首页 > 最新文献

2013 IEEE Third International Conference on Information Science and Technology (ICIST)最新文献

英文 中文
Enhancing wireless security with theory of ill-posed problem: A novel physical-layer encryption mechanism 用不适定问题理论增强无线安全:一种新的物理层加密机制
Xiangyang Xu, W. Luo, Huawei Song, Lizhi Zhang
This paper studies physical-layer security without knowing the eavesdropper's channel state information. The use of ill-posed theory to protect wireless transmissions is proposed. Firstly, the problem of randomized transmission is translated to that of solving ill-posed equation to guarantee wireless transmissions with inherent low-probability-of interception (LPI). Secondly, by exploiting the nonunique or instable solutions of an ill-posed problem, two mechanisms are proposed that satisfy the given security requirement while achieving good throughput performance. Our results show that ill-posed problem is not always nasty. We hope that by identifying ill-posed problem inversely, a theoretical framework of enhancing physical-layer security can be constructed eventually.
本文在不知道窃听者信道状态信息的情况下研究物理层安全。提出了利用不适定理论保护无线传输的方法。首先,将随机传输问题转化为求解病态方程的问题,保证无线传输具有固有的低截获概率(LPI)。其次,利用病态问题的非唯一解或不稳定解,提出了两种满足给定安全要求的机制,同时获得了良好的吞吐量性能。我们的结果表明不适定问题并不总是令人讨厌的。我们希望通过对病态问题的反向识别,最终构建一个增强物理层安全性的理论框架。
{"title":"Enhancing wireless security with theory of ill-posed problem: A novel physical-layer encryption mechanism","authors":"Xiangyang Xu, W. Luo, Huawei Song, Lizhi Zhang","doi":"10.1109/ICIST.2013.6747844","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747844","url":null,"abstract":"This paper studies physical-layer security without knowing the eavesdropper's channel state information. The use of ill-posed theory to protect wireless transmissions is proposed. Firstly, the problem of randomized transmission is translated to that of solving ill-posed equation to guarantee wireless transmissions with inherent low-probability-of interception (LPI). Secondly, by exploiting the nonunique or instable solutions of an ill-posed problem, two mechanisms are proposed that satisfy the given security requirement while achieving good throughput performance. Our results show that ill-posed problem is not always nasty. We hope that by identifying ill-posed problem inversely, a theoretical framework of enhancing physical-layer security can be constructed eventually.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"543 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132229518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Physical-layer security based on joint scrambling with spatial and frequency resource 基于空间和频率资源联合置乱的物理层安全
Mingliang Li, Kaizhi Huang, Zhou Zhong
The projection of the random multi-antenna weighted vector structured with spatial scrambling is of constant modulus on the main channel, Eavesdropper can take the advantage of multi-antenna to intercept private information. To solve this problem, we design a kind of physical-layer secrecy method based on the joint scrambling with spatial and frequency resource. Based on the parallel transmission nature of OFDM, we construct a random multiple antenna weighted vector in the each subcarrier, the projection of which on the main channel is equal to a dynamic reference variable. The legitimate user can correctly demodulate the receive signal by this reference variable obtained from the estimation of the reference subcarrier. Meanwhile, because of the difference between the main channel and eavesdropper channel, eavesdropper can't obtain the useful information. The simulation results show that, when the legitimate users can correctly demodulate the received signal, the eavesdropper can't intercept the private information using whether blind equalization or MUSIC-like method.
