By Topic

Intelligence Information Processing and Trusted Computing (IPTC), 2010 International Symposium on

Date 28-29 Oct. 2010

Filter Results

Displaying Results 1 - 25 of 187
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (289 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (85 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (153 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (114 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (173 KB)  
    Freely Available from IEEE
  • Greetings from the General Chairs

    Page(s): xvii - xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (168 KB)  
    Freely Available from IEEE
  • Organizing Committee

    Page(s): xix
    Save to Project icon | Request Permissions | PDF file iconPDF (144 KB)  
    Freely Available from IEEE
  • Data Hiding Techniques Based on Wavelet-like Transform and Complex Wavelet Transforms

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (209 KB) |  | HTML iconHTML  

    In this paper we compare data hiding techniques based on wavelet-like transform, viz., Slantlet transform, DD DT DWT and Complex Wavelet transforms, viz., DT CWT using wavelet based fusion method and thresholding method. The experimental results are compared with the existing method based on DWT. We observe that the proposed algorithms based on SLT and DT-CWT outperform the DWT in terms of visual quality and embedding capacity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating Supervised Machine Learning for Adapting Enterprise DRE Systems

    Page(s): 5 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (377 KB) |  | HTML iconHTML  

    Several adaptation approaches, such as policy-based and reinforcement learning, have been devised to ensure end-to-end quality-of-service (QoS) for enterprise distributed systems in dynamic operating environments. Not all approaches are applicable for distributed real-time and embedded (DRE) systems, however, which have stringent accuracy, timeliness, and development complexity requirements. Supervised machine learning techniques, such as artificial neural networks (ANNs), are a promising approach to address time complexity concerns of adaptive enterprise DRE systems. Likewise, ANNs address the development complexity of adaptive DRE systems by ensuring that adaptations are appropriate for the operating environment. This paper empirically evaluates the accuracy and timeliness of the ANN machine learning technique for environments on which it has been trained. Our results show ANNs are highly accurate in determining correct adaptations and provide predictable time complexity, e.g., with response times less than 6 μseconds. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The 128bit Block Cipher HyRAL (Hybrid Randomization Algorithm): Common Key Block Cipher

    Page(s): 9 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (441 KB) |  | HTML iconHTML  

    This paper proposes a improvement of a common key block cipher, HyRAL[1], which has 128bits block length and supports key length of 128, 192, and256bits. It has a 4way generalized Feistel Structure of 24 rounds for 128bits key length, and 32 rounds for 192, 256, bits key length. The rounds are consists of G1,F2,F1,G2 functions which have 4-round Feistel structure to make the cryptanalysis hard. We have evaluated its upper bounds of Maximum Differential (Linear) Characteristic Probability[2], and the cipher guarantee enough strength against Differential (Linear) attack. The round functions are composed of 8-bit s-box based on the inverse function on GF (2^8) a MDS matrix. round key XOR addition and byte oriented permutation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Vegas Scheme Based on Average Round Trip Time

    Page(s): 15 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (224 KB) |  | HTML iconHTML  

    An improved Vegas scheme is proposed with a measure of congestion control as average round trip time rather than round trip time. It enhanced the prevention of congestion control. Simulation results demonstrate in some scenario that the instantaneous queue length improved the stability and decreased response time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Local Universities of China Management Information System Integration Model Design

    Page(s): 18 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (261 KB) |  | HTML iconHTML  

    In this paper, we firstly analyse the existing problems and the causes of these problems during the process of management information in present local universities of China. We design a integration model of management information system of local universities. With this model, we can effectively integrate the management information system of. Every departments in a university. To solve these problems existing in the process. of information management in present local universities of China. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tension Spline Fitting with Bezier Curve

    Page(s): 21 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (324 KB) |  | HTML iconHTML  

    In geographical information system, geographical curves expressed by curve will become a trend. In this paper, based on the study of features of the tension spline and Bezier curve, it is proposed for geographical curve a new method and corresponding computing formula. In the method, we first fit the geographical curve by the tension spline, and the tension spline is divided by characteristic points, which finally is fitted by cubic Bezier curve piece by piece to a complete Bezier curve. Experiments show the different between fitted cubic Bezier curve and tension spline is small. The geographical curves expressed by the method express effectively the geographical features, especially large deflection geographical curves, and are convenient for editing and meet the needs of standardized metafile. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the Safety of University Financial System in the Network Environment

    Page(s): 25 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (183 KB) |  | HTML iconHTML  

