By Topic

Intelligence Information Processing and Trusted Computing (IPTC), 2010 International Symposium on

Date 28-29 Oct. 2010

Filter Results

Displaying Results 1 - 25 of 187
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (289 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • Greetings from the General Chairs

    Publication Year: 2010, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (168 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • Data Hiding Techniques Based on Wavelet-like Transform and Complex Wavelet Transforms

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    In this paper we compare data hiding techniques based on wavelet-like transform, viz., Slantlet transform, DD DT DWT and Complex Wavelet transforms, viz., DT CWT using wavelet based fusion method and thresholding method. The experimental results are compared with the existing method based on DWT. We observe that the proposed algorithms based on SLT and DT-CWT outperform the DWT in terms of visual ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating Supervised Machine Learning for Adapting Enterprise DRE Systems

    Publication Year: 2010, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (377 KB) | HTML iconHTML

    Several adaptation approaches, such as policy-based and reinforcement learning, have been devised to ensure end-to-end quality-of-service (QoS) for enterprise distributed systems in dynamic operating environments. Not all approaches are applicable for distributed real-time and embedded (DRE) systems, however, which have stringent accuracy, timeliness, and development complexity requirements. Super... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The 128bit Block Cipher HyRAL (Hybrid Randomization Algorithm): Common Key Block Cipher

    Publication Year: 2010, Page(s):9 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    This paper proposes a improvement of a common key block cipher, HyRAL[1], which has 128bits block length and supports key length of 128, 192, and256bits. It has a 4way generalized Feistel Structure of 24 rounds for 128bits key length, and 32 rounds for 192, 256, bits key length. The rounds are consists of G1,F2,F1,G2 functions which have 4-round Feistel structure to make the cryptanalysis hard. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Vegas Scheme Based on Average Round Trip Time

    Publication Year: 2010, Page(s):15 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    An improved Vegas scheme is proposed with a measure of congestion control as average round trip time rather than round trip time. It enhanced the prevention of congestion control. Simulation results demonstrate in some scenario that the instantaneous queue length improved the stability and decreased response time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Local Universities of China Management Information System Integration Model Design

    Publication Year: 2010, Page(s):18 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    In this paper, we firstly analyse the existing problems and the causes of these problems during the process of management information in present local universities of China. We design a integration model of management information system of local universities. With this model, we can effectively integrate the management information system of. Every departments in a university. To solve these proble... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tension Spline Fitting with Bezier Curve

    Publication Year: 2010, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    In geographical information system, geographical curves expressed by curve will become a trend. In this paper, based on the study of features of the tension spline and Bezier curve, it is proposed for geographical curve a new method and corresponding computing formula. In the method, we first fit the geographical curve by the tension spline, and the tension spline is divided by characteristic poin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the Safety of University Financial System in the Network Environment

    Publication Year: 2010, Page(s):25 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    With modern computer network technology as the primary means of financial information systems, financial management and development. The author believes that the network environment of financial system faces numerous risks on information technology and modern management level high demands. This article discusses the network security of the financial system, offers a range of preventive strategies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability Analysis of Yarn Tension Control System Based on FTA in Jacquard Loom

    Publication Year: 2010, Page(s):29 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    Aimed at the problem of high failure rate in the tension control system of traditional circular knitting machine, this paper proposes and develops a kind of embedded yarn tension control system. Systematically study the causes of different failures in yarn tension control system and analysis the influencing reliability factors of real-time control system by FTA (Fault Tree Analysis) method, built ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Analysis of Vegetation Coverage Change in Miyun Reservoir Basin from 2000 to 2005 Based on Remote Sensing

    Publication Year: 2010, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    Vegetation includes all plant communities that cover the earth surface. Vegetation coverage is the most important index to scale the status of the vegetation of the region, so the vegetation is the composition and the function body of ecological system. Vegetation coverage in different land use types of Miyun reservoir watershed were calculated based on remote sensing images (Landsat 5 TM images) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Image-Sequence Compressing Algorithm Based on Homography Transformation for Unmanned Aerial Vehicle

