首页 > 最新文献

2012 World Congress on Information and Communication Technologies最新文献

英文 中文
DWT-DCT-SVD based intravascular ultrasound video watermarking 基于DWT-DCT-SVD的血管内超声视频水印
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409079
N. Dey, P. Das, A. B. Roy, A. Das, S. S. Chaudhuri
Intravascular ultrasound (IVUS) is a medical imaging system, which uses a specially designed catheter equipped with a small ultrasound probing device at its distal end. This system allows the ultrasound signal to visualize the blood vessels from the inside and is capable of imaging the diseased vessels, measuring the dimension and composition of the plaque. IVUS is an efficient method for detecting various ischemie heart diseases. Presently considerable amount of work has been done in telemonitoring which involves the transmission of biomedicai signals through wireless media. Exchange of biomedicai signals amongst hospitals needs efficient and reliable transmission. Watermark is added "ownership" information in multimedia contents to prove authenticity, verify signal integrity, and achieve control over copy process. This paper proposes a novel session based blind watermarking method with secret key by embedding binary watermark images into IVUS video. The IVUS video is a sensitive diagnostic tool that is used to detect various cardio-vascular diseases by measuring and recording the anatomy of the heart and adjoined blood vessels in exquisite detail. The various anatomical minutiae of the heart and blood vessels are important characteristics which correspond to many severe human cardiac diseases. In this present work the entire video of IVUS is split into frames and application of Discrete Wavelet Transformation (DWT), Discrete Cosine Transformation (DCT) followed by Singular Value Decomposition (SVD) composes the watermark embedding technique. Watermark extraction is achieved by applying inverse DWT, inverse DCT and SVD. In this approach the generated peak signal to noise ratio (PSNR) of the original IVUS video signal vs. watermarked signal and the correlation value of the original watermark image and the extracted watermark image have a high acceptable level of imperceptibility and distortion.
血管内超声(IVUS)是一种医学成像系统,它使用一种特殊设计的导管,在其远端装有小型超声探测装置。该系统允许超声信号从内部可视化血管,并能够成像病变血管,测量斑块的尺寸和组成。IVUS是检测各种缺血性心脏疾病的有效方法。目前在远程监测方面已经做了相当多的工作,其中涉及到通过无线媒体传输生物医学信号。医院间的生物医学信号交换需要高效、可靠的传输。水印是在多媒体内容中加入“所有权”信息来证明真实性,验证信号的完整性,实现对拷贝过程的控制。通过在IVUS视频中嵌入二值水印图像,提出了一种基于会话的密钥盲水印方法。IVUS视频是一种灵敏的诊断工具,用于检测各种心血管疾病,通过测量和记录心脏和邻近血管的解剖结构的精细细节。心脏和血管的各种解剖细节是与许多严重的人类心脏病相对应的重要特征。在本研究中,将整个IVUS视频分割成帧,应用离散小波变换(DWT)、离散余弦变换(DCT)和奇异值分解(SVD)构成水印嵌入技术。水印提取是通过逆DWT、逆DCT和奇异值分解来实现的。该方法生成的原始IVUS视频信号与水印信号的峰值信噪比(PSNR)以及原始水印图像与提取的水印图像的相关值具有较高的可接受的不可感知性和失真程度。
{"title":"DWT-DCT-SVD based intravascular ultrasound video watermarking","authors":"N. Dey, P. Das, A. B. Roy, A. Das, S. S. Chaudhuri","doi":"10.1109/WICT.2012.6409079","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409079","url":null,"abstract":"Intravascular ultrasound (IVUS) is a medical imaging system, which uses a specially designed catheter equipped with a small ultrasound probing device at its distal end. This system allows the ultrasound signal to visualize the blood vessels from the inside and is capable of imaging the diseased vessels, measuring the dimension and composition of the plaque. IVUS is an efficient method for detecting various ischemie heart diseases. Presently considerable amount of work has been done in telemonitoring which involves the transmission of biomedicai signals through wireless media. Exchange of biomedicai signals amongst hospitals needs efficient and reliable transmission. Watermark is added \"ownership\" information in multimedia contents to prove authenticity, verify signal integrity, and achieve control over copy process. This paper proposes a novel session based blind watermarking method with secret key by embedding binary watermark images into IVUS video. The IVUS video is a sensitive diagnostic tool that is used to detect various cardio-vascular diseases by measuring and recording the anatomy of the heart and adjoined blood vessels in exquisite detail. The various anatomical minutiae of the heart and blood