2010 Third International Symposium on Information Science and Engineering最新文献

筛选
英文 中文
Direct Manipulation of 3D Mesh Deformation 直接操作3D网格变形
2010 Third International Symposium on Information Science and Engineering Pub Date : 2010-12-24 DOI: 10.1109/ISISE.2010.89
Shungang Hua, Qing Zhong, Qiuxin Jiang
{"title":"Direct Manipulation of 3D Mesh Deformation","authors":"Shungang Hua, Qing Zhong, Qiuxin Jiang","doi":"10.1109/ISISE.2010.89","DOIUrl":"https://doi.org/10.1109/ISISE.2010.89","url":null,"abstract":"We present an efficient and fast algorithm for 3D mesh deformation in this paper. By edge collapse mesh simplification, our algorithm simplifies the original shape to a reduced mesh, which contains the salient feature of the original 3D shape. For the reduced mesh, we specify an affine transformation for each vertex called key point. According to the user's manipulation, the fixed or moved constraints are imposed on some key points. Using a nonlinear optimization, the transformation matrixes of all the key points are solved. Then, for the original shape, all the vertexes can be mapped, based on the affine transformation of key points, to the new position to realize 3D shape deformation. Our algorithm resolves the transformation matrix of the key points instead that of all the vertexes of original shape, such that it can retrench the computational cost and realize real-time display, while gain the detail preserved 3D deformation.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115421183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure Encryption Protocol for Ad Hoc Networks Ad Hoc网络的安全加密协议
2010 Third International Symposium on Information Science and Engineering Pub Date : 2010-12-24 DOI: 10.1109/ISISE.2010.144
Xiaoming Wang, Zhiwei Liao
{"title":"A Secure Encryption Protocol for Ad Hoc Networks","authors":"Xiaoming Wang, Zhiwei Liao","doi":"10.1109/ISISE.2010.144","DOIUrl":"https://doi.org/10.1109/ISISE.2010.144","url":null,"abstract":"A secure encryption protocol for mobile ad hoc networks is proposed based on cluster-based structure. In proposed scheme, we employ a one-way key chain and polynomial function as the basic means of constructing the encryption procedure in order to reduces the need for public key cryptography and shortage overhead. The proposed protocol avoids massive message exchanges for key setup that are sent during cluster members. Each cluster member is only required to receive messages to setup the cluster key, and hence can decrypt the encrypted message. The analysis of security and efficiency shows that the proposed scheme cannot only has the same advantages with broadcast encryption systems, but also can easily and efficiently add new cluster members and revoke malicious cluster members. Therefore, it is more efficient, and more practical protocol for mobile ad hoc networks.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126763513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi Agents Based for Humanistic Intelligent Class Scheduling System 基于多智能体的人文智能排课系统
2010 Third International Symposium on Information Science and Engineering Pub Date : 2010-12-24 DOI: 10.1109/ISISE.2010.121
Dan Weili, S. Qiu
{"title":"Multi Agents Based for Humanistic Intelligent Class Scheduling System","authors":"Dan Weili, S. Qiu","doi":"10.1109/ISISE.2010.121","DOIUrl":"https://doi.org/10.1109/ISISE.2010.121","url":null,"abstract":"Multi Agent Systems has become the focus of artificial intelligence in recent years. This paper constructs an intelligent course scheduling system based on multi agents. This system give different preference to different factors base on the accounting of constraints such as individual requirements of teachers, the classroom, class, curriculum, times est. And resolve the conflicts of course scheduling with Multi-agent. Then give a utility function for evaluation this system. The system can improve teacher satisfaction and guarantee the science of course scheduling system.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"10 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114125523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Algorithm of Software Copyright Protection Based on Multi-scale Triangular Mapping 基于多比例尺三角形映射的软件著作权保护新算法
2010 Third International Symposium on Information Science and Engineering Pub Date : 2010-12-24 DOI: 10.1109/ISISE.2010.120
Ning Huang, Xian-tong Huang, Xian-wen He
{"title":"A New Algorithm of Software Copyright Protection Based on Multi-scale Triangular Mapping","authors":"Ning Huang, Xian-tong Huang, Xian-wen He","doi":"10.1109/ISISE.2010.120","DOIUrl":"https://doi.org/10.1109/ISISE.2010.120","url":null,"abstract":"This paper introduces a new pattern of software copyright protection based on registration system and n-dimensional multi-scale triangular mapping together with its inverse mapping in which a scheme in the area of software copyright protection is investigated and designed.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124969932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Data Compression Method for Traffic Loop Detectors' Signals Based on Lifting Wavelet Transformation and Entropy Coding 基于提升小波变换和熵编码的交通环路检测信号数据压缩方法
