{"title":"Direct Manipulation of 3D Mesh Deformation","authors":"Shungang Hua, Qing Zhong, Qiuxin Jiang","doi":"10.1109/ISISE.2010.89","DOIUrl":"https://doi.org/10.1109/ISISE.2010.89","url":null,"abstract":"We present an efficient and fast algorithm for 3D mesh deformation in this paper. By edge collapse mesh simplification, our algorithm simplifies the original shape to a reduced mesh, which contains the salient feature of the original 3D shape. For the reduced mesh, we specify an affine transformation for each vertex called key point. According to the user's manipulation, the fixed or moved constraints are imposed on some key points. Using a nonlinear optimization, the transformation matrixes of all the key points are solved. Then, for the original shape, all the vertexes can be mapped, based on the affine transformation of key points, to the new position to realize 3D shape deformation. Our algorithm resolves the transformation matrix of the key points instead that of all the vertexes of original shape, such that it can retrench the computational cost and realize real-time display, while gain the detail preserved 3D deformation.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115421183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Encryption Protocol for Ad Hoc Networks","authors":"Xiaoming Wang, Zhiwei Liao","doi":"10.1109/ISISE.2010.144","DOIUrl":"https://doi.org/10.1109/ISISE.2010.144","url":null,"abstract":"A secure encryption protocol for mobile ad hoc networks is proposed based on cluster-based structure. In proposed scheme, we employ a one-way key chain and polynomial function as the basic means of constructing the encryption procedure in order to reduces the need for public key cryptography and shortage overhead. The proposed protocol avoids massive message exchanges for key setup that are sent during cluster members. Each cluster member is only required to receive messages to setup the cluster key, and hence can decrypt the encrypted message. The analysis of security and efficiency shows that the proposed scheme cannot only has the same advantages with broadcast encryption systems, but also can easily and efficiently add new cluster members and revoke malicious cluster members. Therefore, it is more efficient, and more practical protocol for mobile ad hoc networks.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126763513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi Agents Based for Humanistic Intelligent Class Scheduling System","authors":"Dan Weili, S. Qiu","doi":"10.1109/ISISE.2010.121","DOIUrl":"https://doi.org/10.1109/ISISE.2010.121","url":null,"abstract":"Multi Agent Systems has become the focus of artificial intelligence in recent years. This paper constructs an intelligent course scheduling system based on multi agents. This system give different preference to different factors base on the accounting of constraints such as individual requirements of teachers, the classroom, class, curriculum, times est. And resolve the conflicts of course scheduling with Multi-agent. Then give a utility function for evaluation this system. The system can improve teacher satisfaction and guarantee the science of course scheduling system.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"10 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114125523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Algorithm of Software Copyright Protection Based on Multi-scale Triangular Mapping","authors":"Ning Huang, Xian-tong Huang, Xian-wen He","doi":"10.1109/ISISE.2010.120","DOIUrl":"https://doi.org/10.1109/ISISE.2010.120","url":null,"abstract":"This paper introduces a new pattern of software copyright protection based on registration system and n-dimensional multi-scale triangular mapping together with its inverse mapping in which a scheme in the area of software copyright protection is investigated and designed.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124969932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Data Compression Method for Traffic Loop Detectors' Signals Based on Lifting Wavelet Transformation and Entropy Coding","authors":"Xiao-fa Shi, Lin-lin Liang","doi":"10.1109/ISISE.2010.19","DOIUrl":"https://doi.org/10.1109/ISISE.2010.19","url":null,"abstract":"For the urgent demand of real-time data compression of large scale traffic loop detector system, a novel real-time data compression and reconstruction method combining lifting wavelet transform and hybrid entropy coding is proposed. The signal to be compressed is firstly decomposed with biorthogonali filters based on lifting wavelet transform and the hard-threshold method is then applied to the wavelet coefficients. In order to implement higher efficient compression, a hybrid entropy coding scheme is employed to code the reserved coefficients. This method has been applied to the real-time data acquired from a group of loop detectors. Simulation results indicate that the proposed scheme which combines both lossy and loss less compression techniques can achieve satisfactory compression performance in applications.