{"title":"Path planning of mobile robot in local unknown environment","authors":"Zhang Xiaoran, Ju Hehua","doi":"10.1109/ICISE.2010.5691163","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5691163","url":null,"abstract":"Based on path planning of mobile robot in local unknown environment, a new method which combines the benefits of global and local path planner is proposed. The global path planner uses A*algorithm to generate a series of optimal nodes to the target node, and cut some redundant of which to generate global guide path with more exact guiding direction. And the local planner makes full use of the real-time local environmental information detected by the robot and the path planning is optimize on-line under the conduct of global guide path. This method combines global guiding and local optimization in an effective way and so it is well suitable for local unknown environment.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127006339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Tao, Bin Zhang, Peng Zhang, Zhao Zhang, Fengbin Su
{"title":"Fusion design between beidou satellite communication technology and sliding force remote monitoring warning system","authors":"Z. Tao, Bin Zhang, Peng Zhang, Zhao Zhang, Fengbin Su","doi":"10.1109/ICISE.2010.5691439","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5691439","url":null,"abstract":"At present, the landslide disaster monitoring methods are mainly based on surface displacement monitoring, rock stratum tilt monitoring, rainfall capacity monitoring and so on at home and abroad. However, displacement and tilt are necessary rather than the sufficient conditions to produce landslide, sliding force is necessary and sufficient condition. According to the above principles, sliding force remote monitoring and early warning system based on GSM network communication platform is developed, and has been applied in 9 areas all over the country, which successfully forecasted landslide 3 times, and has achieved remarkable social and economical benefits. However, due to the landslide mostly in remote mountain, GSM network signals are weak and some areas are even in dead zone, in order to further promote the data transmission capacity of the system, according to the comparison among the existing remote data transmission modes, Beidou satellite communication technology is selected as the remote data transmission link of the system, which has no dead zone, low power consumption, and can expand the application fields of sliding force remote monitoring system.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127028623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation to intelligent online exam system for course Information Resource Management","authors":"Ming Xiao, Liyang He","doi":"10.1109/ICISE.2010.5691499","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5691499","url":null,"abstract":"Compared with the traditional exam, online examination system can greatly enhance the evaluation capacities, reduce the human input and improve the work efficiencies. So it has considerable economical efficiency and broad prospect. Examination is used in course Information Resource Management in order to solve the problems in evaluating. An intelligent online exam system is developed and the examination library of Information Resource Management is established. By using this system, teachers are able to check the student's knowledge of the Information resource management better. This is helping to improve the quality of teaching. The exam system can also be applied to examination of other subjects.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130572509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iris recognition using corner detection","authors":"Pranith Abbaraju, Srikanth C R B Tech","doi":"10.1109/ICISE.2010.5689246","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5689246","url":null,"abstract":"This paper proposes an iris recognition algorithm with the help of corner detection. It consists of five major steps i.e., iris acquisition, localization, normalization, feature extraction and matching. The inner pupil boundary is localized using Circular Hough Transformation. The technique performs better in the case of occlusions and images muddled by artifacts such as shadows and noise. The outer iris boundary is detected by circular summation of intensity approach from the determined pupil center and radius. The localized iris image is transformed from Cartesian to polar co-ordinate system to handle different size, variation in illumination and pupil dilation. Corners in the transformed iris image are detected using covariance matrix of change in intensity along rows and columns. All detected corners are considered as features of the iris image. For recognition through iris, corners of both the iris images are detected and total number of corners that are matched between the two images are obtained. The two iris images belong to the same person if the number of matched corners is greater than some threshold value. The system is tested on a database having 900 iris images and also on CASIA database. The algorithm has shown an overall accuracy of 95.4% with FRR of 5% and FAR of 4%.