    Publication Year: 2010, Page(s):37 - 40
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    Focus on the image compressing problem of unmanned aerial vehicle with high compression ratio, fixed compressing ratio and low computational complexity requirement, a low-complexity image-sequence compressing algorithm based on homography transformation was proposed. The image sequences were dynamically divided into frame-groups according the data from airborne inertial navigation systems, and the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Regression Method Research Based on Covering Algorithm

    Publication Year: 2010, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    The Covering algorithm is proposed by Professor ZhangLing and ZhangBo in the 20th century, which simulates the structure of human learning, building a Constructive Neural Network Learning Model. Covering algorithm has been widely used to solve massive data classification problem, because its performance. The covering classification algorithm has fast learning, high recognition rate, massive data p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • China's Legal Construction and Countermeasures in the Development of E-government

    Publication Year: 2010, Page(s):45 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    There's a profound changes on the concept of administration with the coming of information society. To meet the need of this change, a new method of administration about E-government emerged with the combination of administration and modern science technology. The specification and consummating of E-government is the need of protecting the security of information. This article will focus to discus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power Spectral Analysis of Wrist Pulse Signal in Evaluating Adult Age

    Publication Year: 2010, Page(s):48 - 50
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Wrist pulse-diagnosis has been used in traditional Chinese medicine for thousands of years, because pulse wave signal contains a large number of physiological and pathological information of people, the analysis on it is an important means to examine on people in sub-health status. In this research, a systematic approach was proposed to analyze the computerized wrist pulse signals, with the focus ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Realization of Health Monitoring System on Electric Wheel Truck

    Publication Year: 2010, Page(s):51 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    This paper investigates vehicle health monitoring system (VHMS) on electric wheel truck. VHMS is connected with the control system of the electric wheel truck. It has local real-time system clock, mass size nonvolatile memory, and several interfaces such as Universal Serial Bus (USB), RS-232 and Ethernet for data transmission and download communication. Using General Packet Radio Service (GPRS) mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effect Mechanism of El Niño Southern Oscillation on Wheat Futures: Based on EMD and SSVS Algorithm

    Publication Year: 2010, Page(s):55 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    At present, most of the studies on the relationship between El Nino Southern Oscillation and agricultural futures focus on perceptual and directly data analysis. This article uses EMD algorithm on endpoints processed data to decompose wheat futures price into seven Intrinsic Mode Function and one Residue. Then do symbolic clustering combined with SSVS method and denoised ENSO index. The results no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Projection Pursuit Based Risk Assessment Method in Mobile Ad Hoc Networks

    Publication Year: 2010, Page(s):60 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Establishing high performance cooperation and estimating the nodes' risk in mobile ad hoc networks (MANETS) is currently fundamental and challenging due to the inherent characteristics of MANETS, such as highly dynamic topology and absence of an effective security mechanism. Trust based assessment methods were recently put forward but presumed restrictions to the data samples or presumed weights f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision of Trusted Software Behavior

    Publication Year: 2010, Page(s):67 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    User's behaviors in information systems have different formats in different working modes, they mean users' intention actually. API callings, menu selections or requests are the familiar base elements of software behaviors, and different technologies are required to monitor and understand them. In information systems, it is necessary to insure that users' software behavior is trusted while process... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Case-Based Reasoning System with Community Detection in Complexity Theory

    Publication Year: 2010, Page(s):71 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB) | HTML iconHTML

    As one of the most hot debated applications of Artificial Intelligence (AI), case-based reasoning (CBR) provides a methodology by reusing stored knowledge into new solutions. Due to its linear storage structure and similarity computation method between the target problem and the stored case, traditional CBR confronts with great challenges in efficiency and flexibility. In this paper, we propose a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.