    With modern computer network technology as the primary means of financial information systems, financial management and development. The author believes that the network environment of financial system faces numerous risks on information technology and modern management level high demands. This article discusses the network security of the financial system, offers a range of preventive strategies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability Analysis of Yarn Tension Control System Based on FTA in Jacquard Loom

    Page(s): 29 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (285 KB) |  | HTML iconHTML  

    Aimed at the problem of high failure rate in the tension control system of traditional circular knitting machine, this paper proposes and develops a kind of embedded yarn tension control system. Systematically study the causes of different failures in yarn tension control system and analysis the influencing reliability factors of real-time control system by FTA (Fault Tree Analysis) method, built system fault tree with qualitative analysis and quantitative analysis, work out the minimal cut set of system and estimate the occurrence probability of the top event. Figure out specific improvement measure and provide reference to enhance the system reliability. The improved tension control system is running steadily in the experiments, and analyzes the result turns to be beneficial to improve the reliability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Analysis of Vegetation Coverage Change in Miyun Reservoir Basin from 2000 to 2005 Based on Remote Sensing

    Page(s): 33 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (457 KB) |  | HTML iconHTML  

    Vegetation includes all plant communities that cover the earth surface. Vegetation coverage is the most important index to scale the status of the vegetation of the region, so the vegetation is the composition and the function body of ecological system. Vegetation coverage in different land use types of Miyun reservoir watershed were calculated based on remote sensing images (Landsat 5 TM images) in 2000 and 2005 by employing NDVI method for dimidiate pixel model, and the vegetation coverage maps of different periods were generated to analysis the temporal change of vegetation coverage of Miyun reservoir watershed. The results showed that, from 2000 to 2005, the vegetation coverage of every land use types were increased except the water area, and especially for the sand land and arable land, the growth were 29.5% and 27.3, respectively. And the average vegetation coverage is not high in the Miyun reservoir watershed, especially in the western region, the vegetation coverage is poor, and the soil erosion and land desertification situation is more serious. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Image-Sequence Compressing Algorithm Based on Homography Transformation for Unmanned Aerial Vehicle

    Page(s): 37 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (528 KB) |  | HTML iconHTML  

    Focus on the image compressing problem of unmanned aerial vehicle with high compression ratio, fixed compressing ratio and low computational complexity requirement, a low-complexity image-sequence compressing algorithm based on homography transformation was proposed. The image sequences were dynamically divided into frame-groups according the data from airborne inertial navigation systems, and the intermediate frames in the same frame-group was b i-directionally predicted by the first-frame and the end-frame with homography transformation. The homography matrix was got approximately by the airborne inertial navigation systems firstly and then was accurately computed by fast multiple sub-areas template matching. At the end the first frame and the residual images of the intermediate frames of the same frame-group was merged into a big image and coded by JPEG2000 to generate fixed-size code streams. The experiment results show that the proposed algorithm was with high compression performance, low computational complexity and excellent capacity for code-size control and will has good prospect in engineer. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Regression Method Research Based on Covering Algorithm

    Page(s): 41 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (310 KB) |  | HTML iconHTML  

    The Covering algorithm is proposed by Professor ZhangLing and ZhangBo in the 20th century, which simulates the structure of human learning, building a Constructive Neural Network Learning Model. Covering algorithm has been widely used to solve massive data classification problem, because its performance. The covering classification algorithm has fast learning, high recognition rate, massive data processing capacity and clear physical meaning advantages which has been used into the field of Weather forecasts, financial analysis and so on. So we try to inherit and develop the advantage of covering classification algorithm and expand its applications to the regression prediction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • China's Legal Construction and Countermeasures in the Development of E-government

    Page(s): 45 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (259 KB) |  | HTML iconHTML  

    There's a profound changes on the concept of administration with the coming of information society. To meet the need of this change, a new method of administration about E-government emerged with the combination of administration and modern science technology. The specification and consummating of E-government is the need of protecting the security of information. This article will focus to discuss the effect of E-government on their production, meaning, status and legal issues and proposed a method to improve e-government and its relevant laws in our country as well as the development trend of China's E-Government based on law. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power Spectral Analysis of Wrist Pulse Signal in Evaluating Adult Age

    Page(s): 48 - 50
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (267 KB) |  | HTML iconHTML  

    Wrist pulse-diagnosis has been used in traditional Chinese medicine for thousands of years, because pulse wave signal contains a large number of physiological and pathological information of people, the analysis on it is an important means to examine on people in sub-health status. In this research, a systematic approach was proposed to analyze the computerized wrist pulse signals, with the focus placed on the power spectra. The wrist pulse signal from the HK2000 pulse sensor was pre-processed. We gained the power spectra by using the fast Fourier transforms, and the power-spectral characteristics are analyzed and compared. Lots of important information can be found, such as evaluating adult age and distributing power spectra of the electrical signal. Potential application of this information in the sub-healthy field is indicated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Realization of Health Monitoring System on Electric Wheel Truck

