The 2nd International Conference on Information Science and Engineering最新文献

筛选
英文 中文
Path planning of mobile robot in local unknown environment 局部未知环境下移动机器人的路径规划
The 2nd International Conference on Information Science and Engineering Pub Date : 2010-12-01 DOI: 10.1109/ICISE.2010.5691163
Zhang Xiaoran, Ju Hehua
{"title":"Path planning of mobile robot in local unknown environment","authors":"Zhang Xiaoran, Ju Hehua","doi":"10.1109/ICISE.2010.5691163","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5691163","url":null,"abstract":"Based on path planning of mobile robot in local unknown environment, a new method which combines the benefits of global and local path planner is proposed. The global path planner uses A*algorithm to generate a series of optimal nodes to the target node, and cut some redundant of which to generate global guide path with more exact guiding direction. And the local planner makes full use of the real-time local environmental information detected by the robot and the path planning is optimize on-line under the conduct of global guide path. This method combines global guiding and local optimization in an effective way and so it is well suitable for local unknown environment.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127006339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fusion design between beidou satellite communication technology and sliding force remote monitoring warning system 北斗卫星通信技术与滑力远程监测预警系统的融合设计
The 2nd International Conference on Information Science and Engineering Pub Date : 2010-12-01 DOI: 10.1109/ICISE.2010.5691439
Z. Tao, Bin Zhang, Peng Zhang, Zhao Zhang, Fengbin Su
{"title":"Fusion design between beidou satellite communication technology and sliding force remote monitoring warning system","authors":"Z. Tao, Bin Zhang, Peng Zhang, Zhao Zhang, Fengbin Su","doi":"10.1109/ICISE.2010.5691439","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5691439","url":null,"abstract":"At present, the landslide disaster monitoring methods are mainly based on surface displacement monitoring, rock stratum tilt monitoring, rainfall capacity monitoring and so on at home and abroad. However, displacement and tilt are necessary rather than the sufficient conditions to produce landslide, sliding force is necessary and sufficient condition. According to the above principles, sliding force remote monitoring and early warning system based on GSM network communication platform is developed, and has been applied in 9 areas all over the country, which successfully forecasted landslide 3 times, and has achieved remarkable social and economical benefits. However, due to the landslide mostly in remote mountain, GSM network signals are weak and some areas are even in dead zone, in order to further promote the data transmission capacity of the system, according to the comparison among the existing remote data transmission modes, Beidou satellite communication technology is selected as the remote data transmission link of the system, which has no dead zone, low power consumption, and can expand the application fields of sliding force remote monitoring system.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127028623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and implementation to intelligent online exam system for course Information Resource Management 课程信息资源管理智能在线考试系统的设计与实现
The 2nd International Conference on Information Science and Engineering Pub Date : 2010-12-01 DOI: 10.1109/ICISE.2010.5691499
Ming Xiao, Liyang He
{"title":"Design and implementation to intelligent online exam system for course Information Resource Management","authors":"Ming Xiao, Liyang He","doi":"10.1109/ICISE.2010.5691499","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5691499","url":null,"abstract":"Compared with the traditional exam, online examination system can greatly enhance the evaluation capacities, reduce the human input and improve the work efficiencies. So it has considerable economical efficiency and broad prospect. Examination is used in course Information Resource Management in order to solve the problems in evaluating. An intelligent online exam system is developed and the examination library of Information Resource Management is established. By using this system, teachers are able to check the student's knowledge of the Information resource management better. This is helping to improve the quality of teaching. The exam system can also be applied to examination of other subjects.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130572509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Iris recognition using corner detection 利用角点检测进行虹膜识别
The 2nd International Conference on Information Science and Engineering Pub Date : 2010-12-01 DOI: 10.1109/ICISE.2010.5689246
Pranith Abbaraju, Srikanth C R B Tech
{"title":"Iris recognition using corner detection","authors":"Pranith Abbaraju, Srikanth C R B Tech","doi":"10.1109/ICISE.2010.5689246","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5689246","url":null,"abstract":"This paper proposes an iris recognition algorithm with the help of corner detection. It consists of five major steps i.e., iris acquisition, localization, normalization, feature extraction and matching. The inner pupil boundary is localized using Circular Hough Transformation. The technique performs better in the case of occlusions and images muddled by artifacts such as shadows and noise. The outer iris boundary is detected by circular summation of intensity approach from the determined pupil center and radius. The localized iris image is transformed from Cartesian to polar co-ordinate system to handle different size, variation in illumination and pupil dilation. Corners in the transformed iris image are detected using covariance matrix of change in intensity along rows and columns. All detected corners are considered as features of the iris image. For recognition through iris, corners of both the iris images are detected and total number of corners that are matched between the two images are obtained. The two iris images belong to the same person if the number of matched corners is greater than some threshold value. The system is tested on a database having 900 iris images and also on CASIA database. The algorithm has shown an overall accuracy of 95.4% with FRR of 5% and FAR of 4%.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123915263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Velocity distribution numerical simulation and indirect verification of cesium atomic clock 铯原子钟速度分布数值模拟与间接验证
The 2nd International Conference on Information Science and Engineering Pub Date : 2010-12-01 DOI: 10.1109/ICISE.2010.5689134
W. Ji, Chen Jiang, Wang Lihong, Z. Dixin
