2010 IEEE International Conference on Progress in Informatics and Computing最新文献

筛选
英文 中文
Study on cerebral vascular extraction and three-dimensional reconstruction based on MRI 基于MRI的脑血管提取及三维重建研究
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687597
Fei Gu, L. Tao
{"title":"Study on cerebral vascular extraction and three-dimensional reconstruction based on MRI","authors":"Fei Gu, L. Tao","doi":"10.1109/PIC.2010.5687597","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687597","url":null,"abstract":"Information extraction and three-dimensional reconstruction of blood vessel are keystones in visualization of medical images. Firstly, an improved Sobel algorithm combined with fuzzy theory is presented, which is used to extract the cerebral information of serial images and can solve the contradiction between preservation of detail information and high de-noising ability effectively. Then, an improved ray casting volume rendering algorithm based on fusion segmentations is used to improve the rendering speed with a better rendering quality. The experiments show that the presented new method can preserve more complete blood vessel 3-D information and obtain good de-noising effect. This new method can produce better rendering quality and speeds up the volume rendering.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multilingual parallel corpus of UN documents for contrastive and translation studies 联合国文件多语种平行语料库,用于对比和翻译研究
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687463
Jingxiang Cao, Xu Jin, Xueyong Gao, Jiadong Sun, Jiayang Zhou
{"title":"Multilingual parallel corpus of UN documents for contrastive and translation studies","authors":"Jingxiang Cao, Xu Jin, Xueyong Gao, Jiadong Sun, Jiayang Zhou","doi":"10.1109/PIC.2010.5687463","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687463","url":null,"abstract":"The United Nations has six official languages in its documentation. Most documents, all the resolutions in particular, are very well translated manually. They are very good texts for contrastive and translation studies. In order to make it more convenient for the language teachers and researchers to do computer processing, all the six versions of the resolutions are paragraph (clause) aligned. Problems encountered in the alignment are described and pilot investigations of the English and French preambular guide words, the head nouns of the Chinese and English document titles, and the structure of conference names in Chinese and English are reported as examples of its applications in contrastive and translation studies.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115339348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Accompanying pattern detection for tumor pathological section using statistical method 采用统计学方法对肿瘤病理切片进行伴随模式检测
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687871
Yi Zhang, Jianyan Chen, Shengping Zhang
{"title":"Accompanying pattern detection for tumor pathological section using statistical method","authors":"Yi Zhang, Jianyan Chen, Shengping Zhang","doi":"10.1109/PIC.2010.5687871","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687871","url":null,"abstract":"Computer assisted diagnosis has been widely used in practice with the fast development of medical imaging. As a key technique, medical image processing plays an essential role in computer assisted diagnosis. However, most pattern discovering methods focus on human structure images as CT, MRT while very little work has been done in micrograph. In this paper, we proposed a set of simple statistical operations to detect accompanying pattern in micrograph. The samples of different tissues are compared from both spatial distribution and growing direction to check if they fit in the same pattern. The main purpose of this research is to help cancer expert analyze the cause of cancer. Taken breast cancer as experimental case, our results illustrated the accompanying pattern between blood vessels and dead cells.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116201801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved security mechanism of Management Information System 完善管理信息系统安全机制
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687882
Shewei Wang, Min Song
{"title":"Improved security mechanism of Management Information System","authors":"Shewei Wang, Min Song","doi":"10.1109/PIC.2010.5687882","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687882","url":null,"abstract":"To deal with database security of Management Information System (MIS), a database encryption solution is designed and implemented. Analyzing the relation of database openness and security in the traditional model of MIS, the paper constructs an improved security model of MIS. Based on database encryption theory, a multilevel cipher solution of application system is implemented in SQL Server 2005. Several experiments are carried out to compare the time spending of data manipulation based on some encryption algorithms in database. The result shows that the symmetric encryption increases the time cost about 1/3 while the asymmetric encryption increases much more. The solution is effective if it is applied to sensible data.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116223473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study and implementation of the watershed runoff extraction algorithm in the loess hilly-gully area 黄土丘陵沟壑区流域径流提取算法研究与实现
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687923
Binbin Li
{"title":"A study and implementation of the watershed runoff extraction algorithm in the loess hilly-gully area","authors":"Binbin Li","doi":"10.1109/PIC.2010.5687923","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687923","url":null,"abstract":"By means of discrete processing on the small watershed, the paper defined the elements of a watershed like the source point, confluence point, outlet point, single runoff and composite runoff based on the set theory, proposed an algorithm and implemented it. Based on the hydrologic simulation, the algorithm solved the problem of identifying the watershed outlet point and loop which made the runoff traced more realistic, simple, efficient, and practical. An application system was developed based on the algorithm, and was applied to the distributed prediction modeling for the watershed hydrology and erosion of the loess hilly-gully areas, and achieved appreciable results.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114546794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust evaluation of binary collaborative recommendation under profile injection attack 配置文件注入攻击下二进制协同推荐的鲁棒性评估
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687920
Qingyun Long, Qiaoduo Hu
