Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)最新文献

筛选
英文 中文
A Camera Calibration Strategy in the Video-based Traffic Information Detection 基于视频的交通信息检测中的摄像机标定策略
Yu Yuan, Jiang Dan
{"title":"A Camera Calibration Strategy in the Video-based Traffic Information Detection","authors":"Yu Yuan, Jiang Dan","doi":"10.1109/SNPD.2007.16","DOIUrl":"https://doi.org/10.1109/SNPD.2007.16","url":null,"abstract":"In this paper an improved camera calibration algorithm is applied to the video-based traffic information detection. The geometric camera model is set up based on the pin-hole model and Direct Linear Transformation (DLT). Adopting the coplanar condition, we estimate parameters of the model and realize the transform from image coordinates to world coordinates in the end. The problem of control points is discussed. In our experiment, the algorithm has the advantage of high-accuracy and its parameters can be easily estimated. It is proved that the algorithm could meet the requirement of calibration accuracy in the application of the video-based traffic information detection.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":" 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120827270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Web Services Based Email Extension for Remote Monitoring of Embedded Systems 基于Web服务的嵌入式系统远程监控电子邮件扩展
Cao Chengzhi, Gu Xiaofeng, Liu Yang
{"title":"A Web Services Based Email Extension for Remote Monitoring of Embedded Systems","authors":"Cao Chengzhi, Gu Xiaofeng, Liu Yang","doi":"10.1109/SNPD.2007.453","DOIUrl":"https://doi.org/10.1109/SNPD.2007.453","url":null,"abstract":"Nowadays, remote control applications via the Internet are going to be used more and more widely with the development of powerful chips and network technology. For applications which do not need real time communication or persistent connection and have a little amount of data transportation, conventional approaches based on Web services either are a little bit complex, or have a higher overhead. In this paper we introduce another method called WeeRMES, a Web services based email extension for remote monitoring of embedded systems, to be supplement of conventional remote control methods in some special occasions. Thanks to the model, we are able to do all those things using emails such as sending devices instructions, inspecting device status and gathering data using XML capsulated messages. User interfaces can be dynamically achieved by means of XForms generated by Java classes loaded on target devices. Furthermore, researches are carried out on security mechanism to ensure safety and robustness of the system. An idiographic implementation is given as an example in the end.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116263177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Quick Algorithm for Computing Core Based on the Positive Region 一种基于正域计算核的快速算法
Wei-Dong Cai, Zhangyan Xu, Wei Song, Bingru Yang
{"title":"A Quick Algorithm for Computing Core Based on the Positive Region","authors":"Wei-Dong Cai, Zhangyan Xu, Wei Song, Bingru Yang","doi":"10.1109/SNPD.2007.87","DOIUrl":"https://doi.org/10.1109/SNPD.2007.87","url":null,"abstract":"Some scholars provided the discernibility matrix based on the positive region. The time complexity of the algorithm for computing core with this discernibility matrix is O(|CparU|2 ). For cutting down the time complexity of the algorithm, the definition of simplified discernibility matrix based on the positive region and the corresponding definition of the core are provided. At the same time, it is proved that this core is equivalent to the core based on the positive region. Since the partition of U/C is the key process for computing simplified discernibility matrix, a quick algorithm for computing U/C is designed with the idea of radix sorting. Its time complexity is O(|CparU|). On this condition, a new algorithm for computing core based on the positive region is designed with the simplified discernibility. Its time complexity is cut down to max{O(|CparU'posparU/C|), O(|CparU|)}.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126235829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The differences of COTS-based project stakeholders 基于cots的项目干系人的差异
Yunmei Du, Shixian Li
{"title":"The differences of COTS-based project stakeholders","authors":"Yunmei Du, Shixian Li","doi":"10.1109/SNPD.2007.494","DOIUrl":"https://doi.org/10.1109/SNPD.2007.494","url":null,"abstract":"Stakeholder cooperation is important for conducting a successful software project. The software industry has increasingly expanded its adoption of COTS components for complex applications. The stakeholders of COTS-based projects differ considerably from these of conventional custom development projects. All members of the project team should print the COTS-inclusion concept deeply within their mind. There are also great changes in roles and needed skills. For COTS-based project, it is crucial to understand all classes of stakeholders, their responsibilities, and inter-collaboration relationships by contrasting with traditional software development. According to the characteristics of COTS-based project, focusing on the differences, this paper is regulated to elaborate on all stakeholder roles and corresponding responsibilities, the differences with custom-development project, and the cooperation relationship between stakeholders.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126437347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Organization Technology in Mobile Peer-to-peer Network Based on Mobile Unit 基于移动单元的移动对等网络组织技术
Liang Ye, Ci Lin-lin