通过空间置乱构造的随机多天线加权向量在主信道上的投影具有恒定模量,窃听者可以利用多天线的优势截获私人信息。为了解决这一问题,我们设计了一种基于空间和频率资源联合置乱的物理层保密方法。基于OFDM的并行传输特性,在每个子载波上构造一个随机多天线加权向量,其在主信道上的投影等于一个动态参考变量。合法用户可以通过对参考子载波的估计得到的参考变量来正确解调接收信号。同时,由于主信道与窃听信道的差异,窃听者无法获取有用的信息。仿真结果表明,在合法用户能够正确解调接收信号的情况下,无论采用盲均衡还是MUSIC-like方法,窃听者都无法拦截私人信息。
{"title":"Physical-layer security based on joint scrambling with spatial and frequency resource","authors":"Mingliang Li, Kaizhi Huang, Zhou Zhong","doi":"10.1109/ICIST.2013.6747830","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747830","url":null,"abstract":"The projection of the random multi-antenna weighted vector structured with spatial scrambling is of constant modulus on the main channel, Eavesdropper can take the advantage of multi-antenna to intercept private information. To solve this problem, we design a kind of physical-layer secrecy method based on the joint scrambling with spatial and frequency resource. Based on the parallel transmission nature of OFDM, we construct a random multiple antenna weighted vector in the each subcarrier, the projection of which on the main channel is equal to a dynamic reference variable. The legitimate user can correctly demodulate the receive signal by this reference variable obtained from the estimation of the reference subcarrier. Meanwhile, because of the difference between the main channel and eavesdropper channel, eavesdropper can't obtain the useful information. The simulation results show that, when the legitimate users can correctly demodulate the received signal, the eavesdropper can't intercept the private information using whether blind equalization or MUSIC-like method.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133483824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel scheme to generate optimal memcpy assembly code 一种生成最优内存汇编代码的新方案
Huan Ying, Hao Zhu, Donghui Wang, C. Hou
Memcpy function is invoked frequently by digital signal processor to handle data transfer during encoding and decoding of multimedia. This paper presents a novel scheme to generate optimal memcpy assembly code for a reduced instruction set computer architecture. Based on the ordered binary decision diagram and the concept of data mining, the proposed solution completely exploits the available optimization according to the input parameters of memcpy. Thus, the memcpy function assembly code generated by our proposal accomplishes the directed-optimal data transfer during execution. Experimental results showed that the solution improves the performance of memcpy effectively. It reduced 56.5c/o executed cycles on average. Moreover, the approach of generation for memcpy at assembly level is portable for any other reduced instruction set computer architecture with modification of the customization file.
多媒体编解码过程中,数字信号处理器经常调用Memcpy函数来处理数据传输。本文提出了一种针对精简指令集计算机体系结构生成最优内存汇编代码的新方案。该方案基于有序二元决策图和数据挖掘的概念,充分利用了memcpy输入参数的可用优化。因此,本文提出的memcpy函数汇编代码在执行过程中实现了定向最优的数据传输。实验结果表明,该方案有效地提高了记忆体内存的性能。它平均减少了56.5c/o的执行周期。此外,通过修改自定义文件,在汇编级生成内存的方法可移植到任何其他精简指令集计算机体系结构。
{"title":"A novel scheme to generate optimal memcpy assembly code","authors":"Huan Ying, Hao Zhu, Donghui Wang, C. Hou","doi":"10.1109/ICIST.2013.6747619","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747619","url":null,"abstract":"Memcpy function is invoked frequently by digital signal processor to handle data transfer during encoding and decoding of multimedia. This paper presents a novel scheme to generate optimal memcpy assembly code for a reduced instruction set computer architecture. Based on the ordered binary decision diagram and the concept of data mining, the proposed solution completely exploits the available optimization according to the input parameters of memcpy. Thus, the memcpy function assembly code generated by our proposal accomplishes the directed-optimal data transfer during execution. Experimental results showed that the solution improves the performance of memcpy effectively. It reduced 56.5c/o executed cycles on average. Moreover, the approach of generation for memcpy at assembly level is portable for any other reduced instruction set computer architecture with modification of the customization file.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133780939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The study to realize effective sharing for education resource based on grid technology 基于网格技术实现教育资源有效共享的研究
S. Xiong, Changjiang Chen, Jinhua Huang
This paper first introduces the conception of grid community with respect to the existing problems in education resource management and based on its characteristics, the construction and internal structure of a grid community are discussed. Then, according to the resource distribution in grid, the information sharing mechanism among communities is proposed and the procedure realization is also given, all this will result in the effective sharing of education resource in a high degree.
