ABSTRACT
The conference on network security and communication engineering is meant to serve as a forum for exchanging new developments and research progresss between scholars, scientists and engineers all over the world and providing a unique opportunity to exchange information, to present the latest results as well as to review the relevant issues on
TABLE OF CONTENTS
chapter |6 pages
Mandatory access control scheme based on security label for state power control system
K.L. Gao Z.M. Guo
chapter |4 pages
The expected value management mechanism based on certificate system
X.K. Zheng H. Zhang S. Peng
chapter |8 pages
Security defense model of Modbus TCP communication based on Zone/Border rules
W.L. Shang L. Li
chapter |6 pages
Permissions abuse detection for android platform based on droidbox
S.Q. Wang, H.T. Ma & X.H. Wu S.Q. Wang
chapter |4 pages
DroidMonitor: A high-level programming model for dynamic API monitoring on android
D. Liang R. Chen
chapter |2 pages
(25) where , . Th ere is a o Pfor each P . The e fou n (25 P ) whe Fr i , i sp l ay 1 s, the o . ptimal P when r 1 . The max Tim he ar l optimal value of
is a maximum of optimal can be found to mak tion of
chapter |4 pages
Implementing variable length Pseudo Random Number Generator (PRNG) with fixed high frequency (1.44 GHZ) via Vertix-7 FPGA family
Q.A. Al-Haija N.A. Jebril
chapter |6 pages
The security protection system design for the state grid with trusted computing technology
B.L. Yang & B.H. Zhao H. Zhang
chapter |2 pages
tor, and R13 and R14 divider ratio can be set up and adjust the output voltage to reach high voltage accu-ra tc o yr . Ind a Rd 1 d3 it i ao n nd , Ra 1 n4 R dC iv i cd i er r iti oco cn an eb c et e s det b ue p ed en th ae d j cu a st t ht o hd e eo u a tn p du t t vh o el ta r ge e tr o ca e vh o il g hg v eo l t te a rg m ei a nc a u - of TL cn o n tt u pR ro ri t ou n lc - en ri ate ti ct o te r le tor, and R13 an sp d roR o1 r d en r oit u i ns1 id v tep tra tac
the cathode and the reference voltage terminal of
chapter |6 pages
Research on text classification based on inverted-index in cloud computing data center
G.Y. Yang & L. Chen L. Chen & B. Meng
chapter |4 pages
Rehabilitation for hearing-impaired children pronunciation system based on cloud application architectures
L.J. Shi J. Zhao
chapter |6 pages
A two-level mixed service polling model with batch arrival
Z. Guan & W.H. Qian Y.Q. Wang
chapter |1 pages
Separation and reception of sub-chip multipath components
X.G. Zhang, Y. Guo & Y.J. Sun L.L. Li
chapter |1 pages
Coecient of variations on SDP matrix – a new feature for discriminating between explosion and earthquake
H.M. Huang, Y. Tian & C.J. Zhao X.H. Shi
chapter |3 pages
Euclidean distances as well as the polarities of the are recorded as R according to Equation (3). In traces in order to judge the similarity of two addition, do the same operation on d ' and d ' descriptors, we can determine whether the two and we can also get R ' . Assume the angle o f descriptors match or not. Firstly, if they do not P P and P P is as well as the angle of have the same type of contrast, this feature point is P ' P ' is ' . Then the difference value treated as a false one and it will not be taken into be tw een R and R ' and the difference between consideration. Conversely, if they have the same and ' accordi n g to (4) are achieved. In case type of contrast, we go on calculating the that the difference absolute value is in the range of Euclidean distance of them respectively according θ and R and R to: same. It is the same 'would be considered to be the with and ' .