{"title":"Robust evaluation of binary collaborative recommendation under profile injection attack","authors":"Qingyun Long, Qiaoduo Hu","doi":"10.1109/PIC.2010.5687920","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687920","url":null,"abstract":"Recommender systems are being improved by every means to be more accurate, more robust, and faster. Collaborative filtering is the mainstream type of recommendation algorithms, and its core is calculating the similarity between users or items based on ratings. Researchers recently found that the binary similarity based solely on who-rated-what rather than actual ratings output more accurate recommendation. We, from robust perspective, evaluated the binary collaborative filtering under multiple types of profile injection attacks on large dataset. Experimental results show binary collaborative filtering is more robust than actual ratings based collaborative filtering in all situations.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114763224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A simple robot paths planning based on Quadtree 基于四叉树的简单机器人路径规划
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687965
F. Wang, Changle Zhou, Hugo de Garis
{"title":"A simple robot paths planning based on Quadtree","authors":"F. Wang, Changle Zhou, Hugo de Garis","doi":"10.1109/PIC.2010.5687965","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687965","url":null,"abstract":"Based on traditional methods, according with practical application conditions, and the special structure of Quadtree, this paper gives a practical method of paths planning for the further expansion of Quadtree in the field of paths planning, except for segmentation obstacles. The experimental and simulation results demonstrate that the algorithm described in the text could be able to find all the relevant paths correctly, and make the better choice rapidly.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114718396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A study on adoption behavior of mobile commerce consumer based on TAM-MIA 基于TAM-MIA的移动商务消费者采用行为研究
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687932
Xuejun Ding, Yong Tian
{"title":"A study on adoption behavior of mobile commerce consumer based on TAM-MIA","authors":"Xuejun Ding, Yong Tian","doi":"10.1109/PIC.2010.5687932","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687932","url":null,"abstract":"As a new business model, mobile commerce needs a process to be accepted. The user behavior of mobile commerce will be affected by many factors. Based on the technology acceptance model and multipurpose information appliances model, and taking into account the characteristics of mobile commerce, the mobile commerce model of consumer adoption behavior was constructed using perceived usefulness, perceived ease of use, perceived entertainment, perceived security, social impact, individual needs and perceived price as main factors.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121025967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimization of grouping batch and sorting order for smelting charges in refined copper strip producing by AIA AIA生产精炼铜条冶炼炉料分组批次及分选顺序优化
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687957
Chunguang Chang, Yunlong Zhu, Kunyuan Hu, Yi Zhang
{"title":"Optimization of grouping batch and sorting order for smelting charges in refined copper strip producing by AIA","authors":"Chunguang Chang, Yunlong Zhu, Kunyuan Hu, Yi Zhang","doi":"10.1109/PIC.2010.5687957","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687957","url":null,"abstract":"Grouping batch and sorting order (GBSO) for smelting charges is a key cycle in refined copper strip producing. To improve its scientific degree, optimization problem of GBSO for smelting charges in refined copper strip producing by artificial immune algorithm (AIA) is studied. The multi-objective optimization model for GBSO of smelting charges is established with the objectives which includes minimizing fluctuation in ingredient ratios between the nearest neighbor charges, meeting order priority requirement as much as possible, insuring order due date as much as possible, maximizing number of same brand charges and sorting order in continuous way for same order as much as possible. Some constraints are adequately considered, which includes order due data of each charge, sorting order limit for the charge with high quality requirement, sorting order limit for the charge with the high ratio of virtual orders, sorting order limit for the charge including multi-order, sorting order continuously for same brand charges, ingredient ratio limit for the charge which is sorted order as the first charge, ingredient ratio difference limit between each two nearest neighbor charges. To solve the model in easy way, some constraints are transformed into the objective function, and AIA is designed. The detail steps of AIA is designed in detail including antibody representation and encoding, affinity calculation, clone selection, antibody population updating. To validate the validity of above model and AIA, select practical typical GBSO problem of smelting charges as application instance. Application result shows that, the obtained optimal solution is better than that by heuristic method both on diversity and optimization degree. AIA is suitable for solving complex problem with requirement on solution diversity.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127626909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three-dimensional virtual scenery construction of tunnel and its application in safety monitoring 隧道三维虚拟景物施工及其在安全监测中的应用
2010 IEEE International Conference on Progress in Informatics and Computing Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5688024
Dongwei Qiu, Shanshan Wan
{"title":"Three-dimensional virtual scenery construction of tunnel and its application in safety monitoring","authors":"Dongwei Qiu, Shanshan Wan","doi":"10.1109/PIC.2010.5688024","DOIUrl":"https://doi.org/10.1109/PIC.2010.5688024","url":null,"abstract":"Virtual reality technology is used to build the three-dimensional scenery model of the tunnel, and on this basis, the advanced safety monitoring of tunnel is implemented. The establishment method of three-dimensional scenery is introduced. First the tunnel's three-dimensional scanning control network is built and then the integrated tunnel is scanned with Trimble VX Spatial scanners. Lastly we build the tunnel's three-dimensional model using the obtained point cloud data. Based on the fitting calculation of various cross sections of the tunnel virtual scenery model, the integrated deformation of the tunnel is obtained.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125108422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信