{"title":"Applications of data mining in online retailing: A case for mining prefix-ordered web site navigation paths","authors":"W. Yeung","doi":"10.1109/ICSAI.2014.7009421","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009421","url":null,"abstract":"Data mining enables the discovery of frequent navigation patterns on retail web sites which help improve their design. Previous work has often focused on discovering “maximal” navigation patterns without paying much attention to partial navigation attempts. With reference to some discoverable patterns of navigating a hypothetical retail web site, we put forward our case for mining prefixes of frequent web navigation paths.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121363947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A spatiotemporal dithering method to extend color depth in multi-display system","authors":"Yimu Wang, L. Claesen","doi":"10.1109/ICSAI.2014.7009412","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009412","url":null,"abstract":"Most modern digital monitors use up to 24-bit of information for each pixel to display an image. Nevertheless, some multi-display systems have to sacrifice the bit-depth to support connections from tens or hundreds of screens because limited numbers of pins are available in the central processing chip. These reductions on bit-depth of color will definitely degrade the quality of the display. To solve this issue, we present a spatiotemporal dithering method which is able to extend the color depth and improve the display quality. The key idea in the proposed method is to utilize frame rate control in spatial dithering which is Floyd-Steinberg dithering in our case. This spatiotemporal dithering method takes advantage of both spatial and temporal dithering, bringing in an extension on the color depth and an improvement on the display quality without flicker problems. After implementing the hardware circuits for a multidisplay system on a FPGA device, we find that our spatiotemporal dithering method is efficient and effective, outperforming other spatial methods under the circumstances of limited color depth.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122607216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fast vehicle top-view system","authors":"Wenhui Li, Feng Qu, Y. Wang, Peixun Liu","doi":"10.1109/ICSAI.2014.7009320","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009320","url":null,"abstract":"As a part of a driver assistance system, vehicle top-view system plays an important role in driving safety. The objective of this research is to develop a vision-based top-view system to expand drivers' field of view. Four cameras provide a 360-degree view of the surrounding terrain of the vehicle, and the destination image is composed by these four processed images. In this paper, we divide the procedure into 4 parts, fisheye lens distortion correction, inverse perspective transformation, image mosaicking and pixels mapping table creation. Every part is achieved by one-to-one mapping between pixels, so most of the calculation has been done on PC. The experimental results show that, the final image is clear, natural and have very good real-time performance. It can effectively reduce the blind spots of drivers, and it has a strong value for research and practical.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122460523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Kang, Ruipeng Zhang, Fengqing Zhao, Aoyang Han, Jianying Li, Yuanlong Liu
{"title":"How could advanced distribution automation have prevented the 2006 U.S. Northwest Queen blackout","authors":"T. Kang, Ruipeng Zhang, Fengqing Zhao, Aoyang Han, Jianying Li, Yuanlong Liu","doi":"10.1109/ICSAI.2014.7009275","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009275","url":null,"abstract":"As the development of economic and society, the reliability of distribution system is more important than ever. Traditional distribution automation has developed a lot in order to cope with the evolution of smart distribution system and to meet the reliability and other requirements such as security, economical, efficiency and clean. In this article, we focus on the technology framework and functions of advanced distribution system and investigate on whether advanced distribution system is sufficient enough to prevent large scale black out. We review the procedures and outline the key factors that caused the blackout in Northwest Queen, which took place in 2006. Then we evaluate the functional performance of advanced distribution automation with the real case to check whether it is enough to prevent large scale blackout and enhance the reliability of distribution system. Based on the evaluation results, we discuss the key technologies as supplement for the advanced distribution automation to realize self-healing smart distribution system. The research in this article proposes a method to evaluate whether present practical self-healing system is adequate and sufficient enough to prevent large scale blackout and guarantee the security of distributed system. The observations in this article can be used to guide the real projects of advanced distribution automation and self-healing distribution system.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115350042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A single antenna interference cancellation by sequential importance sampling","authors":"Nan Xia, Wen Wei, Xiaofei Zhang, Jingchun Li","doi":"10.1109/ICSAI.2014.7009402","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009402","url":null,"abstract":"In this paper, a single antenna interference cancellation (SAIC) by means of sequential importance sampling (SIS) is studied. The contribution of the proposed algorithm is that the maximum a posteriori (MAP) estimates of the transmitted co-channel symbols is recursively computed without explicit channel information, and the joint posterior distribution of the channels is derived. The Symbol error rate (BER) performance of the proposed algorithm is evaluated and compared with that of other SAIC algorithms through computer simulation.