vessels are important characteristics which correspond to many severe human cardiac diseases. In this present work the entire video of IVUS is split into frames and application of Discrete Wavelet Transformation (DWT), Discrete Cosine Transformation (DCT) followed by Singular Value Decomposition (SVD) composes the watermark embedding technique. Watermark extraction is achieved by applying inverse DWT, inverse DCT and SVD. In this approach the generated peak signal to noise ratio (PSNR) of the original IVUS video signal vs. watermarked signal and the correlation value of the original watermark image and the extracted watermark image have a high acceptable level of imperceptibility and distortion.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128689552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Chakra: A new approach for symmetric key encryption 查克拉:对称密钥加密的新方法
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409170
P. R. Kumar, S. S. Dhenakaran, K. Sailaja, P. Saikishore
Encryption is an art of protecting data that win wars, protect properties and personal information if performed properly. It ensures that the appropriate data is exchanged between the intended persons only; even if the eavesdroppers get the content of the data they should not be able to understand it. Chakra Algorithm is a symmetric key encryption technique. It is a process of encrypting the data with the concepts of Cartesian Co-ordinate Geometry andcircle generation. The process considers the translation and rotation of axis when the data is grouped into circles each circle holds the portion of data. The Cartesian axis will be migrated to the respective centerscircles and rotated by certain angle. The collection of angle with which each individual circle is rotated; the co-ordinates to which it is swapped, the size of the square grid the radius of the circle hold the symmetric key. Unlike the other current algorithms, in Chakra Algorithm we will not directly change the data instead location of data.
加密是一种保护数据的艺术,如果执行得当,可以赢得战争,保护财产和个人信息。确保只在预期的人员之间交换适当的数据;即使窃听者得到了数据的内容,他们也不应该能够理解它。脉轮算法是一种对称密钥加密技术。它是用笛卡尔坐标几何和圆生成的概念对数据进行加密的过程。当数据分组成圆时,该过程考虑轴的平移和旋转,每个圆保存部分数据。笛卡尔轴将被迁移到各自的圆心上并旋转一定角度。旋转角度:每个圆旋转时的角度集合;交换到的坐标,正方形网格的大小圆的半径都是对称密钥。与其他当前的算法不同,在脉轮算法中,我们不会直接改变数据,而是改变数据的位置。
{"title":"Chakra: A new approach for symmetric key encryption","authors":"P. R. Kumar, S. S. Dhenakaran, K. Sailaja, P. Saikishore","doi":"10.1109/WICT.2012.6409170","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409170","url":null,"abstract":"Encryption is an art of protecting data that win wars, protect properties and personal information if performed properly. It ensures that the appropriate data is exchanged between the intended persons only; even if the eavesdroppers get the content of the data they should not be able to understand it. Chakra Algorithm is a symmetric key encryption technique. It is a process of encrypting the data with the concepts of Cartesian Co-ordinate Geometry andcircle generation. The process considers the translation and rotation of axis when the data is grouped into circles each circle holds the portion of data. The Cartesian axis will be migrated to the respective centerscircles and rotated by certain angle. The collection of angle with which each individual circle is rotated; the co-ordinates to which it is swapped, the size of the square grid the radius of the circle hold the symmetric key. Unlike the other current algorithms, in Chakra Algorithm we will not directly change the data instead location of data.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129799831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
BOKHARI: A new software oriented stream cipher: A proposal 一种新的面向软件的流密码:建议
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409062
M. Bokhari, F. Masoodi
This paper presents BOKHARI; a new proposed software-oriented stream cipher constructed using a Non-linear feedback shift register and a Non linear filter function and is designed for a secret key that is up to 128 bits in length. The BOKHARI stream cipher uses both basic design principles from the stream cipher SOBER-Ü6 and transformations derived from the steam cipher DRAGON.
