{"title":"Three Dimensional Reconstruction and Key Technology Study for Knee Joint Slice Medical Images","authors":"Xiangyang Jin","doi":"10.1109/ITAPP.2010.5566085","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566085","url":null,"abstract":"combine computerized tomography technology well for fabricating made bone model and bone substitute rapidly and precisely, this paper has brought forward a new way which generates directly data of 3D objects model by interbedded interpolating. Firstly, using the contour tracing algorithm to trace the manipulated contour BMP, the contour point chain was attained. Calculates the least distance of these corresponded contours around the superposition point, the best orientation was attained. Due to the larger distance of CT images, the paper uses its optimized least distance algorithm to attain lengthways contour point chain which is interpolated with the third power non-uniform B-spline.Using a plane in the middle of two slices to intersect these lengthways contour line, the contour's character point was attained which is middle layer information of model. Lastly, links the contour character point on the adjoined slice to generate triangular facet model.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126272596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power Consumption Monitor for Wireless Sensor Nodes","authors":"Fan Zhang, Wenfeng Li","doi":"10.1109/ITAPP.2010.5566365","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566365","url":null,"abstract":"low power is a key element in the design of a wireless sensor node. It is necessary to know the power consumption details of sensors, microcontroller, transceiver, and other components before optimization. However, different application has different configuration. It isn't convenient to create theoretic model for each platform. We proposed a portable power consumption monitoring testbed for wireless sensor nodes (WSN), which can real-time acquire the information of current and voltage change. First of all, the system architecture is described, special for the current-sense amplifier (ADM4073), ADC (AD7705). Then, give out the schematic, flowchart and algorithm of AD7705 and microcontroller (Atmega16L). Finally, experiment results and analysis are given out based on wireless sensor networks (WSNs) platform 'MicaZ'. It is shown that this testbed can well monitor the power consumption of WSN.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126459447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bozhong Liu, Zheng Gong, Xiaohong Chen, Weidong Qiu, D. Zheng
{"title":"Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function","authors":"Bozhong Liu, Zheng Gong, Xiaohong Chen, Weidong Qiu, D. Zheng","doi":"10.1109/ITAPP.2010.5566639","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566639","url":null,"abstract":"Hash functions are widely used in authentication. In this paper, the security of Lin et al.'s efficient block-cipher-based hash function is reviewed. By using Joux's multicollisions and Kelsey et al.'s expandable message techniques, we find the scheme is vulnerable to collision, preimage and second preimage attacks. Some modifications are recommended to avoid those security flaws in Lin et al.'s hash construction.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115794558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zengmin Geng, Jujian Zhang, Xuefei Li, Jianxi Du, Zhengdong Liu
{"title":"Research on Web Document Summarization","authors":"Zengmin Geng, Jujian Zhang, Xuefei Li, Jianxi Du, Zhengdong Liu","doi":"10.1109/ITAPP.2010.5566074","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566074","url":null,"abstract":"Web document summarization (WDS) is becoming one of the hot subjects in the text summarization field due to the rapidly increasing number of documents on Web. WDS is different from traditional text summarization because it must process hyperlinked texts. This paper first analyses the features of Web documents, then gives a definition for WDS, and finally presents an algorithm for WDS based on sentences extraction. Each sentence's weight is a weighted sum of words' weight and its sentence-structure's weight. The former weight is adjusted by document class graph and latter weight considers both the Web formats and hyperlink attributes. The weight proportion of words and structures is learned by machine learning approach. Experiments on 2,000 Web documents show that our algorithm is feasible.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115913565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sampling Based N-Hash Algorithm for Searching Frequent Itemset","authors":"Yong-ming Chen, Mei-ling Zhu","doi":"10.1109/ITAPP.2010.5566076","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566076","url":null,"abstract":"Searching frequent itemsets is the critical problem in generating association rules in data mining, classic Hash-based technique, put forward by J. S. Park, for searching frequent itemsets has two shortcomings: one is that it is difficult to choose an appropriate hash function; the other is that it is liable to cause hash colliding. In order to solve the two problems, Chen Y.M. proposed N-Hash algorithm which needn't to choose hash function and avoided hash colliding. In this paper, the sampling technique is employed to improve the efficiency of N-Hash algorithm.