本文首先介绍了网格社区的概念,针对目前教育资源管理中存在的问题,根据网格社区的特点,讨论了网格社区的构建和内部结构。然后,根据资源在网格中的分布,提出了社区间的信息共享机制并给出了实现的步骤,从而实现教育资源的高度有效共享。
{"title":"The study to realize effective sharing for education resource based on grid technology","authors":"S. Xiong, Changjiang Chen, Jinhua Huang","doi":"10.1109/ICIST.2013.6747750","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747750","url":null,"abstract":"This paper first introduces the conception of grid community with respect to the existing problems in education resource management and based on its characteristics, the construction and internal structure of a grid community are discussed. Then, according to the resource distribution in grid, the information sharing mechanism among communities is proposed and the procedure realization is also given, all this will result in the effective sharing of education resource in a high degree.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solving the large airline disruption problems using a distributed computation approach to integer programming 基于整数规划的分布式计算方法求解大型航线中断问题
Benchi Li, C. Dang, Jinjin Zheng
In this paper, a distributed implementation of Dang's iterative method [1] is proposed to solve the airline disruption problems caused by the airport closures. The problem consists of two subproblems, and the solution domain of the first subproblem is divided into several segments by the initial seeds cluster division method. Dang's method [1] is applied to solve the first subproblem in each segment simultaneously in a distributed computation network, and the obtained feasible flight routes are used to solve the second subproblem. Numerical results show that the proposed method is better than CPLEX and Liu et al. [2].
本文提出了Dang迭代法[1]的分布式实现,用于解决机场关闭导致的航线中断问题。该问题由两个子问题组成,通过初始种子聚类划分方法将第一个子问题的解域划分为若干段。Dang的方法[1]在分布式计算网络中同时求解每一段的第一个子问题,用得到的可行飞行路线求解第二个子问题。数值结果表明,该方法优于CPLEX和Liu等[2]。
{"title":"Solving the large airline disruption problems using a distributed computation approach to integer programming","authors":"Benchi Li, C. Dang, Jinjin Zheng","doi":"10.1109/ICIST.2013.6747586","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747586","url":null,"abstract":"In this paper, a distributed implementation of Dang's iterative method [1] is proposed to solve the airline disruption problems caused by the airport closures. The problem consists of two subproblems, and the solution domain of the first subproblem is divided into several segments by the initial seeds cluster division method. Dang's method [1] is applied to solve the first subproblem in each segment simultaneously in a distributed computation network, and the obtained feasible flight routes are used to solve the second subproblem. Numerical results show that the proposed method is better than CPLEX and Liu et al. [2].","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132640776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved strategy of time-frequency opportunistic spectral usage for multi-rate wireless systems 多速率无线系统时频机会频谱利用改进策略
Yubo Wang, Chenggui Wang, Chao Li, Ducheng Wu
In this paper, we present an improved strategy of channel probing and transmission scheduling in a multi-rate wireless system. We consider a fixed data time model, where time is slotted and channel states do not change within one slot. In a multichannel wireless system, a transmitter can opportunistically use channels with high-quality conditions. In order to make better decisions and find out the channel with the maximum transmission rate, the transmitter should probe individual channels by sending control packets, which will consume time and energy, thus reduce effective time for actual data transmission. In fact, the coherence time of the channel may be much larger than the duration of one slot. We can send multiple back-to-back packets if the channel are always in good conditions. Leveraging the absorbing Markov chain model, we propose a strategy for opportunistic spectral usage, in which both time and frequency domain process are taken into account.