本文提出了BOKHARI;一种基于非线性反馈移位寄存器和非线性滤波函数的面向软件的流密码,其密钥长度可达128位。BOKHARI流密码使用了来自流密码SOBER-Ü6的基本设计原则和来自蒸汽密码DRAGON的转换。
{"title":"BOKHARI: A new software oriented stream cipher: A proposal","authors":"M. Bokhari, F. Masoodi","doi":"10.1109/WICT.2012.6409062","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409062","url":null,"abstract":"This paper presents BOKHARI; a new proposed software-oriented stream cipher constructed using a Non-linear feedback shift register and a Non linear filter function and is designed for a secret key that is up to 128 bits in length. The BOKHARI stream cipher uses both basic design principles from the stream cipher SOBER-Ü6 and transformations derived from the steam cipher DRAGON.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130681809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A probability-based approximate algorithm for anomaly detection in WSN 基于概率的WSN异常检测近似算法
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409241
Tao Sun, Weiheng Chen, Yang Liu, Hongfeng Sun
Anomaly detection is always a challenge for wireless sensor network (WSN). In some applications, researchers compare the number of abnormal nodes with the pre-provided threshold to detect the anomaly. But, it involves the whole abnormal nodes in WSN and consumes lots of resources. In this paper, we proposed a probability-based algorithm for anomaly detection which reduces involved nodes and consumes fewer resources. The experimental results demonstrate that, the algorithm can satisfies demand of query and is effective to reduce the cost of communication band and power energy by choosing appropriate parameters.
异常检测一直是无线传感器网络(WSN)面临的难题。在某些应用中,研究人员将异常节点的数量与预先提供的阈值进行比较,以检测异常。但是,它涉及到整个WSN的异常节点,消耗了大量的资源。本文提出了一种基于概率的异常检测算法,减少了涉及节点,减少了资源消耗。实验结果表明,该算法能够满足查询需求,并通过选择合适的参数,有效地降低了通信频带成本和功耗。
{"title":"A probability-based approximate algorithm for anomaly detection in WSN","authors":"Tao Sun, Weiheng Chen, Yang Liu, Hongfeng Sun","doi":"10.1109/WICT.2012.6409241","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409241","url":null,"abstract":"Anomaly detection is always a challenge for wireless sensor network (WSN). In some applications, researchers compare the number of abnormal nodes with the pre-provided threshold to detect the anomaly. But, it involves the whole abnormal nodes in WSN and consumes lots of resources. In this paper, we proposed a probability-based algorithm for anomaly detection which reduces involved nodes and consumes fewer resources. The experimental results demonstrate that, the algorithm can satisfies demand of query and is effective to reduce the cost of communication band and power energy by choosing appropriate parameters.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131010207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic image annotation via incorporating Naive Bayes with particle swarm optimization 结合朴素贝叶斯和粒子群优化的自动图像标注
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409182
Mohamed Sami, Nashwa El-Bendary, A. Hassanien
This paper presents an automatic image annotation approach that integrates the Naive Bayes classifier with particle swarm optimization algorithm for classes' probabilities weighting. The proposed hybrid approach refines the output of multi-class classification that is based on the usage of Naive Bayes classifier for automatically labeling images with a number of words. Each input image is segmented using the normalized cuts segmentation algorithm in order to create a descriptor for each segment. One Naive Bayes classifier is trained for all the classes. Particle swarm optimization algorithm is employed as a search strategy in order to identify an optimal weighting for classes probabilities from Naive Bayes classifier. The proposed approach has been applied on Corel5K benchmark dataset. Experimental results and comparative performance evaluation, for results obtained from the proposed approach and other related researches, demonstrate that the proposed approach outperforms the performance of the other approaches, considering annotation accuracy, for the experimented dataset.
