{"title":"Research and Realization of Computer Network Complex Practical Teaching Platform of Virtual Reality","authors":"Z. Jie, Zhang Jianwei, Dou Yaxing","doi":"10.1109/ICCSEE.2012.316","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.316","url":null,"abstract":"Analyzing teaching status of computer network practical courses in colleges and universities, the paper proposes the design program and the specific implementation method of complex practical teaching platform of virtual reality computer network, and builds a general practical teaching environment of computer network, which can combine reality with virtual, break the constrains of time and space, improve the utilization of laboratory equipment fully and train engineering application skills of students.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115405757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Support Vector Regression Algorithm in Colleges Recruiting Students Prediction","authors":"E. Ying","doi":"10.1109/ICCSEE.2012.456","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.456","url":null,"abstract":"Support vector regression algorithm is applied to colleges recruiting students prediction in the paper. As colleges recruiting students prediction is a nonlinear regression problem, the input training data of colleges recruiting students are nonlinearly mapped into a high dimensional space in support vector regression model. The amount of colleges recruiting students of Sichuan province from 2000 to 2008 is used to prove the effectiveness of support vector regression method. Then,the forecasting curves of support vector regression method and BP neural network and the comparison of forecasting error for amount of colleges recruiting students between support vector regression method and BP neural network are given in this study.The comparison results of forecasting error for amount of colleges recruiting students between support vector regression method and BP neural network indicate that support vector regression method has a higher forecasting accuracy than BP neural network.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114650144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some Key Issues on Modeling and Simulation of Military Communication Network","authors":"Fanfan Yao, Renjie Xu, Qiang Liang, L. Tong","doi":"10.1109/ICCSEE.2012.385","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.385","url":null,"abstract":"Military Communication Network is the nerve of modern wars. Based on the modeling and simulation of Military Communication Network, we can evaluate its efficiency in fighting process, analyze key points of network and find the improvement. Modeling and simulation of Military Communication Network is an important matter of modern combat simulation. Paper analyzes some keys in this process, and gives some methods to improve simulation system.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"768 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115752158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BB-aided and Blog-aided English Learning Model Research","authors":"Cui Xiao-xia, Sun Yingling","doi":"10.1109/ICCSEE.2012.511","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.511","url":null,"abstract":"Through researching and concluding the BB-aided and Blog-aided English learning model, this paper mainly focuses on the comparisons between the two aspects like the traditional and the new modern methods. We can find that the BB-aided and Blog-aided teaching model is the new trend of the teaching technology in the digital era, which can especially enhance the efficiency of the language learning greatly. Furthermore, it would lead both teachers and students to study without the limit of time and place, which is beneficial to the choice and arrangement of the learning contents and schedule spontaneously. It is also helpful for both the teachers and students to communicate thoroughly, resulting in coaching students in accordance of their aptitude, cooperative, inquirybased, and dialogical studying, consequently causing the deep reformation of the English teaching, realising the opinion that teaching benefits teachers as well as students preferably.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117129899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Screen Luminance, Subtitle, and Viewing Angle on Viewing Distance of Liquid Crystal Display High-Definition Television","authors":"Der-Song Lee, Min-Liang Huang","doi":"10.1109/ICCSEE.2012.508","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.508","url":null,"abstract":"This study explored the effect of screen luminance, subtitle, and viewing angle on preferred viewing distance for liquid crystal display high-definition television (LCD-HDTV). The results showed the mean preferred viewing distance was 3246 mm, about 4 times of television width. Preferred viewing distance increased as the scale of screen luminance went upward from scale 10 to scale 60, then decreased from scale 60 to scale 90. Whether there was subtitle or not did not have significant effect on viewing distance. Moreover, viewing angle was highly correlated with preferred viewing distance. The more deflected from the direct front view, the shorter the viewing distance was.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":" 66","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120832748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wang Xiang-feng, Li Bo, Zhang Gang, Sun Li, Hu Jun-yu
