing resources of infected hosts are exploited to discover unknown vulnerabilities in non-infected hosts. We propose a stochastic epidemic model that incorporates such a feature of botnets, and show its behaviors through numerical experiments and simulations.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114654536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Improved soft fusion-based cooperative spectrum sensing defense against SSDF attacks 改进的基于软融合的协同频谱感知防御SSDF攻击
Ting Peng, Yuebin Chen, Jie Xiao, Yang Zheng, Jiangfeng Yang
In the cognitive radios (CR), there is a security issue-spectrum sensing data falsification attacks (SSDF) in the process of cooperation. Some malicious users (MUs) who unwilling to cooperate friendly with other users may launch SSDF attacks by falsifying their local sensing information sent to fusion center (FC) intentionally, result in interfering with the detection and threat the CR networks. In order to defense against the SSDF attacks, an improved soft fusion-based algorithm is given in this paper, the key idea of the algorithm is that the cooperation is viewed as a service-evaluation process and making use of cognitive users' (CUs) average reputation degrees to reflect the service quality, then allocate properly the CUs' weights in the fusion according to the reputation degrees. Simulation results show that the sensing performance of the improved algorithm is better than the traditional soft-fusion CSS in the presence of SSDF attacks.
认知无线电(CR)在合作过程中存在一个安全问题——频谱感知数据伪造攻击(SSDF)。一些恶意用户不愿与其他用户友好合作,通过故意伪造发送到FC的本地感知信息,发起SSDF攻击,从而干扰检测,威胁到CR网络。为了防御SSDF攻击,本文提出了一种改进的基于软融合算法,该算法的核心思想是将合作视为一个服务评价过程,利用认知用户(cu)的平均信誉度来反映服务质量,然后根据信誉度合理分配融合中cu的权重。仿真结果表明,在存在SSDF攻击时,改进算法的感知性能优于传统的软融合CSS。
{"title":"Improved soft fusion-based cooperative spectrum sensing defense against SSDF attacks","authors":"Ting Peng, Yuebin Chen, Jie Xiao, Yang Zheng, Jiangfeng Yang","doi":"10.1109/CITS.2016.7546433","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546433","url":null,"abstract":"In the cognitive radios (CR), there is a security issue-spectrum sensing data falsification attacks (SSDF) in the process of cooperation. Some malicious users (MUs) who unwilling to cooperate friendly with other users may launch SSDF attacks by falsifying their local sensing information sent to fusion center (FC) intentionally, result in interfering with the detection and threat the CR networks. In order to defense against the SSDF attacks, an improved soft fusion-based algorithm is given in this paper, the key idea of the algorithm is that the cooperation is viewed as a service-evaluation process and making use of cognitive users' (CUs) average reputation degrees to reflect the service quality, then allocate properly the CUs' weights in the fusion according to the reputation degrees. Simulation results show that the sensing performance of the improved algorithm is better than the traditional soft-fusion CSS in the presence of SSDF attacks.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114688338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Spatial co-location pattern ordering 空间共位模式排序
Gongsheng Yuan, Lizhen Wang, Peizhong Yang, Lan Chen
Mining spatial co-location pattern is one of the most important researches in the field of spatial data mining. In the past researches, many spatial co-location pattern mining algorithms and the expansions about these algorithms have been proposed. However, some of these methods often produce a large number of patterns which are difficult to use. If we want to use the subset of the prevalent co-location pattern set to summarize the whole set and as the increase of the number of patterns in subset, the patterns in subset always are the best summary for the original prevalent set. This is a NP-hard problem. In this paper, we consider the problem of ordering a prevalent co-location pattern set so that each prefix of the ordering gives as good a summary of the set as possible. And according to the features of spatial data, we define an estimation of participation index function and a prevalent co-location pattern loss function to formulate this problem and design a greedy algorithm which gives an approximation quality.