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123915263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Velocity distribution numerical simulation and indirect verification of cesium atomic clock","authors":"W. Ji, Chen Jiang, Wang Lihong, Z. Dixin","doi":"10.1109/ICISE.2010.5689134","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5689134","url":null,"abstract":"This paper presents a numerical simulation model for compact single beam magnetic state selection cesium clock to study cesium atomic velocity distribution on detector. In the model, cesium atoms ejecting from oven are accord with Maxwell distribution of thermal motion and are sampled with Monte Carlo method, then move into two-wire field magnets and take place transition with given probability in Ramsey microwave cavity. The theoretical conclusion is verified with the numerical simulations that oven temperature and feed-in microwave frequency offset has nothing to do with velocity distribution. Moreover, the velocity distribution on detector is acquired with Fourier transform method based on Ramsey lineshapes from numerical simulation and compared with that directly from numerical simulations. It shows that these velocity distributions are similar, which validates the numerical model.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124016009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data-based process fault detection using Active Cost-sensitive Learning","authors":"Mingzhu Tang, Chunhua Yang, W. Gui, Yongfang Xie","doi":"10.1109/ICISE.2010.5691978","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5691978","url":null,"abstract":"Fault detection for industrial process is important to improve the qualities and quantities of products. Since it is difficult to obtain exact mathematic model for fault detection, data-based model for fault detection is popular in many industrial process applications. There are two class-imbalanced problems in fault detection for industrial process: the problem between unlabeled instances and labeled instances, the one between normal instances and fault instances. Active Cost-sensitive Learning (ACL) is proposed to solve the above two class-imbalanced problems in this paper. Margin sampling, one step of ACL algorithm, is used to select an informative instance from unlabeled instances. Cost-sensitive support vector machine (CSVM), the other step of ACL algorithm, is trained to predict the class label with minimum expected cost for an unlabeled instance. The effectiveness of the proposed algorithm is demonstrated by the benchmark Tennessee Eastman problem. Experiments show that the proposed algorithm can effectively reduce average cost and increase fault sensitivity.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124024476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A method of USIM anti-cloning in LTE/SAE","authors":"Wu Shao-bo, Li Chengshu","doi":"10.1109/ICISE.2010.5689638","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5689638","url":null,"abstract":"According to the status of mobile phone user card security. This article analyzes the security mechanism of SIM and USIM. Aim at some cloning methods of SIM cards, after studying the actual usage of cloning card. A solution is proposed based on the location to judge which can identify the user's USIM card is cloned or not. This method both for the user to reduce losses, but also to protect user privacy, and basic process changes to existing communications smaller, it has many purposes.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123202966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Price and advertising based information forecast in direct market","authors":"Shuying Sun","doi":"10.1109/ICISE.2010.5691351","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5691351","url":null,"abstract":"The focus of this paper is information forecast value and the profound impact it has in today's market. When a firm sells its new product through the direct market, the accuracy of marketing forecast information plays important impact on price and advertising spending, and thus expected profits. We develop a price-advertising model to see how the effect of marketing forecast information on the price and advertising spending, and expected profit are moderated by product quality, product acceptance of a direct market, and the customers' preference, respectively. Research results suggest that forecast information precision is more valuable when product quality is high and product acceptance of a direct market is large. It also suggest that the customers' preference does not affect the value of information at all.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123203145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Reliability of Computer Network","authors":"Cao Lianmin, Zeng Qingliang","doi":"10.1109/ICISE.2010.5691931","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5691931","url":null,"abstract":"Study on reliability of computer network has not formed a complete theoretical system yet. This paper has reviewed the major achievements and the trend of the reliability of computer network. At the same time it puts forward an integration availability concept of computer network, that is, capacity of network resources utilization in prescribed time under the network failure conditions.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123345733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on technology of transforming Abstract Syntax Tree of JAVA Language to Implementation Layer of Procedure Blueprint","authors":"Pei-Hong Tu, Jian-bin Liu","doi":"10.1109/ICISE.2010.5689146","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5689146","url":null,"abstract":"In the process of reverse-engineering software systems and then transforming information extracted into Procedure Blueprint models, the process of transforming Abstract Syntax Tree to Implementation Layer of Procedure Blueprint is the key. In this paper, we propose the technology of transforming Abstract Syntax Tree of JAVA Language to implementation layer of Procedure Blueprint. We specify the mapping rules of the transforming process with first-order logic, and then we prove the consistency and validity of the process. We show an example of this process and assess the practical application of the technology.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123510384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}