2012 International Conference on Systems and Informatics (ICSAI2012)最新文献

筛选
英文 中文
A novel approach for depth extraction from single 2D image 一种新的二维图像深度提取方法
2012 International Conference on Systems and Informatics (ICSAI2012) Pub Date : 2012-05-19 DOI: 10.1109/ICSAI.2012.6223613
Ranran Feng, Jiahuang Ji
{"title":"A novel approach for depth extraction from single 2D image","authors":"Ranran Feng, Jiahuang Ji","doi":"10.1109/ICSAI.2012.6223613","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223613","url":null,"abstract":"Many methods on extracting 3D information from 2D images have been studied since 1990s, especially the depth information extraction. A novel approach for depth extraction is proposed and implemented in this paper. About 30 images are taken especially for this case study and experiments are conducted on the Stanford Range Image Data. Results show that this approach is generally suitable for most of the images; and performs even better on images with darker background.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128145153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on the elimination of duplicated multimedia webpages 消除重复多媒体网页的研究
2012 International Conference on Systems and Informatics (ICSAI2012) Pub Date : 2012-05-19 DOI: 10.1109/ICSAI.2012.6223520
Xiaojuan Yang
{"title":"Study on the elimination of duplicated multimedia webpages","authors":"Xiaojuan Yang","doi":"10.1109/ICSAI.2012.6223520","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223520","url":null,"abstract":"There are many duplicated web pages in the multimedia web resources, and elimination of the duplicates can remove the duplicated pages, reduce storage costs and improve search engine performance. Based on analysis of the classic algorithm of eliminating the duplicates, his article raises an improved algorithm for judging web page text repetition. The new algorithm runs the elimination process on the basis of webpage contents which are used as the vector characteristics in the comparison with the webpages' approximation, and analyzes how to capture the web page's theme. Hence, we can make a multidimensional improvement in the elimination of the duplicates of multimedia webpages.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133760537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new chaos-based image encryption scheme using quadratic residue 一种新的基于混沌的二次残差图像加密方案
2012 International Conference on Systems and Informatics (ICSAI2012) Pub Date : 2012-05-19 DOI: 10.1109/ICSAI.2012.6223394
Hegui Zhu, Xiaojun Lu, Qingsong Tang, Xiangde Zhang, Cheng Zhao
{"title":"A new chaos-based image encryption scheme using quadratic residue","authors":"Hegui Zhu, Xiaojun Lu, Qingsong Tang, Xiangde Zhang, Cheng Zhao","doi":"10.1109/ICSAI.2012.6223394","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223394","url":null,"abstract":"This paper provides a novel chaos-based image encryption algorithm with quadratic residue. The proposed scheme introduced a significant diffusion effect through a two-stage diffusion algorithm. In first-diffusion stage, we turn each pixel of the original image into 8 bits binary sequence, and apply Chebyshev map to shuffle the 8 bits binary sequence. In second-diffusion stage, we apply quadratic residue to encrypt the new binary sequence. Therefore, the proposed scheme transforms the statistical characteristics of plain image information drastically and randomly. Finally, Various types of security analyses demonstrate that the security of the proposed scheme is competitive with that of permutation-diffusion type image cipher and is very proper for realtime secure image communication applications.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131847075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Study on the application of information technology in College English teaching 信息技术在大学英语教学中的应用研究
2012 International Conference on Systems and Informatics (ICSAI2012) Pub Date : 2012-05-19 DOI: 10.1109/ICSAI.2012.6223259
Yuee Wen
{"title":"Study on the application of information technology in College English teaching","authors":"Yuee Wen","doi":"10.1109/ICSAI.2012.6223259","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223259","url":null,"abstract":"Information technology is of great importance in College English teaching for non-English majors in China. This article talks about the theoretical basis of College English teaching based on information technology and the practice, and points out its future direction.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134601598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CDBIA: A dynamic community detection method based on incremental analysis CDBIA:基于增量分析的动态群落检测方法
2012 International Conference on Systems and Informatics (ICSAI2012) Pub Date : 2012-05-19 DOI: 10.1109/ICSAI.2012.6223494
Jingyong Li, Lan Huang, Tian Bai, Zhe Wang, Hongsheng Chen
{"title":"CDBIA: A dynamic community detection method based on incremental analysis","authors":"Jingyong Li, Lan Huang, Tian Bai, Zhe Wang, Hongsheng Chen","doi":"10.1109/ICSAI.2012.6223494","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223494","url":null,"abstract":"Most existing community detection methods ignored the dynamic nature, a key property of social networks and these methods often lead to unreasonable divisions when faced with dynamic environments. Although there have been several dynamic community detection algorithms, low accuracy and low performing are still two challenging problems to be solved. In order to solve above problems, we proposed a new algorithm based on incremental analysis to mine communities in dynamic social networks. Extensive experimental results demonstrate the performance of our propose algorithm.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
High-speed configurable signal generator for access network system test 用于接入网系统测试的高速可配置信号发生器
2012 International Conference on Systems and Informatics (ICSAI2012) Pub Date : 2012-05-19 DOI: 10.1109/ICSAI.2012.6223462
Wang Zhang, Xiaohui Duan, H. Kou, Y. Gao, Lixia Deng, Daoxian Wang
