{"title":"A novel approach for depth extraction from single 2D image","authors":"Ranran Feng, Jiahuang Ji","doi":"10.1109/ICSAI.2012.6223613","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223613","url":null,"abstract":"Many methods on extracting 3D information from 2D images have been studied since 1990s, especially the depth information extraction. A novel approach for depth extraction is proposed and implemented in this paper. About 30 images are taken especially for this case study and experiments are conducted on the Stanford Range Image Data. Results show that this approach is generally suitable for most of the images; and performs even better on images with darker background.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128145153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the elimination of duplicated multimedia webpages","authors":"Xiaojuan Yang","doi":"10.1109/ICSAI.2012.6223520","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223520","url":null,"abstract":"There are many duplicated web pages in the multimedia web resources, and elimination of the duplicates can remove the duplicated pages, reduce storage costs and improve search engine performance. Based on analysis of the classic algorithm of eliminating the duplicates, his article raises an improved algorithm for judging web page text repetition. The new algorithm runs the elimination process on the basis of webpage contents which are used as the vector characteristics in the comparison with the webpages' approximation, and analyzes how to capture the web page's theme. Hence, we can make a multidimensional improvement in the elimination of the duplicates of multimedia webpages.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133760537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new chaos-based image encryption scheme using quadratic residue","authors":"Hegui Zhu, Xiaojun Lu, Qingsong Tang, Xiangde Zhang, Cheng Zhao","doi":"10.1109/ICSAI.2012.6223394","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223394","url":null,"abstract":"This paper provides a novel chaos-based image encryption algorithm with quadratic residue. The proposed scheme introduced a significant diffusion effect through a two-stage diffusion algorithm. In first-diffusion stage, we turn each pixel of the original image into 8 bits binary sequence, and apply Chebyshev map to shuffle the 8 bits binary sequence. In second-diffusion stage, we apply quadratic residue to encrypt the new binary sequence. Therefore, the proposed scheme transforms the statistical characteristics of plain image information drastically and randomly. Finally, Various types of security analyses demonstrate that the security of the proposed scheme is competitive with that of permutation-diffusion type image cipher and is very proper for realtime secure image communication applications.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131847075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the application of information technology in College English teaching","authors":"Yuee Wen","doi":"10.1109/ICSAI.2012.6223259","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223259","url":null,"abstract":"Information technology is of great importance in College English teaching for non-English majors in China. This article talks about the theoretical basis of College English teaching based on information technology and the practice, and points out its future direction.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134601598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jingyong Li, Lan Huang, Tian Bai, Zhe Wang, Hongsheng Chen
{"title":"CDBIA: A dynamic community detection method based on incremental analysis","authors":"Jingyong Li, Lan Huang, Tian Bai, Zhe Wang, Hongsheng Chen","doi":"10.1109/ICSAI.2012.6223494","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223494","url":null,"abstract":"Most existing community detection methods ignored the dynamic nature, a key property of social networks and these methods often lead to unreasonable divisions when faced with dynamic environments. Although there have been several dynamic community detection algorithms, low accuracy and low performing are still two challenging problems to be solved. In order to solve above problems, we proposed a new algorithm based on incremental analysis to mine communities in dynamic social networks. Extensive experimental results demonstrate the performance of our propose algorithm.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The research and design of object container technique","authors":"Hai-yan Wu, Xin Meng","doi":"10.1109/ICSAI.2012.6223561","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223561","url":null,"abstract":"Object-oriented models cannot fit very well with relational models. This mismatch leads to time-consuming work for designers when saving and storing objects in relational databases. To solve the problem, this paper put forward data class object container method. This object container encapsulates direct access to the database in a base class and provides generic interface services. Objects derive from this base class to form specific data classes, and therefore, the data class container is created. By this means, the coupling between object models and the relational database can be greatly reduced.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125258963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards autonomic SLA management: A review","authors":"Jianmin Ding, Zhuo Zhao","doi":"10.1109/ICSAI.2012.6223574","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223574","url":null,"abstract":"The SLA auto-management technology is an emerging research field and it is important for the construction of next generation computing environment under the background of SOA and cloud computing. In this paper, we at first review 28 recent works focused on SLA management and analyze the requirements of SLA auto-management, and then we define a complete lifecycle for SLA auto-management, and discuss details of every stage in that lifecycle, at last, we propose a research agenda towards the establishment of SLA contract for service compositions.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131986695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement of order reduction approach for special modes in power system small signal stability analysis","authors":"Chang Liu, Kewen Wang, W. Cui, Wei Liu","doi":"10.1109/ICSAI.2012.6223062","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223062","url":null,"abstract":"Precise results of eigenvalues can be obtained in order reduction approach for special modes. To improve calculation efficiency, the order reduction approach is analyzed in this paper. In the process of order reduction, every set made up of retained state variables is shared by different modes, which reduces calculation amount. Based on real number expression of complex matrix, the expression of outer iteration is reformed. Factor table formed by the sequence elimination can be used to solve inverse matrix quickly. The function of parallel computation in Open Multi-Processing is introduced to accelerate calculation on multi-core computers. The improved effect of retained sets, sparse technique and parallel computation is tested and analyzed by a 105-machine system.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131334034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of the ICA-based adaptive filtering algorithm","authors":"Jun-Mei Yang","doi":"10.1109/ICSAI.2012.6223654","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223654","url":null,"abstract":"A novel finite impulse response (FIR) adaptive filter algorithm was proposed for system identification based on independent component analysis (ICA). It shows an excellent robustness for non-Gaussian disturbance. In this paper, we discuss various properties of this ICA-based adaptive filter algorithm, including the role of the scaling parameter, the local stability condition and a performance analysis by calculating the estimation error covariance matrix using the ordinary differential equation (ODE) approach.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134285870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of network instruction detection system based on snort and NTOP","authors":"YingHui Peng, Hongjie Wang","doi":"10.1109/ICSAI.2012.6223247","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223247","url":null,"abstract":"Instruction Detection System can automatically detect and analyze all kinds of data for finding instruction behavior. This essay firstly proposes a new design idea that combining the Snort with NTOP, and then introduces the implementation of the system, lastly it is verified by experiment. The result proves that the instruction behavior can be detected effectively by this system.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134353882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}