{"title":"Study on cerebral vascular extraction and three-dimensional reconstruction based on MRI","authors":"Fei Gu, L. Tao","doi":"10.1109/PIC.2010.5687597","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687597","url":null,"abstract":"Information extraction and three-dimensional reconstruction of blood vessel are keystones in visualization of medical images. Firstly, an improved Sobel algorithm combined with fuzzy theory is presented, which is used to extract the cerebral information of serial images and can solve the contradiction between preservation of detail information and high de-noising ability effectively. Then, an improved ray casting volume rendering algorithm based on fusion segmentations is used to improve the rendering speed with a better rendering quality. The experiments show that the presented new method can preserve more complete blood vessel 3-D information and obtain good de-noising effect. This new method can produce better rendering quality and speeds up the volume rendering.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multilingual parallel corpus of UN documents for contrastive and translation studies","authors":"Jingxiang Cao, Xu Jin, Xueyong Gao, Jiadong Sun, Jiayang Zhou","doi":"10.1109/PIC.2010.5687463","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687463","url":null,"abstract":"The United Nations has six official languages in its documentation. Most documents, all the resolutions in particular, are very well translated manually. They are very good texts for contrastive and translation studies. In order to make it more convenient for the language teachers and researchers to do computer processing, all the six versions of the resolutions are paragraph (clause) aligned. Problems encountered in the alignment are described and pilot investigations of the English and French preambular guide words, the head nouns of the Chinese and English document titles, and the structure of conference names in Chinese and English are reported as examples of its applications in contrastive and translation studies.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115339348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accompanying pattern detection for tumor pathological section using statistical method","authors":"Yi Zhang, Jianyan Chen, Shengping Zhang","doi":"10.1109/PIC.2010.5687871","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687871","url":null,"abstract":"Computer assisted diagnosis has been widely used in practice with the fast development of medical imaging. As a key technique, medical image processing plays an essential role in computer assisted diagnosis. However, most pattern discovering methods focus on human structure images as CT, MRT while very little work has been done in micrograph. In this paper, we proposed a set of simple statistical operations to detect accompanying pattern in micrograph. The samples of different tissues are compared from both spatial distribution and growing direction to check if they fit in the same pattern. The main purpose of this research is to help cancer expert analyze the cause of cancer. Taken breast cancer as experimental case, our results illustrated the accompanying pattern between blood vessels and dead cells.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116201801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved security mechanism of Management Information System","authors":"Shewei Wang, Min Song","doi":"10.1109/PIC.2010.5687882","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687882","url":null,"abstract":"To deal with database security of Management Information System (MIS), a database encryption solution is designed and implemented. Analyzing the relation of database openness and security in the traditional model of MIS, the paper constructs an improved security model of MIS. Based on database encryption theory, a multilevel cipher solution of application system is implemented in SQL Server 2005. Several experiments are carried out to compare the time spending of data manipulation based on some encryption algorithms in database. The result shows that the symmetric encryption increases the time cost about 1/3 while the asymmetric encryption increases much more. The solution is effective if it is applied to sensible data.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116223473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study and implementation of the watershed runoff extraction algorithm in the loess hilly-gully area","authors":"Binbin Li","doi":"10.1109/PIC.2010.5687923","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687923","url":null,"abstract":"By means of discrete processing on the small watershed, the paper defined the elements of a watershed like the source point, confluence point, outlet point, single runoff and composite runoff based on the set theory, proposed an algorithm and implemented it. Based on the hydrologic simulation, the algorithm solved the problem of identifying the watershed outlet point and loop which made the runoff traced more realistic, simple, efficient, and practical. An application system was developed based on the algorithm, and was applied to the distributed prediction modeling for the watershed hydrology and erosion of the loess hilly-gully areas, and achieved appreciable results.