提出了一种将朴素贝叶斯分类器与粒子群优化算法相结合的图像自动标注方法。提出的混合方法改进了基于朴素贝叶斯分类器的多类分类输出,该分类器用于自动标记带有多个单词的图像。使用规范化切割分割算法对每个输入图像进行分割,以便为每个片段创建描述符。一个朴素贝叶斯分类器被训练为所有的类。采用粒子群算法作为搜索策略,从朴素贝叶斯分类器中确定类概率的最优权重。该方法已在Corel5K基准数据集上得到应用。实验结果和对比性能评价表明,对于实验数据集,在考虑标注精度的情况下,本文方法的性能优于其他方法。
{"title":"Automatic image annotation via incorporating Naive Bayes with particle swarm optimization","authors":"Mohamed Sami, Nashwa El-Bendary, A. Hassanien","doi":"10.1109/WICT.2012.6409182","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409182","url":null,"abstract":"This paper presents an automatic image annotation approach that integrates the Naive Bayes classifier with particle swarm optimization algorithm for classes' probabilities weighting. The proposed hybrid approach refines the output of multi-class classification that is based on the usage of Naive Bayes classifier for automatically labeling images with a number of words. Each input image is segmented using the normalized cuts segmentation algorithm in order to create a descriptor for each segment. One Naive Bayes classifier is trained for all the classes. Particle swarm optimization algorithm is employed as a search strategy in order to identify an optimal weighting for classes probabilities from Naive Bayes classifier. The proposed approach has been applied on Corel5K benchmark dataset. Experimental results and comparative performance evaluation, for results obtained from the proposed approach and other related researches, demonstrate that the proposed approach outperforms the performance of the other approaches, considering annotation accuracy, for the experimented dataset.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130422432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantitative analyses and evaluation of MANET routing protocols in effect of varying mobility model using Qual-Net simulator 利用qualal - net模拟器,定量分析和评估了不同移动性模型下的MANET路由协议
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409205
D. Vir, S. Agarwal, S. A. Imam
Mobile Ad hoc Network (MANET) is the collection of the mobile nodes without the aid of fixed infrastructure. The communication in MANET is therefore completely dependent on the nodes of the network. For the efficient working of the network various routing protocols have been developed. These protocols improve the efficiency of MANET by providing the path between distant nodes through multi-hop links. The performance of the protocols is affected by the various factors. One such factor is the mobility of the nodes. This paper provides the comparative analysis of various routing protocols used in day to day scenario under the effect of various mobility models: viz File, Group and Random Way Point Mobility Model. The results show significant impact of mobility models on performance of routing protocols.
移动自组网(MANET)是在没有固定基础设施的情况下移动节点的集合。因此,MANET中的通信完全依赖于网络的节点。为了保证网络的高效运行,各种路由协议应运而生。这些协议通过多跳链路提供远程节点之间的路径,从而提高了MANET的效率。协议的性能受到各种因素的影响。其中一个因素是节点的移动性。本文对日常场景中使用的各种路由协议在各种移动模型的影响下进行了比较分析:即文件、组和随机路径点移动模型。结果表明,移动模型对路由协议的性能有显著影响。
{"title":"Quantitative analyses and evaluation of MANET routing protocols in effect of varying mobility model using Qual-Net simulator","authors":"D. Vir, S. Agarwal, S. A. Imam","doi":"10.1109/WICT.2012.6409205","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409205","url":null,"abstract":"Mobile Ad hoc Network (MANET) is the collection of the mobile nodes without the aid of fixed infrastructure. The communication in MANET is therefore completely dependent on the nodes of the network. For the efficient working of the network various routing protocols have been developed. These protocols improve the efficiency of MANET by providing the path between distant nodes through multi-hop links. The performance of the protocols is affected by the various factors. One such factor is the mobility of the nodes. This paper provides the comparative analysis of various routing protocols used in day to day scenario under the effect of various mobility models: viz File, Group and Random Way Point Mobility Model. The results show significant impact of mobility models on performance of routing protocols.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126830734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Classification of multivariate time series using supervised locally linear embedding 基于监督局部线性嵌入的多元时间序列分类
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409248
Xiaoqing Weng, Shimin Qin
Multivariate time series (MTS) are used in very broad areas such as finance, medicine, multimedia and speech recognition. Most of existing approaches for MTS classification are not designed for preserving the within-class local structure of the MTS dataset. The within-class local structure is important when a classifier is used for classification. In this paper, a new feature extraction method for MTS classification based on supervised locally linear embedding (LLE) and generalized regression network is proposed. MTS samples in training dataset are projected into a low dimensional space by using the supervised LLE, its mapping function can be learned by generalized regression network. Experimental results performed on six real-world datasets demonstrate the effectiveness of our proposed approach for MTS classification.