{"title":"Velocity distribution numerical simulation and indirect verification of cesium atomic clock","authors":"W. Ji, Chen Jiang, Wang Lihong, Z. Dixin","doi":"10.1109/ICISE.2010.5689134","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5689134","url":null,"abstract":"This paper presents a numerical simulation model for compact single beam magnetic state selection cesium clock to study cesium atomic velocity distribution on detector. In the model, cesium atoms ejecting from oven are accord with Maxwell distribution of thermal motion and are sampled with Monte Carlo method, then move into two-wire field magnets and take place transition with given probability in Ramsey microwave cavity. The theoretical conclusion is verified with the numerical simulations that oven temperature and feed-in microwave frequency offset has nothing to do with velocity distribution. Moreover, the velocity distribution on detector is acquired with Fourier transform method based on Ramsey lineshapes from numerical simulation and compared with that directly from numerical simulations. It shows that these velocity distributions are similar, which validates the numerical model.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124016009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-based process fault detection using Active Cost-sensitive Learning 采用主动成本敏感学习的基于数据的过程故障检测
The 2nd International Conference on Information Science and Engineering Pub Date : 2010-12-01 DOI: 10.1109/ICISE.2010.5691978
Mingzhu Tang, Chunhua Yang, W. Gui, Yongfang Xie
{"title":"Data-based process fault detection using Active Cost-sensitive Learning","authors":"Mingzhu Tang, Chunhua Yang, W. Gui, Yongfang Xie","doi":"10.1109/ICISE.2010.5691978","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5691978","url":null,"abstract":"Fault detection for industrial process is important to improve the qualities and quantities of products. Since it is difficult to obtain exact mathematic model for fault detection, data-based model for fault detection is popular in many industrial process applications. There are two class-imbalanced problems in fault detection for industrial process: the problem between unlabeled instances and labeled instances, the one between normal instances and fault instances. Active Cost-sensitive Learning (ACL) is proposed to solve the above two class-imbalanced problems in this paper. Margin sampling, one step of ACL algorithm, is used to select an informative instance from unlabeled instances. Cost-sensitive support vector machine (CSVM), the other step of ACL algorithm, is trained to predict the class label with minimum expected cost for an unlabeled instance. The effectiveness of the proposed algorithm is demonstrated by the benchmark Tennessee Eastman problem. Experiments show that the proposed algorithm can effectively reduce average cost and increase fault sensitivity.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124024476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A method of USIM anti-cloning in LTE/SAE LTE/SAE中USIM抗克隆方法研究
The 2nd International Conference on Information Science and Engineering Pub Date : 2010-12-01 DOI: 10.1109/ICISE.2010.5689638
Wu Shao-bo, Li Chengshu
{"title":"A method of USIM anti-cloning in LTE/SAE","authors":"Wu Shao-bo, Li Chengshu","doi":"10.1109/ICISE.2010.5689638","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5689638","url":null,"abstract":"According to the status of mobile phone user card security. This article analyzes the security mechanism of SIM and USIM. Aim at some cloning methods of SIM cards, after studying the actual usage of cloning card. A solution is proposed based on the location to judge which can identify the user's USIM card is cloned or not. This method both for the user to reduce losses, but also to protect user privacy, and basic process changes to existing communications smaller, it has many purposes.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123202966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Price and advertising based information forecast in direct market 直接市场的价格和广告信息预测
The 2nd International Conference on Information Science and Engineering Pub Date : 2010-12-01 DOI: 10.1109/ICISE.2010.5691351
Shuying Sun
{"title":"Price and advertising based information forecast in direct market","authors":"Shuying Sun","doi":"10.1109/ICISE.2010.5691351","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5691351","url":null,"abstract":"The focus of this paper is information forecast value and the profound impact it has in today's market. When a firm sells its new product through the direct market, the accuracy of marketing forecast information plays important impact on price and advertising spending, and thus expected profits. We develop a price-advertising model to see how the effect of marketing forecast information on the price and advertising spending, and expected profit are moderated by product quality, product acceptance of a direct market, and the customers' preference, respectively. Research results suggest that forecast information precision is more valuable when product quality is high and product acceptance of a direct market is large. It also suggest that the customers' preference does not affect the value of information at all.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123203145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Reliability of Computer Network 计算机网络可靠性研究
The 2nd International Conference on Information Science and Engineering Pub Date : 2010-12-01 DOI: 10.1109/ICISE.2010.5691931
Cao Lianmin, Zeng Qingliang
{"title":"Study on Reliability of Computer Network","authors":"Cao Lianmin, Zeng Qingliang","doi":"10.1109/ICISE.2010.5691931","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5691931","url":null,"abstract":"Study on reliability of computer network has not formed a complete theoretical system yet. This paper has reviewed the major achievements and the trend of the reliability of computer network. At the same time it puts forward an integration availability concept of computer network, that is, capacity of network resources utilization in prescribed time under the network failure conditions.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123345733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on technology of transforming Abstract Syntax Tree of JAVA Language to Implementation Layer of Procedure Blueprint JAVA语言抽象语法树到过程蓝图实现层的转换技术研究
The 2nd International Conference on Information Science and Engineering Pub Date : 2010-12-01 DOI: 10.1109/ICISE.2010.5689146
Pei-Hong Tu, Jian-bin Liu
{"title":"Research on technology of transforming Abstract Syntax Tree of JAVA Language to Implementation Layer of Procedure Blueprint","authors":"Pei-Hong Tu, Jian-bin Liu","doi":"10.1109/ICISE.2010.5689146","DOIUrl":"https://doi.org/10.1109/ICISE.2010.5689146","url":null,"abstract":"In the process of reverse-engineering software systems and then transforming information extracted into Procedure Blueprint models, the process of transforming Abstract Syntax Tree to Implementation Layer of Procedure Blueprint is the key. In this paper, we propose the technology of transforming Abstract Syntax Tree of JAVA Language to implementation layer of Procedure Blueprint. We specify the mapping rules of the transforming process with first-order logic, and then we prove the consistency and validity of the process. We show an example of this process and assess the practical application of the technology.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123510384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信