本文提出了一种改进的多速率无线系统的信道探测和传输调度策略。我们考虑一个固定的数据时间模型,其中时间是分槽的,信道状态在一个槽内不会改变。在多信道无线系统中,发射机可以偶然地使用具有高质量条件的信道。为了做出更好的决策,找出传输速率最大的信道,发射机需要通过发送控制包来探测各个信道,这会消耗时间和能量,从而减少实际数据传输的有效时间。实际上,信道的相干时间可能比一个时隙的持续时间大得多。如果信道一直处于良好状态,我们可以发送多个背靠背数据包。利用吸收马尔可夫链模型,我们提出了一种同时考虑时域和频域过程的机会性频谱利用策略。
{"title":"Improved strategy of time-frequency opportunistic spectral usage for multi-rate wireless systems","authors":"Yubo Wang, Chenggui Wang, Chao Li, Ducheng Wu","doi":"10.1109/ICIST.2013.6747825","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747825","url":null,"abstract":"In this paper, we present an improved strategy of channel probing and transmission scheduling in a multi-rate wireless system. We consider a fixed data time model, where time is slotted and channel states do not change within one slot. In a multichannel wireless system, a transmitter can opportunistically use channels with high-quality conditions. In order to make better decisions and find out the channel with the maximum transmission rate, the transmitter should probe individual channels by sending control packets, which will consume time and energy, thus reduce effective time for actual data transmission. In fact, the coherence time of the channel may be much larger than the duration of one slot. We can send multiple back-to-back packets if the channel are always in good conditions. Leveraging the absorbing Markov chain model, we propose a strategy for opportunistic spectral usage, in which both time and frequency domain process are taken into account.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132787985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A case study of small and medium-sized enterprises' entrepreneurial models based on independent innovation 基于自主创新的中小企业创业模式案例研究
Andrew Lo
Independent innovation is the driving force for the development of enterprises, especially small and medium-sized enterprises (SMEs). This paper studies a small radio and television broadcasting equipment manufacturer called CG's entrepreneurial journey, analyzes the company's “technological innovation + brand internationalization + social capital integration” entrepreneurial model, and finds that this mixed independent innovation model can enhance a company's independent innovation capacity and competitiveness, and thus it quickly occupied the market. The research findings can provide something positive for SMEs in developing countries to draw on.
自主创新是企业特别是中小企业发展的动力。本文研究了一家小型广播电视设备制造商CG的创业历程,分析了该公司“技术创新+品牌国际化+社会资本整合”的创业模式,发现这种混合自主创新模式可以提升企业的自主创新能力和竞争力,从而迅速占领市场。研究结果可以为发展中国家的中小企业提供一些积极借鉴。
{"title":"A case study of small and medium-sized enterprises' entrepreneurial models based on independent innovation","authors":"Andrew Lo","doi":"10.1109/ICIST.2013.6747733","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747733","url":null,"abstract":"Independent innovation is the driving force for the development of enterprises, especially small and medium-sized enterprises (SMEs). This paper studies a small radio and television broadcasting equipment manufacturer called CG's entrepreneurial journey, analyzes the company's “technological innovation + brand internationalization + social capital integration” entrepreneurial model, and finds that this mixed independent innovation model can enhance a company's independent innovation capacity and competitiveness, and thus it quickly occupied the market. The research findings can provide something positive for SMEs in developing countries to draw on.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133623367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-payload spread spectrum based audio watermarking via M-ary code phase shift keying 基于m码相移键控的高载荷扩频音频水印
Youzhi Zhang, Peng Zhang, Ye Li, Wenshuo Zhang, Lin Zhao
This paper presents a method to improve the payload of spread spectrum (SS) based audio watermarking via an M-ary SS modulation technique called code phase shift keying (CPSK), in which the code phase of the spreading sequence is modulated with multiple data bits. Compared with the code division multiple access (CDMA) based watermarking with the same transparency and payload, the proposed scheme provides better robustness against common attacks for large M, and requires lower embedding and extraction complexity.
本文提出了一种利用码相移键控(CPSK)技术提高扩频音频水印有效载荷的方法,该技术采用多数据位调制扩频序列的码相。与具有相同透明度和有效载荷的基于码分多址(CDMA)的水印相比,该方案对大M的常见攻击具有更好的鲁棒性,并且需要更低的嵌入和提取复杂度。
{"title":"High-payload spread spectrum based audio watermarking via M-ary code phase shift keying","authors":"Youzhi Zhang, Peng Zhang, Ye Li, Wenshuo Zhang, Lin Zhao","doi":"10.1109/ICIST.2013.6747582","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747582","url":null,"abstract":"This paper presents a method to improve the payload of spread spectrum (SS) based audio watermarking via an M-ary SS modulation technique called code phase shift keying (CPSK), in which the code phase of the spreading sequence is modulated with multiple data bits. Compared with the code division multiple access (CDMA) based watermarking with the same transparency and payload, the proposed scheme provides better robustness against common attacks for large M, and requires lower embedding and extraction complexity.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133716420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling and simulation of helicopter automatic distribution system based on SIMULINK 基于SIMULINK的直升机自动配电系统建模与仿真
Qinling Zhang, Yang Liu, Feifei Wen
Combined with the research of the power distribution system structure and the analysis of flight stage priority, modeling and simulation of the electrical load management functions in the helicopter automatic power distribution system were accomplished. The complete digital simulation of distribution system was achieved with MATLAB/SIMULINK. The key models including the Power System Processor (PSP) and the Electric Load Management Center (ELMC) were established based on the electric load equations management theory, which consists of power supply request equation, load state equation and load control equation. Compared the simulation data with the physical experiment platform data, the result validates the effectiveness and accuracy of this modeling approach.