{"title":"Organization Technology in Mobile Peer-to-peer Network Based on Mobile Unit","authors":"Liang Ye, Ci Lin-lin","doi":"10.1109/SNPD.2007.410","DOIUrl":"https://doi.org/10.1109/SNPD.2007.410","url":null,"abstract":"Mobile end devices become more and more powerful, enabling them to execute more sophisticated tasks. Hence it is desirable to leverage these potential resources, by being able to execute tasks on external devices. At the same time, peer-to-peer (P2P) gains more and more attention, and will level the difference between clients and servers. As P2P technology proved to be an effective means for mobile computing, it seems logical to combine the benefits of both worlds. This paper discusses how to organize a Mobile P2P (MP2P) infrastructure, and the experimental results show that the services running on MP2P network have better efficiency than on traditional client/server model network.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126021148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Oscillation Criteria of Second-Order Delay Dynamic Equations on Time Scales 时间尺度上二阶时滞动力学方程的振动准则
Z. Han, Shurong Sun
{"title":"Oscillation Criteria of Second-Order Delay Dynamic Equations on Time Scales","authors":"Z. Han, Shurong Sun","doi":"10.1109/SNPD.2007.62","DOIUrl":"https://doi.org/10.1109/SNPD.2007.62","url":null,"abstract":"By means of Riccati transformation technique, we establish some new oscillation criteria for the second-order delay dynamic equations. Our results in this paper not only extend the results given in Sahiner [?] but also unify the oscillation of the second order nonlinear delay differential equation and the second order nonlinear delay difference equation.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127974277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Battle Damage Assessment based on Bayesian Network 基于贝叶斯网络的战损评估
Zhijun Ma, Quan Shi, Bin Li
{"title":"Battle Damage Assessment based on Bayesian Network","authors":"Zhijun Ma, Quan Shi, Bin Li","doi":"10.1109/SNPD.2007.421","DOIUrl":"https://doi.org/10.1109/SNPD.2007.421","url":null,"abstract":"With increasing tempo of war and complication of battle field, battle damage assessment (BDA) has become more critical to the decision of commander. In the Persian Gulf War, the BDA system of U.S. army couldn't meet the needs of commanders in both accuracy and speed, and badly blocked operations, one of its main reasons was lack of scientific and reasonable assessment model for BDA. According to the fact of BDA and the characters of Bayesian network, paper studies the theory of BDA based on Bayesian network, expatiates upon the modeling of Bayesian decision model for BDA, and puts forward a way to update the model, to enhance the accuracy of assessment.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Scalable Search Algorithm on Unstructured P2P Networks 非结构化P2P网络的可扩展搜索算法
Fuyong Yuan, Jian Liu, Chunxia Yin
{"title":"A Scalable Search Algorithm on Unstructured P2P Networks","authors":"Fuyong Yuan, Jian Liu, Chunxia Yin","doi":"10.1109/SNPD.2007.391","DOIUrl":"https://doi.org/10.1109/SNPD.2007.391","url":null,"abstract":"Gnutella is one of the prominent unstructured P2P networks. In the unstructured P2P networks, the network topology and the placement of files are largely unconstrained. The primitive search algorithm in Gnutella is flooding-based. The algorithm produces too much traffic though with limited search region which is constrained by TTL value. To improve search efficiency and reduce unnecessary traffic in Gnutella, this paper proposes an algorithm to unstructured P2P network, and it consists of ranked neighbor caching scheme and queryhit caching scheme. The proposed algorithm can extend the search region but reduce the search traffic, and also balance the network load, so that acquires the whole networks scalable.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"43 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132026424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel Approach to Detect the Presence of LSB Steganographic Messages 一种检测LSB隐写信息存在的新方法
Zongyuan Deng, Xi Shao, Zhen Yang
{"title":"A Novel Approach to Detect the Presence of LSB Steganographic Messages","authors":"Zongyuan Deng, Xi Shao, Zhen Yang","doi":"10.1109/SNPD.2007.303","DOIUrl":"https://doi.org/10.1109/SNPD.2007.303","url":null,"abstract":"Digital steganography introduces statistical distortion to some extent. Thus, steganalysis can be used to classify an object with or without hidden information. In this paper, we present a novel approach to detect the presence of LSB (least significant bit) steganographic messages in the voice secure communication system. A distance measure, which has been proved to be sensitive to LSB steganography by ANOVA (analysis of variance), is denoted to estimate the difference between the host signal and the stego signal. Then a MI (maximum likelihood) decision is combined to form the classifier. Statistical experiments show that the proposed approach has highly accurate rate and low computational complexity.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Algorithm for Detecting Air Holes in Steel Pipe Welding Based on Hopfield Neural Network 基于Hopfield神经网络的钢管焊接气孔检测新算法
Weixin Gao, Tang Nan, Xiangyang Mu
{"title":"A Novel Algorithm for Detecting Air Holes in Steel Pipe Welding Based on Hopfield Neural Network","authors":"Weixin Gao, Tang Nan, Xiangyang Mu","doi":"10.1109/SNPD.2007.66","DOIUrl":"https://doi.org/10.1109/SNPD.2007.66","url":null,"abstract":"The paper segment x-ray images of steel pipe welding to assess the quality of welding. Image segmentation is posed as an optimization problem, and is correlated with the energy function of the multistage Hopfield neural network. The algorithm for optimization and the principle of selecting coefficient are also given. The algorithm is easy to be programmed. As an application, we successfully segment some real industrial welding x-ray images.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"s3-29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书