For each feature point, compute the ratio of the shortest Euclidean distance and the second shortest one. Next, the ratio is compared with the default There is a proposed criteria that if R is equal threshold value (usually 0.7 in experiment). If the is also equal to ' , P is matched ratio is in the range of 0.7, we think that this point
chapter |4 pages
Random walks for link prediction in networks with nodes attributes
Y.X. Chen & L. Chen L. Chen
chapter |2 pages
the point p . The direction of the normal specifies l = (L , L ) = I(x ,y),...,I(x ,y),...,I(x ,y ),....,I(x ,y)
) between the x axis in this article. tion vector of light intensity and environment ( Estimate consistency in shadows showed as follows: Shadow constraints can be represented as linear ine- ,..., ,...,l qualities in the plane. Shown in Figure 2 are two line defined by its normal and point . In each case, a shadow constraint is specified by either a pair For the infinite light source images, convert prob- of lines (wedge cast shadow constraint) or a single lems into error function to obtain the minimum val- line (half-plane attached shadow constraint). ue. Therefore, the process of solvi ng infinite light Formally, a half-plane constraint is specified with
chapter |1 pages
to improve the retrieval accuracy of the image. component of H is large, and the colors Experiments show that retrieval method in this paper distinguished by human eyes are very limited. The has higher accuracy and meets the users’ cognitive method to quantize the three components requirements for image better. will be unequally used in this paper. Divide the hue space into eight parts; both saturation S space and 2 THE IMAGE FEATURE RETRIEVAL brightness compose the H quantized to an one-dimensional 2.1 The Color Feature Retrieval vector: Because color is the most intuitionistic feature and
Haralick e In this paper, a fixed divis xtract textu e texture features. e. Then d methods of content-based image to image information. information of color .In this interdepe and so on. The symbiot block ca directio information of (4) color histogram method is propos Eucli nt, entropy, homogeny een e texture deeper, the value of moment of inertia tion. based image retrieva tic m a distance rix by the relationship between pix e is d ividedinto 16 Haralick expre ction symbiotic matrix in 1970s. The method to build the 16×16. Then matrix. Commonl ular informatio tions moment, entropy, homogeny area and non-similarity and so on. The sy on-sim
chapter 2|3 pages
) C2a ) lc C ul al tceu la th te t m he an m s ean s and atnhdetshtea nd s a ta rd n dard t he im th aegiemsaignedsaitnabdaasteab to as geettothgeet th im e ag iemsam ge ostmco lo sstec lose
(13) (13) (12) (14) textu 0.5.
chapter |4 pages
Current–mode signal processing based OTA design for multimedia data transmission
Jong-Un Kim, Sung-Dae Yeo, Dong-Ho Kim, Gye-Min Lee & Seong-Kweon Kim
chapter |6 pages
Impact of partially coherent X-ray source on clinical phase contrast imaging
X.L. Zhang, J. Yang & S. Liu X.L. Zhang & T. Xia
chapter |4 pages
Manufacturing information model for design for manufacturing
H.J. Liu, Q.M. Fan & B. Chen Q.M. Fan B. Chen
chapter |4 pages
Experiments and numerical analysis of flow rate in unstably stratified field
Motoo Fumizawa, Yoshiharu Saito & Naoto Uchiyama
chapter |1 pages
indirectly reconstruction, there may be a rapider and more convenient approach in detection of signal’s high-order cumulants such as the modulation type. A Ctly K Oo W Lru E Gn M Ee N Tv oeh s om c r wn a se srus pa p ob r te e dm ra b yd id uet hat e Nt a nal Science ar n dm T ea c la o yi n M jt o rt i P cs t on f ’s hina under grant 2013ZX 003.
indir may be a rapider and proce
chapter |4 pages
A routing protocol for two-level clustering in Wireless Sensor Networks
Alghanmi Ali Omar, ChunGun Yu, Woon Sagong, Hyunjin Park & ChongGun Kim Mary Wu
chapter |4 pages
Laser refractive surgery: New materials and methods and optimal market strategies
Vitaliy Kalashnikov & Jose de Jesus Rocha Salazar M.D. Mariya Kalashnikova
chapter |6 pages
Using narrow-band communications technologies, increase of radio resource utilization
S.Q. Liu, Y. G. Li, C.X. Yang & J.D. Zhou X.Z. Hou & H.L. Sun
chapter |6 pages
Term-based character feature planning for automatic story generation
H.T. Wang F. Zhu F. Zhang
chapter |4 pages
Research on key technology of three-dimensional talking-head driven by the Chinese text
L.J. Shi P. Feng
chapter |3 pages
in in ddeexx in in ggsseett } } ( ( 1 1 ) ) 33FFAACCIIAALLSSEEMMAANNTT IC IC SSDDEESSCCRR IP IP TTIIOONNSSuuppppoossee , , aanndd M , , , , is is ccoommpp le le te te ly ly d d is is tr tr ib ib u u ti t v iv e e la la tti t c ic e e , , “ “ x x ” ” rreepprreesseenn ts ts th th eeAA cc coorrdd in in ggto to AAFFSSffrraammeewwoorrkk , , t h th is is ppaappeerrpprrooppoosseessaa
ndexing set } , and crete antic set ξ, in th
chapter |8 pages
Pattern recognition with applications to pre-diagnosis of pathologies in the vocal tract
Regiane Denise Solgon Bassi Henrique Dezani