多元时间序列(MTS)在金融、医学、多媒体和语音识别等领域有着广泛的应用。大多数现有的MTS分类方法都没有考虑到保留MTS数据集的类内局部结构。当使用分类器进行分类时,类内局部结构非常重要。提出了一种基于监督局部线性嵌入(LLE)和广义回归网络的MTS分类特征提取方法。利用监督LLE将训练数据集中的MTS样本投影到低维空间中,其映射函数可通过广义回归网络学习。在六个真实数据集上进行的实验结果证明了我们提出的MTS分类方法的有效性。
{"title":"Classification of multivariate time series using supervised locally linear embedding","authors":"Xiaoqing Weng, Shimin Qin","doi":"10.1109/WICT.2012.6409248","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409248","url":null,"abstract":"Multivariate time series (MTS) are used in very broad areas such as finance, medicine, multimedia and speech recognition. Most of existing approaches for MTS classification are not designed for preserving the within-class local structure of the MTS dataset. The within-class local structure is important when a classifier is used for classification. In this paper, a new feature extraction method for MTS classification based on supervised locally linear embedding (LLE) and generalized regression network is proposed. MTS samples in training dataset are projected into a low dimensional space by using the supervised LLE, its mapping function can be learned by generalized regression network. Experimental results performed on six real-world datasets demonstrate the effectiveness of our proposed approach for MTS classification.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115941711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BP neural network based PID control for ship steering 基于BP神经网络的船舶操舵PID控制
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409228
Xingxing Huo, Jiangqiang Hu, Zeyu Li
A new kind of algorithm of controller for ship is proposed. BP neural network based PID control is one of artificial neural networks which can emulate ship's manual steering as autopilot for ship steering. This paper introduces the principle, characteristics and learning algorithm of the BP neural network. Getting BP neural network based PID control for ship steering by combining BP neural network and traditional PID. Making use of MATLAB, simulate this new kind of controller for ship in consideration of disturbances of wind, wave and current and without them respectively. The simulation shows that the BP neural network based PID control for ship steering can improve the robustness of the system and has better adapt ability to the ship model etc.
提出了一种新的船舶控制器算法。基于BP神经网络的PID控制是一种可以模拟船舶手动操舵作为船舶自动操舵仪的人工神经网络。介绍了BP神经网络的原理、特点和学习算法。将BP神经网络与传统PID相结合,得到了基于BP神经网络的船舶操舵PID控制。利用MATLAB对该新型船舶控制器分别在考虑风、浪、流干扰和不考虑风、浪、流干扰的情况下进行了仿真。仿真结果表明,基于BP神经网络的船舶转向PID控制可以提高系统的鲁棒性,并具有较好的船舶模型适应能力等。
{"title":"BP neural network based PID control for ship steering","authors":"Xingxing Huo, Jiangqiang Hu, Zeyu Li","doi":"10.1109/WICT.2012.6409228","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409228","url":null,"abstract":"A new kind of algorithm of controller for ship is proposed. BP neural network based PID control is one of artificial neural networks which can emulate ship's manual steering as autopilot for ship steering. This paper introduces the principle, characteristics and learning algorithm of the BP neural network. Getting BP neural network based PID control for ship steering by combining BP neural network and traditional PID. Making use of MATLAB, simulate this new kind of controller for ship in consideration of disturbances of wind, wave and current and without them respectively. The simulation shows that the BP neural network based PID control for ship steering can improve the robustness of the system and has better adapt ability to the ship model etc.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122681942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A comparative study for Image Enhancement using soft computing models 基于软计算模型的图像增强比较研究
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409165
Md. Iqbal Quraishi, J. P. Choudhury, M. De, G. Das, A. Bhattacharjee
Our paper is based on the glimpse of comparative analysis of Image Enhancement techniques via different soft computing techniques, i.e Differential Evolution, Harmony Search, Bacterial Foraging Optimization and a hybrid Particle Swarm Adapted Bacterial Forgaing Optimization algorithm. Particle Swarm Adapted Bacterial Foraging (PS-BFO) is a new algorithm that has shown superior results in proportional integral derivative controller tuning application. In order to examine the global search capability of PS-BFO, we evaluate the performance of BFOA and PS-BFO on 23 numerical benchmark functions. In PS-BFO, the search directions of tumble behavior for each bacterium are oriented by the individual's best location and the global best location. The experimental results show that PS-BFO performs much better than BFOA for almost all test functions. That's approved that the PSO oriented BFO by strategy improve its global optimization capability. Results are compared with other recognition techniques like Differential Evolution, Harmony Search algorithm based image enhancement.
