By Topic

Communications and Intelligence Information Security (ICCIIS), 2010 International Conference on

Date 13-14 Oct. 2010

Filter Results

Displaying Results 1 - 25 of 76
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (3105 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (156 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2010, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (89 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2010, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (107 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2010, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • A Node Passive Localization Algrithm Based on Wireless Sensor Networks

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    A brief introduction of passive localization is presented in this paper. With the localization algorithm of wireless sensor networks, a novel algorithm classification is discussed. Outer node passive localization based on wireless sensor networks is analyzed, and a new localization algorithm is designed. The Monte-Carlo simulation experiment results demonstrate that the new algorithm has a better ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved BP Neural Network Algorithm for GPS Height Conversion

    Publication Year: 2010, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    GPS height conversion is the key problem in survey engineering. To resolve it, researchers supposed some mathematical function to fit the surface of normal height such as plain surface, quadratic surface fitting and so on,however, which have model error. It should reduce the accuracy of the fitting result. In order to eliminate and reduce the model errors, this paper adopted BP neural network to c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comprehensive Profit Assessment Study on Ecological Water Compensation in Heihe River

    Publication Year: 2010, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    Based on the research of the ecological water compensation benefit in ecology, resource, economy and society aspects, the author established the AHP-FCA assessment model with both of the analytic hierarchy process and the fuzzy comprehensive assessment, considering the overall benefit indicator system of the water source areas and water receiving areas in the river basin. The comprehensive benefit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Modeling Method of Pharmacokinetics Mathematical Model

    Publication Year: 2010, Page(s):13 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    This paper explores a new modeling method of pharmacokinetics mathematical model. The complex human body can be regarded as a grey system based on grey system theory. The pharmacokinetics mathematical model can be established based on the blood drug concentration data, grey system theory and information re-use method. In this new method, there is no need to simplify the complex human body model fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Choice-Making on Distribution Locations of Logistics Center Based on Fuzzy Multi-criteria Decision Making Theory

    Publication Year: 2010, Page(s):17 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    In light of China's logistics industry, the location selection of distribution center is one of the most important issues. The objective of this research is to present a location-selection model of logistics distribution center based on fuzzy multi-criteria decision making theory. With the model, the candidate evaluation programs of the logistics distribution center location are simulated and test... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development and Research of Music Player Application Based on Android

    Publication Year: 2010, Page(s):23 - 25
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    First, Introduce the Google's mobile equipment platform -Android, and then develop a kind of music player through the research and analysis on the system structure and the application framework of the platform. This player has friendly interface, convenient operation, good expansibility and maintainability. After testing, the player can satisfy the basic demand of users and run stable. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of Open-Architecture Motion Controller for Experimental Equipment

    Publication Year: 2010, Page(s):26 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    To address the traditional limitations of numerical experimental equipment, with the current trends of the open-motion system, an efficient experimental equipment of open motion control system was developed. With PC as the platform, PMAC-motion-control card as the core, BP network as the PID regulator, the motion control system was operational and functional. Experiments show that the system with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvement on Blind Symbol Rate Detection under Unfavorable Conditions

    Publication Year: 2010, Page(s):29 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    The performance of the blind symbol rate detection through non-linearity degrades under some conditions, including small excess bandwidth, limited symbol length and low signal-to-noise ratio. The improved algorithm here considers the main disturbance-continuous part of the power spectral of non-linearity as its envelope layer and eliminates it by an envelope sifting process, thus greatly improve t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Research on BIT Single-Fault Threshold Value Setting Approach Based on ROC

    Publication Year: 2010, Page(s):36 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (153 KB) | HTML iconHTML

    In order to solve the problem that setting the double threshold value hypothesis question under the single breakdown in the BIT, to decrease BIT's false alarm rate, and improve BIT's testability. Researches were done on the subject's quota relations between the ROC sensitivity, specificity and its FDR, FAR, and corresponding test index was got on the ROC. It was realized that more lower FAR can be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Speed Governor System Based on TMS320F28335 Chip for a Gas Engine

    Publication Year: 2010, Page(s):40 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    This paper presents a digital speed governor system for a gas engine based on TMS320F28335. In speed governor system, hall sensor A04E is used to measure speed; L298N is used to drive the step motor; torque vector control is used to subdivise the angular of step motor. Fuzzy control and PID control are used together, fuzzy control implement fast control, PID control implement accurate control. Fuz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Multiple-Information Demonstration Platform of Digital City

    Publication Year: 2010, Page(s):44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (579 KB) | HTML iconHTML

    This paper has studied the information release platform of digital city, and proposed a multiple-information collaborative platform of digital city which uses the 3D (3-dimensional) GIS model to demonstrate basic city geographic data, the virtual reality technology to realize internal roaming inside important constructions, and the panorama to demonstrate information of important geographic locati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Design of 32-Bit Embedded Microprocessor

    Publication Year: 2010, Page(s):48 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    A 32-bit embedded Microprocessor based on the instruction set of ARMv4T architecture is designed and implemented in this paper. It adopts five-stage pipeline, implements separate instruction and data caches, contains memory management unit, and supports coprocessor instruction. This paper proposes perfect solution for the problem of data correlation, control correlation and resource correlation em... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Study of Distributed Semantic Web Services' Publishing and Discovery Mechanism

    Publication Year: 2010, Page(s):51 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    With the maturation and development of the Web services' technology, the distributed semantic Web service's publishing and discovery mechanism is presented in order to find the target service quickly, accurately and efficiently in the flood of Web services. The mechanism is two-tier service registration management system which is constructed by the ontology reasoning to form the category Chord rin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Error-Correcting Network Codes with Side Information from Source

    Publication Year: 2010, Page(s):55 - 59
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    This paper investigates the problem of securing k source symbols transmission in a network with side information to an adversary who can obtain k' source symbols, eavesdrop μ channels and contaminate d channels. We characterize the security performance of the new model by relative network generalized Hamming weight (RNGHW) of a linear code and a subcode with respect to network error correct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent Transport Security Based on Freezing Mode

    Publication Year: 2010, Page(s):60 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    A Freezing Mode oriented to Mobile Agent transport is provided for network applications that require high level security. This is achieved by multiple verification and frozen sensitive data and code. All these ensure that the network applications are safe even if Mobile Agents are intercepted during its transport. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.