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115525334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Task assignments based on shared memory multi-core communication","authors":"Xiaojie Xu, Lisheng Wang","doi":"10.1109/ICSAI.2014.7009308","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009308","url":null,"abstract":"In the ongoing quest for greater computational power, single-core processors exposed many limitations. Multi-core processors become the inevitable product of technological development and application requirements. Then, it also brings many problems of fundamental technologies to be resolved. Inter-core communication is a part of them. The major manufacturers have proposed different inter-core communication standards for multi-core processors parallel techniques. In this paper, the working principle of inter-core communication, and the principal means of communication between multi-core processors conducted in-depth research. For the current advantages and disadvantages of the existing communication structure, we propose task assignment based on shared memory inter-core communication model(TASMCM), reducing communication delay of die-to-die, ensuring consistency of data synchronization, to improve the capacity of multi-core processors in parallel.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115904071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"JDBC-based middleware applications in instant message systems","authors":"Yi Zhang, Lu-yong Zhang","doi":"10.1109/ICSAI.2014.7009439","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009439","url":null,"abstract":"Instant message systems adopt a distributed network architecture, which consists of core servers, park servers and terminal users. The servers need to maintain the data consistency and the mutual backup. Firstly, this paper discusses the JDBC fundamental, which includes the JDBC interface technology, the JDBC architecture, the JDBC drivers and the JDBC connection pool. Secondly, it describes the core classes and the JDBC middleware implementation. In order to solve transmission problems among heterogeneous data sources, this paper proposes the operation mode and the construction method of the JDBC-based middleware to access to heterogeneous distributed databases.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130935284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qiong Zhang, M. Shen, Ruoyu Fang, Bin Li, Binghuang Cai
{"title":"Despeckling of medical ultrasound images using multiscale weighting nonlinear diffusion","authors":"Qiong Zhang, M. Shen, Ruoyu Fang, Bin Li, Binghuang Cai","doi":"10.1109/ICSAI.2014.7009386","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009386","url":null,"abstract":"A new despeckling algorithm for medical ultrasound images using multiscale weighting nonlinear diffusion is proposed in this paper. Firstly, the input image is decomposed by redundant Laplace transformation. Then, in the multiscale images, nonlinear diffusion is used. For nonlinear diffusion in each sub-image, an image gradient index is automatically determined by weighting the image gradient indexes of all the sub-images. To test the validity of the proposed algorithm, the typical methods of directly nonlinear diffusion and adaptive wavelet filter were used for comparison. The simulation and real ultrasound image results indicate that our approach can not only decrease speckle noise significantly but also preserve image details.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130903957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Pei, Zijie An, Yong-ying Zhu, Xiao Jia, Xinwei Zuo, F. Wang
{"title":"A rapid vehicle recognition and retrieval system","authors":"W. Pei, Zijie An, Yong-ying Zhu, Xiao Jia, Xinwei Zuo, F. Wang","doi":"10.1109/ICSAI.2014.7009384","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009384","url":null,"abstract":"This paper presents a fast vehicle recognition and vehicle retrieval system based on “bag of words”. In this system, the input is an image of vehicle and the vehicle will be identified automatically, it can also retrieve images which are similar to the input image. 3742 vehicle images which include 28 types of vehicles are collected as the image database. Features of these images are extracted and quantized as “visual words” which are clustered so that every vehicle model is represented by a set of “visual words”. A hessian-affine detector is used to detect the features of the input image and the SIFT descriptor transforms each feature into a 128-dimensional vector which is finally quantized as a “visual word”. In this way, the input image is transformed into a set of “visual words”. By matching the “visual words” between the vehicle model and the input image, it can compute the similarity and judge the type of the input vehicle image. For the vehicle retrieval, the “visual words” is weighted in the method of “TF-IDF” to compute the cosine similarity of two images. The retrieval results are ranked by cosine similarity. The experiments show that the precision of vehicle recognition is above 85%, and the using of “bag of words” is much faster than the traditional features matching.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127236903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A forensics tool of Foxmail client","authors":"Lili Xie, Guolong Chen","doi":"10.1109/ICSAI.2014.7009322","DOIUrl":"https://doi.org/10.1109/ICSAI.2014.7009322","url":null,"abstract":"Computer forensics is an important part of the computer crime investigation. So a Forensics system aimed to Foxmail data analysis and investigation is proposed in this paper. The system can index the email data based on Lucene technology and the MMSeg participle algorithm, and provides the full text retrieval of the email content function. Subsequently, a visual communication graph would be generated according to the retrieval results. Based on the communication graph, an algorithm on graphic structure analysis is proposed, and by means of centrality and minimum traffic filtering method, multilevel analysis is carried out on the graph, which can detect the possible suspicious personnel and their relationships and provide strong support for the computer crime investigation.","PeriodicalId":143221,"journal":{"name":"The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126835718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}