本文基于对不同软计算技术的图像增强技术的比较分析,即差分进化,和谐搜索,细菌觅食优化和混合粒子群适应细菌锻造优化算法。粒子群适应细菌觅食算法(PS-BFO)是一种新的算法,在比例积分微分控制器的整定应用中表现出优异的效果。为了检验PS-BFO的全局搜索能力,我们在23个数值基准函数上评估了PS-BFO和BFOA的性能。在PS-BFO中,每个细菌的翻滚行为的搜索方向是由个体的最佳位置和全局的最佳位置导向的。实验结果表明,PS-BFO在几乎所有的测试功能上都优于BFOA。验证了基于策略的粒子群优化算法提高了其全局优化能力。结果比较了其他识别技术,如差分进化,和谐搜索算法基于图像增强。
{"title":"A comparative study for Image Enhancement using soft computing models","authors":"Md. Iqbal Quraishi, J. P. Choudhury, M. De, G. Das, A. Bhattacharjee","doi":"10.1109/WICT.2012.6409165","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409165","url":null,"abstract":"Our paper is based on the glimpse of comparative analysis of Image Enhancement techniques via different soft computing techniques, i.e Differential Evolution, Harmony Search, Bacterial Foraging Optimization and a hybrid Particle Swarm Adapted Bacterial Forgaing Optimization algorithm. Particle Swarm Adapted Bacterial Foraging (PS-BFO) is a new algorithm that has shown superior results in proportional integral derivative controller tuning application. In order to examine the global search capability of PS-BFO, we evaluate the performance of BFOA and PS-BFO on 23 numerical benchmark functions. In PS-BFO, the search directions of tumble behavior for each bacterium are oriented by the individual's best location and the global best location. The experimental results show that PS-BFO performs much better than BFOA for almost all test functions. That's approved that the PSO oriented BFO by strategy improve its global optimization capability. Results are compared with other recognition techniques like Differential Evolution, Harmony Search algorithm based image enhancement.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122731032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defense response of search engine websites to non cooperating crawlers 搜索引擎网站对不合作爬虫的防御反应
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409078
Rishabh Dev Chandna, P. Chaubey, S. C. Gupta
Robots.txt non cooperating web crawlers are unwanted by any website as they can create serious negative impact in terms of denial of service, privacy and cost. Defense mechanisms such as automated content access protocol, captcha, web crawler trap, real time bot detection etc. have been proposed to protect websites from unwanted crawler access. Although, the extent of these mechanisms being practically applied against such crawlers is not known clearly. In this paper we present an investigation carried out to get insights about defense mechanisms used by websites against robots.txt non cooperating web crawlers. This investigation is limited only to search engine class of websites. MBot, a self-developed non cooperating web crawler is the primary tool used for investigation. On investigation we find that search engine websites do have defense mechanisms to prevent non cooperating crawler access on them. Although, absence of any kind of defense phenomena to prevent MBot's access is also observed on some of the investigated websites. Robustness in observed defense mechanisms to basic network and application parameters like proxy, port number, user agent, IP address etc. is also observed.
Robots.txt不合作的网络爬虫是任何网站都不想要的,因为它们会在拒绝服务,隐私和成本方面造成严重的负面影响。防御机制,如自动内容访问协议,验证码,网络爬虫陷阱,实时机器人检测等,已提出保护网站免受不必要的爬虫访问。尽管如此,这些机制实际应用于此类爬虫的程度尚不清楚。在本文中,我们提出了一项调查,以深入了解网站对robots.txt非合作网络爬虫使用的防御机制。本调查仅限于搜索引擎类网站。MBot是一种自主开发的非合作网络爬虫,是调查的主要工具。在调查中,我们发现搜索引擎网站确实有防御机制来防止不合作的爬虫访问它们。然而,在一些被调查的网站上也观察到没有任何防御MBot访问的现象。观察到的防御机制对基本网络和应用参数(如代理、端口号、用户代理、IP地址等)的鲁棒性也被观察到。
{"title":"Defense response of search engine websites to non cooperating crawlers","authors":"Rishabh Dev Chandna, P. Chaubey, S. C. Gupta","doi":"10.1109/WICT.2012.6409078","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409078","url":null,"abstract":"Robots.txt non cooperating web crawlers are unwanted by any website as they can create serious negative impact in terms of denial of service, privacy and cost. Defense mechanisms such as automated content access protocol, captcha, web crawler trap, real time bot detection etc. have been proposed to protect websites from unwanted crawler access. Although, the extent of these mechanisms being practically applied against such crawlers is not known clearly. In this paper we present an investigation carried out to get insights about defense mechanisms used by websites against robots.txt non cooperating web crawlers. This investigation is limited only to search engine class of websites. MBot, a self-developed non cooperating web crawler is the primary tool used for investigation. On investigation we find that search engine websites do have defense mechanisms to prevent non cooperating crawler access on them. Although, absence of any kind of defense phenomena to prevent MBot's access is also observed on some of the investigated websites. Robustness in observed defense mechanisms to basic network and application parameters like proxy, port number, user agent, IP address etc. is also observed.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134473469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2012 World Congress on Information and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1