结合配电系统结构研究和飞行级优先级分析,对直升机自动配电系统中的电气负荷管理功能进行了建模和仿真。利用MATLAB/SIMULINK对配电系统进行了完整的数字仿真。基于电力负荷方程管理理论,建立了电力系统处理器(PSP)和电力负荷管理中心(ELMC)等关键模型,包括供电请求方程、负荷状态方程和负荷控制方程。将仿真数据与物理实验平台数据进行对比,验证了该建模方法的有效性和准确性。
{"title":"Modeling and simulation of helicopter automatic distribution system based on SIMULINK","authors":"Qinling Zhang, Yang Liu, Feifei Wen","doi":"10.1109/ICIST.2013.6747595","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747595","url":null,"abstract":"Combined with the research of the power distribution system structure and the analysis of flight stage priority, modeling and simulation of the electrical load management functions in the helicopter automatic power distribution system were accomplished. The complete digital simulation of distribution system was achieved with MATLAB/SIMULINK. The key models including the Power System Processor (PSP) and the Electric Load Management Center (ELMC) were established based on the electric load equations management theory, which consists of power supply request equation, load state equation and load control equation. Compared the simulation data with the physical experiment platform data, the result validates the effectiveness and accuracy of this modeling approach.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117322121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-classification algorithm based on support vectors 一种基于支持向量的多分类算法
Jian Cao, S. Sun, X. Duan
In the fault classification process, a flexible SVM classification algorithm is proposed to solve the unreasonable condition that the number of muti-classification decision boundary is stationary when using the traditional support vector machine(SVM). The algorithm is based on support vector data description(SVDD) hypersphere determine the sample distribution characteristics similar class of fusion as a new class, guaranted to produce classifications which are easy to distinguish. Training multi hyperspheres between the new classes and SVM decision boundary within the new class. Using one-to-one vote to choose. Experiments show that this algorithm has a better classification performance, and can reduce training time and determine time which can be well applied to fault classification.
在故障分类过程中,针对传统支持向量机(SVM)多分类决策边界数目平稳的不合理条件,提出了一种灵活的SVM分类算法。该算法基于支持向量数据描述(SVDD)超球确定样本分布特征,将相似类融合为新类,保证产生易于区分的分类。训练新类之间的多超球和支持向量机在新类内的决策边界。采用一对一的投票方式进行选择。实验表明,该算法具有较好的分类性能,减少了训练时间和确定时间,可以很好地应用于故障分类。
{"title":"A multi-classification algorithm based on support vectors","authors":"Jian Cao, S. Sun, X. Duan","doi":"10.1109/ICIST.2013.6747556","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747556","url":null,"abstract":"In the fault classification process, a flexible SVM classification algorithm is proposed to solve the unreasonable condition that the number of muti-classification decision boundary is stationary when using the traditional support vector machine(SVM). The algorithm is based on support vector data description(SVDD) hypersphere determine the sample distribution characteristics similar class of fusion as a new class, guaranted to produce classifications which are easy to distinguish. Training multi hyperspheres between the new classes and SVM decision boundary within the new class. Using one-to-one vote to choose. Experiments show that this algorithm has a better classification performance, and can reduce training time and determine time which can be well applied to fault classification.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"42 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120914916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 IEEE Third International Conference on Information Science and Technology (ICIST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1