空间共位模式挖掘是空间数据挖掘领域的重要研究内容之一。在过去的研究中,提出了许多空间共位模式挖掘算法及其扩展。然而,其中一些方法经常产生大量难以使用的模式。如果我们想用普遍同位模式集的子集来总结整个模式集,随着子集中模式数量的增加,子集中的模式总是对原始普遍模式集的最佳总结。这是np困难问题。在本文中,我们考虑了一个普遍的共定位模式集的排序问题,使得排序的每个前缀给出了该集合的尽可能好的摘要。根据空间数据的特点,定义了参与指标函数的估计和普遍存在的同位模式损失函数来表述该问题,并设计了具有近似质量的贪心算法。
{"title":"Spatial co-location pattern ordering","authors":"Gongsheng Yuan, Lizhen Wang, Peizhong Yang, Lan Chen","doi":"10.1109/CITS.2016.7546423","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546423","url":null,"abstract":"Mining spatial co-location pattern is one of the most important researches in the field of spatial data mining. In the past researches, many spatial co-location pattern mining algorithms and the expansions about these algorithms have been proposed. However, some of these methods often produce a large number of patterns which are difficult to use. If we want to use the subset of the prevalent co-location pattern set to summarize the whole set and as the increase of the number of patterns in subset, the patterns in subset always are the best summary for the original prevalent set. This is a NP-hard problem. In this paper, we consider the problem of ordering a prevalent co-location pattern set so that each prefix of the ordering gives as good a summary of the set as possible. And according to the features of spatial data, we define an estimation of participation index function and a prevalent co-location pattern loss function to formulate this problem and design a greedy algorithm which gives an approximation quality.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128329339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A study on transient electromagnetic signal acquisition and processing for exploring hidden disaster-causing factors in coalmine 煤矿隐患探测瞬变电磁信号采集与处理研究
Bin Sun, Haiying Li
By general exploration there is one or more geologic abnormal areas within Fumei No. 1 Coalmine Industrial Square and Shaft, which will affect the mine shaft construction and safety production. However, traditional methods for hidden disaster-causing factors will not meet the exploration demands because of their defects. For example, direct current electric method, geological radar and even three-dimensional seismic prospecting can not simultaneously identify geologic abnormal areas of water-bearing condition both underground and in mid-deep zone. Therefore, to explore hidden disaster-causing factors more fully, this paper puts forward a signal acquisition and processing way based on transient electromagnetic method. On the principle of transient electromagnetic method, a system of transient electromagnetic signal acquisition is built and composed of transmitter unit and receiver unit. By triggering start button, the system wirelessly triggers transmitter unit, i.e. one pulse magnetic field to the underground each time. 4ms later, two receiver coils simultaneously collect signals of the secondary pulsed magnetic field caused by underground medium. Finally the signal data are stored in CF card after RC filtering, operational amplifying, sample integral and analog-to-digital conversion. From the signal data processing and analyzing results, there are hidden disaster-causing factors in the exploration zone: one collapse column, one coalmine goaf and one underground watercourse. Compared with the geological data of pilot holes of shaft, these three geologic abnormal places are confirmed, which powerfully helps prove the reliability and efficiency of this method of signal acquisition and processing. These relevant exploration data can not only provide geologic basis for construction of industrial square buildings and structures, but also supply design and construction of shafts with instructions, and furthermore, serve as data reference for exploration of hidden disaster-causing factors in more complicated geological conditions areas.
经综合勘查,富美一矿工业广场及竖井内存在一个或多个地质异常区,影响矿井建设和安全生产。然而,传统的灾害隐患分析方法由于存在缺陷,已不能满足勘探需求。例如,直流电法、地质雷达甚至三维地震勘探都无法同时识别地下和中深层含水地质异常区。因此,为了更充分地挖掘潜在的灾害因素,本文提出了一种基于瞬变电磁法的信号采集与处理方法。根据瞬变电磁法原理,建立了由发射单元和接收单元组成的瞬变电磁信号采集系统。系统通过触发启动按钮,无线触发发射单元,即每次向地下发射一个脉冲磁场。4ms后,两个接收线圈同时采集地下介质产生的二次脉冲磁场信号。最后信号数据经过RC滤波、运算放大、采样积分、模数转换后存储到CF卡中。从信号数据处理和分析结果来看,探区存在一个陷落柱、一个煤矿采空区和一个地下水道的隐伏致灾因素。通过与竖井导孔地质资料的对比,确定了这三个地质异常点,有力地证明了该信号采集处理方法的可靠性和有效性。这些相关勘探资料不仅可以为工业广场建筑和构造物的施工提供地质依据,还可以为竖井的设计和施工提供指导,还可以为地质条件更复杂地区的隐伏致灾因素的勘探提供数据参考。
{"title":"A study on transient electromagnetic signal acquisition and processing for exploring hidden disaster-causing factors in coalmine","authors":"Bin Sun, Haiying Li","doi":"10.1109/CITS.2016.7546395","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546395","url":null,"abstract":"By general exploration there is one or more geologic abnormal areas within Fumei No. 1 Coalmine Industrial Square and Shaft, which will affect the mine shaft construction and safety production. However, traditional methods for hidden disaster-causing factors will not meet the exploration demands because of their defects. For example, direct current electric method, geological radar and even three-dimensional seismic prospecting can not simultaneously identify geologic abnormal areas of water-bearing condition both underground and in mid-deep zone. Therefore, to explore hidden disaster-causing factors more fully, this paper puts forward a signal acquisition and processing way based on transient electromagnetic method. On the principle of transient electromagnetic method, a system of transient electromagnetic signal acquisition is built and composed of transmitter unit and receiver unit. By triggering start button, the system wirelessly triggers transmitter unit, i.e. one pulse magnetic field to the underground each time. 4ms later, two receiver coils simultaneously collect signals of the secondary pulsed magnetic field caused by underground medium. Finally the signal data are stored in CF card after RC filtering, operational amplifying, sample integral and analog-to-digital conversion. From the signal data processing and analyzing results, there are hidden disaster-causing factors in the exploration zone: one collapse column, one coalmine goaf and one underground watercourse. Compared with the geological data of pilot holes of shaft, these three geologic abnormal places are confirmed, which powerfully helps prove the reliability and efficiency of this method of signal acquisition and processing. These relevant exploration data can not only provide geologic basis for construction of industrial square buildings and structures, but also supply design and construction of shafts with instructions, and furthermore, serve as data reference for exploration of hidden disaster-causing factors in more complicated geological conditions areas.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133843362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 International Conference on Computer, Information and Telecommunication Systems (CITS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1