    Page(s): 51 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (331 KB) |  | HTML iconHTML  

    This paper investigates vehicle health monitoring system (VHMS) on electric wheel truck. VHMS is connected with the control system of the electric wheel truck. It has local real-time system clock, mass size nonvolatile memory, and several interfaces such as Universal Serial Bus (USB), RS-232 and Ethernet for data transmission and download communication. Using General Packet Radio Service (GPRS) module, real-time data communication with remote server can be achieved. This paper analyzed the problems of the current data acquisition system, proposed the structure of VHMS based on field bus. Using data dictionary, determination rules and reasoning mechanism, monitoring data can be processed, classified, stored and transmitted. This paper completed the hardware design and the prototype of VHMS, achieved the online acquisition, storage and remote transmission of the parameters including engine, generator, rectifier, inverter, retarder, working hours, fuel consumption, mileage and so on. Health status of electric wheel truck can be monitored on the remote server. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effect Mechanism of El Niño Southern Oscillation on Wheat Futures: Based on EMD and SSVS Algorithm

    Page(s): 55 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (362 KB) |  | HTML iconHTML  

    At present, most of the studies on the relationship between El Nino Southern Oscillation and agricultural futures focus on perceptual and directly data analysis. This article uses EMD algorithm on endpoints processed data to decompose wheat futures price into seven Intrinsic Mode Function and one Residue. Then do symbolic clustering combined with SSVS method and denoised ENSO index. The results not only clearly show the negative relationship between ENSO index and wheat futures price, but also identified the specific impact path of the negative correlation, that is through IMF4 and IMF5. This method to find specific impact mechanism also provides a more rigorous idea to do certain research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Projection Pursuit Based Risk Assessment Method in Mobile Ad Hoc Networks

    Page(s): 60 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (229 KB) |  | HTML iconHTML  

    Establishing high performance cooperation and estimating the nodes' risk in mobile ad hoc networks (MANETS) is currently fundamental and challenging due to the inherent characteristics of MANETS, such as highly dynamic topology and absence of an effective security mechanism. Trust based assessment methods were recently put forward but presumed restrictions to the data samples or presumed weights for node's attributes is required. In our paper, PPRA method, short for Projection Pursuit based risk assessment, is proposed to analyze node's creditability. As projection pursuit turns high-dimensional node properties to low-dimension space, all nodes' risk levels could be clustered easily and accurately. Projection index, the same to judgment index of clustering consequence, is enacted to reveal different node behaviors. By maximizing projection index through Genetic Algorithm (GA) optimal projection direction is obtained, and then every node's projection value could be calculated. We prove that relationship between projection value and node risk level is that the larger projection value is, the more credible node is. Finally, the results in one-dimension and two-dimension projection prove our method is more efficient and practical than the traditional methods for risk assessment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision of Trusted Software Behavior

    Page(s): 67 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (262 KB) |  | HTML iconHTML  

    User's behaviors in information systems have different formats in different working modes, they mean users' intention actually. API callings, menu selections or requests are the familiar base elements of software behaviors, and different technologies are required to monitor and understand them. In information systems, it is necessary to insure that users' software behavior is trusted while processing. Client-Server mode is widely used in distributed computing system, the decision technology of trusted software behaviors from software of client meets the demand of forward defense in information systems. This paper puts forward the definition of software behavior and behavior set in client-server mode, software behavior is composed of requests from client, Request is the component of one or more software behaviors easy to be monitored. The expression of software behavior has been studied, and decision model of trusted software behavior has been built based on fuzzy matching algorithm, it can decide whether the processing software behavior is trusted or not. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Case-Based Reasoning System with Community Detection in Complexity Theory

    Page(s): 71 - 74
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (431 KB) |  | HTML iconHTML  

    As one of the most hot debated applications of Artificial Intelligence (AI), case-based reasoning (CBR) provides a methodology by reusing stored knowledge into new solutions. Due to its linear storage structure and similarity computation method between the target problem and the stored case, traditional CBR confronts with great challenges in efficiency and flexibility. In this paper, we propose a case-based reasoning system with community detection in complexity theory. With the introduction of Newman algorithm, a cluster tree could be established in order to organize the knowledge base into a hierarchical structure. Based on such design paradigm, the overhead of matching process could be greatly reduced, which will elevate the total performance of the system. Simulations and analysis present the efficiency improvement compared to traditional solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.