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114546794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust evaluation of binary collaborative recommendation under profile injection attack","authors":"Qingyun Long, Qiaoduo Hu","doi":"10.1109/PIC.2010.5687920","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687920","url":null,"abstract":"Recommender systems are being improved by every means to be more accurate, more robust, and faster. Collaborative filtering is the mainstream type of recommendation algorithms, and its core is calculating the similarity between users or items based on ratings. Researchers recently found that the binary similarity based solely on who-rated-what rather than actual ratings output more accurate recommendation. We, from robust perspective, evaluated the binary collaborative filtering under multiple types of profile injection attacks on large dataset. Experimental results show binary collaborative filtering is more robust than actual ratings based collaborative filtering in all situations.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114763224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A simple robot paths planning based on Quadtree","authors":"F. Wang, Changle Zhou, Hugo de Garis","doi":"10.1109/PIC.2010.5687965","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687965","url":null,"abstract":"Based on traditional methods, according with practical application conditions, and the special structure of Quadtree, this paper gives a practical method of paths planning for the further expansion of Quadtree in the field of paths planning, except for segmentation obstacles. The experimental and simulation results demonstrate that the algorithm described in the text could be able to find all the relevant paths correctly, and make the better choice rapidly.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114718396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on adoption behavior of mobile commerce consumer based on TAM-MIA","authors":"Xuejun Ding, Yong Tian","doi":"10.1109/PIC.2010.5687932","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687932","url":null,"abstract":"As a new business model, mobile commerce needs a process to be accepted. The user behavior of mobile commerce will be affected by many factors. Based on the technology acceptance model and multipurpose information appliances model, and taking into account the characteristics of mobile commerce, the mobile commerce model of consumer adoption behavior was constructed using perceived usefulness, perceived ease of use, perceived entertainment, perceived security, social impact, individual needs and perceived price as main factors.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121025967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chunguang Chang, Yunlong Zhu, Kunyuan Hu, Yi Zhang
{"title":"Optimization of grouping batch and sorting order for smelting charges in refined copper strip producing by AIA","authors":"Chunguang Chang, Yunlong Zhu, Kunyuan Hu, Yi Zhang","doi":"10.1109/PIC.2010.5687957","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687957","url":null,"abstract":"Grouping batch and sorting order (GBSO) for smelting charges is a key cycle in refined copper strip producing. To improve its scientific degree, optimization problem of GBSO for smelting charges in refined copper strip producing by artificial immune algorithm (AIA) is studied. The multi-objective optimization model for GBSO of smelting charges is established with the objectives which includes minimizing fluctuation in ingredient ratios between the nearest neighbor charges, meeting order priority requirement as much as possible, insuring order due date as much as possible, maximizing number of same brand charges and sorting order in continuous way for same order as much as possible. Some constraints are adequately considered, which includes order due data of each charge, sorting order limit for the charge with high quality requirement, sorting order limit for the charge with the high ratio of virtual orders, sorting order limit for the charge including multi-order, sorting order continuously for same brand charges, ingredient ratio limit for the charge which is sorted order as the first charge, ingredient ratio difference limit between each two nearest neighbor charges. To solve the model in easy way, some constraints are transformed into the objective function, and AIA is designed. The detail steps of AIA is designed in detail including antibody representation and encoding, affinity calculation, clone selection, antibody population updating. To validate the validity of above model and AIA, select practical typical GBSO problem of smelting charges as application instance. Application result shows that, the obtained optimal solution is better than that by heuristic method both on diversity and optimization degree. AIA is suitable for solving complex problem with requirement on solution diversity.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127626909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three-dimensional virtual scenery construction of tunnel and its application in safety monitoring","authors":"Dongwei Qiu, Shanshan Wan","doi":"10.1109/PIC.2010.5688024","DOIUrl":"https://doi.org/10.1109/PIC.2010.5688024","url":null,"abstract":"Virtual reality technology is used to build the three-dimensional scenery model of the tunnel, and on this basis, the advanced safety monitoring of tunnel is implemented. The establishment method of three-dimensional scenery is introduced. First the tunnel's three-dimensional scanning control network is built and then the integrated tunnel is scanned with Trimble VX Spatial scanners. Lastly we build the tunnel's three-dimensional model using the obtained point cloud data. Based on the fitting calculation of various cross sections of the tunnel virtual scenery model, the integrated deformation of the tunnel is obtained.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125108422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}