{"title":"Research on Operation Optimization Algorithm of Milling System","authors":"Wang Xiang-feng, Li Bo, Zhang Gang, Sun Li, Hu Jun-yu","doi":"10.1109/ICCSEE.2012.350","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.350","url":null,"abstract":"A method of milling system operation optimization is proposed in this paper. First, use Support Vector Machine to get the relations between milling unit consumption and its related operation parameters. Second, optimize the model with the help of genetic algorithm and composite algorithm, and then optimal operation parameters of this milling system under different working conditions are got, which can guide the operator's operation. Tests show that this method has high modeling accuracy and optimization speed, also, it proves good reliability and efficiency.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121354595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reseach of Image Encryption Algorithm Based on S-DES","authors":"Linxian Zhi","doi":"10.1109/ICCSEE.2012.305","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.305","url":null,"abstract":"This paper mainly studies one kind of simple image encryption algorithm which can help general users to keep secret from the data information. The algorithm is modified from the DES whose processing may be divided into three steps: initial transform IP, 16 round iterations, and initial inversed transforms IP-1. Initial transformation and inverse transformation can enhance difficulty to be understood for data, and not to affect security of data. Modified encrypted algorithm, namely S-DES, carries on two round iterative encryptions to clear text. The length of block and secret key reduced. Therefore S-DES algorithm is more inexpensive than the DES encryption algorithm and remains many merits of DES.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127155868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Evaluation Method of Enterprise Information System from Complex System Perspective","authors":"Z. Xiaoyan","doi":"10.1109/ICCSEE.2012.394","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.394","url":null,"abstract":"When an enterprise information system develops into the stage of being a complex system, the relatively delayed evaluation process will result in a low success rate of information system development projects. In this article, we analyzed the characteristics of evaluation process for information system projects, studied the evaluation methodology of information systems. Based on our studies, we proposed to evaluate the information system using from qualitative to quantitative methodologies at different stages of the whole development process, guided by the theory of open complex giant system. At different stage, we should calculate expert weights according to different evaluation focus. Lastly, we illustrated the whole evaluation steps. Our proposal will improve the efficiency and accuracy of the evaluation results, which is very important to guide the information system development.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124733046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature Extraction Based on Equalized ULBP for Face Recognition","authors":"Wei Jin, Bin Li, Ming Yu","doi":"10.1109/ICCSEE.2012.233","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.233","url":null,"abstract":"The exiting local binary pattern (LBP) operators have two disadvantages: (1) They produce rather long histograms, which slow down the recognition speed especially on large-scale face database, (2) Under some circumstances, they miss the local structure as they don't consider the effect of the central pixel. Aiming at these problems, we propose a novel feature extraction approach based on equalized uniform local binary pattern (EULBP) for face recognition. EULBP operator has two advantages: (1) It reduces significantly the histograms' dimension by doubling one-dimension pattern, (2) It considers the effect of the central pixel, thus improving the discrimination ability. The proposed feature extraction approach has been evaluated and compared with the conventional LBP and ULBP on two databases, FERET and Yale. Furthermore, in order to test the robustness of the proposed method under the condition that the resolution of the face image is low, we have also carried out experiments on the two databases by reducing the image resolution. The experimental results show that the proposed method gives the highest recognition accuracy in both normal and low-resolution conditions.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"461 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125804812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remote of NC Remote Video Monitoring Based on Embedded Technology","authors":"Qilong Tu, Ying Xiao","doi":"10.1109/ICCSEE.2012.304","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.304","url":null,"abstract":"As in CNC machining remote video monitoring image signal data are large, it takes a long time for data processing, seriously affecting the actual situation of control of CNC equipment. The study is combined the advantages of both DSP and ARM, to form an independent dual-core structure embedded network video capture and compression system. The system combines WEB technology, embedded technology and image compression technology, to achieve a high degree of integration and industrial grade stability performance of the whole system, can adapt the needs to a remote multi-user video surveillance, can also achieve non-watch digital video recording function, if supported by image recognition and positioning technology, it can be used the management of unmanned in CNC machining and intelligent robot control and other fields.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123588248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}