{"title":"High-speed configurable signal generator for access network system test","authors":"Wang Zhang, Xiaohui Duan, H. Kou, Y. Gao, Lixia Deng, Daoxian Wang","doi":"10.1109/ICSAI.2012.6223462","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223462","url":null,"abstract":"High performance network over coax (HINOC) is a recently proposed technology which achieves high-performance wide-band duplex data transmission using the vacant frequency resource beyond the existing broadcast TV channel. As HINOC is a novel technology, there exists no testing equipment designed for it yet. In this paper, we designed a high-speed configurable signal generator for HINOC system test. The system of the signal generator is implemented based on NI PXI platform. The HINOC algorithm used to generate HINOC physical layer signal is realized by software, which is convenient for maintenance and upgrade. Transmission, DA conversion and RF upconversion of the signal are performed by hardware (FPGA, NI PXI modules). The signal generator is tested using a HINOC signal analyzer. The test demonstrated that the signal generator meets the HINOC test specification and can provide standard HINOC physical layer signal.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114837017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Features of northwest passage variation of sea ice concentration from 2002 to 2010 and analysis of possible reasons 2002 - 2010年西北航道海冰浓度变化特征及可能原因分析
2012 International Conference on Systems and Informatics (ICSAI2012) Pub Date : 2012-05-19 DOI: 10.1109/ICSAI.2012.6223538
Sijia Zou, L. Yi
{"title":"Features of northwest passage variation of sea ice concentration from 2002 to 2010 and analysis of possible reasons","authors":"Sijia Zou, L. Yi","doi":"10.1109/ICSAI.2012.6223538","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223538","url":null,"abstract":"In recent years, rapid warming of Arctic has made the Northwest Passage navigation possible. In this paper, we roughly studied features of variation of sea ice's concentration during the summer season, June, August and September, using AMSR-E sea ice concentration product with the resolution of 6.25 kilometers from the year 2002 to 2010. By studying the variation, we got deeper understanding of the main features of sea ice seasonal and inter-annual variation and distribution. What's more, we looked into the relevance between sea surface temperature(SST), sea level pressure(SLP) and the reducing amount of annual sea ice concentration (May minus September) based on the NSST daily average data from NASA MODISA and SLP monthly average data from NCEP.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116808039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A method of type recognition using probabilistic constraint support vector machine 一种基于概率约束支持向量机的类型识别方法
2012 International Conference on Systems and Informatics (ICSAI2012) Pub Date : 2012-05-19 DOI: 10.1109/ICSAI.2012.6223393
Man Jie
{"title":"A method of type recognition using probabilistic constraint support vector machine","authors":"Man Jie","doi":"10.1109/ICSAI.2012.6223393","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223393","url":null,"abstract":"A new support vector machine classifier for recognition of vehicle type which has been captured from traffic scene images. A new support vector machine classifier is presented with probabilistic constrains which presence probability of samples in each class is determined based on a distribution function. Noise is caused to found incorrect support vectors thereupon margin can not be maximized. In the proposed method, constraints boundaries and constraints occurrence have probability density functions which it helps for achieving maximum margin.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115495139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monotonic plan generation assistance: Challenges, open problems & solutions 单调计划生成协助:挑战,开放问题和解决方案
2012 International Conference on Systems and Informatics (ICSAI2012) Pub Date : 2012-05-19 DOI: 10.1109/ICSAI.2012.6223491
O. Arnold, K. Jantke
{"title":"Monotonic plan generation assistance: Challenges, open problems & solutions","authors":"O. Arnold, K. Jantke","doi":"10.1109/ICSAI.2012.6223491","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223491","url":null,"abstract":"Plan generation is essentially a process of reasoning about the future. In complex application conditions, humans need computerized support by planning assistant systems that manage the complexity of data and the dynamics of targeted processes. In practice, information on real processes and human behavior is typically incomplete, maybe vague, and sometimes incorrect. Consequently, realistic planning is more inductive than deductive and the plans generated by an assistant system are hypothetical. In monotonic approaches to plan generation, intermediate plans are increasingly better fitting the application needs over time. Monotonicity is some logical property of the planning process. It depends on a variety of conditions which have to be balanced. Solutions for monotonic plan generation are elaborated in detail.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123117397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trigger condition based test generation for finding security bugs 基于触发条件的测试生成,用于查找安全漏洞
2012 International Conference on Systems and Informatics (ICSAI2012) Pub Date : 2012-05-19 DOI: 10.1109/ICSAI.2012.6223228
Jie Liu, Qiang Wei, Qingxian Wang, Tao Guo
{"title":"Trigger condition based test generation for finding security bugs","authors":"Jie Liu, Qiang Wei, Qingxian Wang, Tao Guo","doi":"10.1109/ICSAI.2012.6223228","DOIUrl":"https://doi.org/10.1109/ICSAI.2012.6223228","url":null,"abstract":"Software vulnerabilities become methods by which an attacker can take control of the victim's system, and those critical bugs cluster in dangerous spot codes. However, fuzz testing provides low code coverage and serious security bugs may be missed potentially, while symbolic execution based testing encounters path explosion and bug trigger problem. To deal with the security issue above, we highlight two kinds of dangerous spot codes which mostly likely to trigger buffer overflows at runtime: dangerous functions and instructions. We define the conditions on which dangerous spot code can trigger a bug: input-dependent operand, feasible execution path, and trigger conditions. Then we give algorithm for trigger point directed search in order to find the shortest feasible path in CFG, and formalize the trigger conditions for integer overflow, string buffer overflow, array out of bound and division by zero bugs. At last we evaluate the implementation in four benchmark programs in Ubuntu Linux, showing that our method improves the coverage rate of trigger point and trigger rate of overflows efficiently.","PeriodicalId":164945,"journal":{"name":"2012 International Conference on Systems and Informatics (ICSAI2012)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121753333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信