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131345538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of WebGIS for State-Owned Assets Management Based on MapXtreme and .NET","authors":"Hai-feng Li","doi":"10.1109/ITAPP.2010.5566503","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566503","url":null,"abstract":"Abstract-WebGIS emerged because of the rapid development of the computer technology, geographic information system (GIS) and internet. It is one of the most important aspects in GIS studying at present. This paper started from the current research situation of WebGIS and talked over the architecture and characteristics of WebGIS, the choke points in WebGIS development currently was also discussed, such as the common interface technology, the methods of sharing and interoperating the spatial information and the rate of transmission. Aiming to all these problems, the author combined the predecessors' study and the research experience of his own in this field, and then he put forward a new method in developing WebGIS, that was choosing the .NET as the development platform, combining the MapXtreme which is the MapInfo's component and ASP.NET technology, in order to overcome the defects of the rate of transmission and the server burden. The author checked up this method through building up the information system of management to state-owned assets for southwest university of science and technology, practice shown that it could achieve a satisfactory result. So, I think this method will provide a new direction for WebGIS studying.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132352824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cheat-Detection Method Based on Fuzzy Synthesis Decision for Aimbot Cheating","authors":"Xiang-bin Shi, Xiao-Xue Zhou, Fang Liu, Ying Wang","doi":"10.1109/ITAPP.2010.5566408","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566408","url":null,"abstract":"This paper proposes a cheat-detection method based on Fuzzy Synthesis Decision for aimbot cheating in MMOG. Firstly, the decision set and the factor set that affect the cheating are determined. The factors weight vector which distinguishes the impact of different factors on the cheating is determined by Information Entropy. The membership function for each factor is given according to the factor feature, then the factor decision matrix which links the factor set to the decision set is builded according to the membership function. Finally, the value of player's cheating degree is calculated by Fuzzy Transformation. The simulation results show that the proposed method can detect the aimbot cheating effectively.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134218651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Stream Media Scheduling Algorithm Based on QoS","authors":"Caifeng Liu, Maoling Han, Yang Tao","doi":"10.1109/ITAPP.2010.5566268","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566268","url":null,"abstract":"The video applications become popular with the development of the network. Because of the complexity of the network and real-time stream video on demand, the scheduling algorithm has great influence on the QoS. In this paper, a stream video scheduling algorithm based on QoS is proposed, associated the FEC and Kalman Filter theories. According to the status of the receiver, the sending rate is adapted automatically. The state of the scheduling algorithm is analyzed. This algorithm can maintain the continuity of the video transmission. The simulation results are given, which indicate the scheduling algorithm can provide good video service.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133928978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"J2EE and SSH2 Based ERP for Denture Processing Industry","authors":"Xiaolin Lu","doi":"10.1109/ITAPP.2010.5566298","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566298","url":null,"abstract":"The ERP system is widely applied in manufactory industries and becomes an important tool to manage the production and enterprise resources effectively. With the development of the Internet technology, Web-based ERP system is increasingly becoming the mainstream. This paper presents the system design and implementation of the J2EE and framework of Structs2, Hibernate, and spring based three-tier denture processing ERP production management system. The system architecture is based on the SSH2 and J2EE three-layer client/servers system structure that provides a saleable framework for the ERP production management system. The J2EE includes many components to simplify and standardize application of the system development and deployment, and to improve portability, security and reuse value. The proposed ERP production management system includes the subsystems of the denture production plan management system, the denture model and the denture design management system, the material demand plan system, the purchase plan system, the quality control system, the financial budget and the human resources plan system. The experimental results show that the system is suitable for the denture processing enterprise to arrange the denture production effectively. It has the very good practical value and the application prospect in the denture processing industry.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134290960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Service and Cloud Computing Oriented Web GIS Application","authors":"Xiaolin Lu","doi":"10.1109/ITAPP.2010.5566578","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566578","url":null,"abstract":"The service and cloud computing oriented architecture is a very promising architecture for practical implementation of the next generation geographical information systems. This paper investigated the service and cloud computing oriented architecture for constructing a distributed and web service enabled geographical information platform. The spatial cloud computing applies geographical information systems to the cloud computing paradigm. It provides dynamically scalable geographic information technology, spatial data, and spatial applications as a web service. GIS web services were designed to provide the hosted spatial data and GIS functionality to integrate the customized GIS applications to perform basic geo-processing tasks, such as address matching, map image display, and routing, without maintaining GIS tools or the associated geographical data. The system architecture, functions, system integrations, and some key technical problems are investigated. It has an important application prospect in the GIS tools development and application.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134351182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}