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121284955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Segmentation in Deleting Repeat Questions","authors":"Xue-li Ren, Y. Dai","doi":"10.1109/ISISE.2010.46","DOIUrl":"https://doi.org/10.1109/ISISE.2010.46","url":null,"abstract":"It is an effective method that deletes repeat questions to provide quality of question bank. The main way is semantic similarity computing to solve repeat questions deleting but which depends on correct segmentation of text. A highly efficient and accurate method to segment words is proposed which combines word segmentation based on dictionary with reverse maximum matching and based on statistics with suffix arrays. And the idea references design of memory. The accuracy of word segmentation may achieve 97% and have 10% of increase in constructing question bank for principles of computer organization.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121658021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Texture Image Segmentation Based on Gaussian Mixture Models and Gray Level Co-occurrence Matrix","authors":"Jian Yu","doi":"10.1109/ISISE.2010.9","DOIUrl":"https://doi.org/10.1109/ISISE.2010.9","url":null,"abstract":"A novel texture image segmentation method based on Gaussian mixture models (GMM) and gray level co-occurrence matrix (GLCM) and was proposed. The feature space was formed by eight statics generated by gray level co-occurrence matrix (GLCM) including mean, variance, angular second moment(ASM), entropy, inverse difference moment(IDM), contrast, homogeneity(HOM), correlation(COR). The parameters of Gaussian mixture models were estimated by expectation maximization (EM) algorithm. The experiment results show that the proposed method can get better segmentation results than paper[8] and effectively enhance the segmentation precision of texture image.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115973663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Application on the Means of Transparent Texture Anti-aliasing","authors":"Yubo Lv, Jianfeng Xu","doi":"10.1109/ISISE.2010.81","DOIUrl":"https://doi.org/10.1109/ISISE.2010.81","url":null,"abstract":"To solve the flicker problem of the fuzzy edge of the transparent texture, this article analyses the reasons of the texture aliasing, introduces the current anti-aliasing skills which are popular, and the making technique of transparent texture combines with the practical application of 3D simulation, proposes a new anti-aliasing technique which aims at the transparent texture, Its principle is to add the same color of the texture on the model surface, reduce the grayscale difference, eliminate the scintillation from the visual. It solves the difficult problem that computer bring the edge blurry twinkle when the real-time plans the transparent texture, the method has a significance to the general computer 3D simulation enthusiasts and researchers.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130018914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chaos Attractor Compressing and Expanding in Chua Circuit Driven by Direct Current Voltage","authors":"Weiqing Liu, Yin Guo, Min Lu, Chaofei Liu","doi":"10.1109/ISISE.2010.105","DOIUrl":"https://doi.org/10.1109/ISISE.2010.105","url":null,"abstract":"The dynamics of Chua circuit driven by the direct current voltage is explored experimentally. The increasing direct current voltage (DCV) breaks the centro-symmetry in the Chua circuit, so that the attractor basin of one of the coexisting attractors shrinks with that of the other one expanding. Finally, only the expanding attractor exists with the shrinking one disappear for a critical DCV intensity. Its regimeis presented for the symmetry break caused by the DCV.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133974715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method of Online Writeprint Identification Based on Principal Component Analysis","authors":"Sanya Liu, Zhi Liu, Jianwen Sun, Lin Liu","doi":"10.1109/ISISE.2010.12","DOIUrl":"https://doi.org/10.1109/ISISE.2010.12","url":null,"abstract":"With the rapid development of Internet communication technologies, misuse of online messages for illegal purpose has become increasingly serious. The anonymous nature of online messages makes identity tracing a critical problem. We proposed a model of online write print identification based on principal component analysis for identifying authorship of online-message. The model use principal component analysis algorithm to achieve dimensionality reduction of feature-text matrix, the performance of identification model before and after using principal component analysis were compared by conducting the experiment on online reviews, and then the relationship of feature dimension and identification accuracy was analyzed. The experimental results based on consumers' reviews of online businesses showed that the model has good performance and efficiency while maintaining the high identification accuracy.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130965686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}