2010 Third International Symposium on Information Science and Engineering Pub Date : 2010-12-24 DOI: 10.1109/ISISE.2010.19
Xiao-fa Shi, Lin-lin Liang
{"title":"A Data Compression Method for Traffic Loop Detectors' Signals Based on Lifting Wavelet Transformation and Entropy Coding","authors":"Xiao-fa Shi, Lin-lin Liang","doi":"10.1109/ISISE.2010.19","DOIUrl":"https://doi.org/10.1109/ISISE.2010.19","url":null,"abstract":"For the urgent demand of real-time data compression of large scale traffic loop detector system, a novel real-time data compression and reconstruction method combining lifting wavelet transform and hybrid entropy coding is proposed. The signal to be compressed is firstly decomposed with biorthogonali filters based on lifting wavelet transform and the hard-threshold method is then applied to the wavelet coefficients. In order to implement higher efficient compression, a hybrid entropy coding scheme is employed to code the reserved coefficients. This method has been applied to the real-time data acquired from a group of loop detectors. Simulation results indicate that the proposed scheme which combines both lossy and loss less compression techniques can achieve satisfactory compression performance in applications.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121284955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Segmentation in Deleting Repeat Questions 重复问题删除中的切分方法研究
2010 Third International Symposium on Information Science and Engineering Pub Date : 2010-12-24 DOI: 10.1109/ISISE.2010.46
Xue-li Ren, Y. Dai
{"title":"Research on Segmentation in Deleting Repeat Questions","authors":"Xue-li Ren, Y. Dai","doi":"10.1109/ISISE.2010.46","DOIUrl":"https://doi.org/10.1109/ISISE.2010.46","url":null,"abstract":"It is an effective method that deletes repeat questions to provide quality of question bank. The main way is semantic similarity computing to solve repeat questions deleting but which depends on correct segmentation of text. A highly efficient and accurate method to segment words is proposed which combines word segmentation based on dictionary with reverse maximum matching and based on statistics with suffix arrays. And the idea references design of memory. The accuracy of word segmentation may achieve 97% and have 10% of increase in constructing question bank for principles of computer organization.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121658021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Texture Image Segmentation Based on Gaussian Mixture Models and Gray Level Co-occurrence Matrix 基于高斯混合模型和灰度共生矩阵的纹理图像分割
2010 Third International Symposium on Information Science and Engineering Pub Date : 2010-12-24 DOI: 10.1109/ISISE.2010.9
Jian Yu
{"title":"Texture Image Segmentation Based on Gaussian Mixture Models and Gray Level Co-occurrence Matrix","authors":"Jian Yu","doi":"10.1109/ISISE.2010.9","DOIUrl":"https://doi.org/10.1109/ISISE.2010.9","url":null,"abstract":"A novel texture image segmentation method based on Gaussian mixture models (GMM) and gray level co-occurrence matrix (GLCM) and was proposed. The feature space was formed by eight statics generated by gray level co-occurrence matrix (GLCM) including mean, variance, angular second moment(ASM), entropy, inverse difference moment(IDM), contrast, homogeneity(HOM), correlation(COR). The parameters of Gaussian mixture models were estimated by expectation maximization (EM) algorithm. The experiment results show that the proposed method can get better segmentation results than paper[8] and effectively enhance the segmentation precision of texture image.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115973663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Research and Application on the Means of Transparent Texture Anti-aliasing 透明纹理抗混叠方法的研究与应用
2010 Third International Symposium on Information Science and Engineering Pub Date : 2010-12-24 DOI: 10.1109/ISISE.2010.81
Yubo Lv, Jianfeng Xu
{"title":"Research and Application on the Means of Transparent Texture Anti-aliasing","authors":"Yubo Lv, Jianfeng Xu","doi":"10.1109/ISISE.2010.81","DOIUrl":"https://doi.org/10.1109/ISISE.2010.81","url":null,"abstract":"To solve the flicker problem of the fuzzy edge of the transparent texture, this article analyses the reasons of the texture aliasing, introduces the current anti-aliasing skills which are popular, and the making technique of transparent texture combines with the practical application of 3D simulation, proposes a new anti-aliasing technique which aims at the transparent texture, Its principle is to add the same color of the texture on the model surface, reduce the grayscale difference, eliminate the scintillation from the visual. It solves the difficult problem that computer bring the edge blurry twinkle when the real-time plans the transparent texture, the method has a significance to the general computer 3D simulation enthusiasts and researchers.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130018914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chaos Attractor Compressing and Expanding in Chua Circuit Driven by Direct Current Voltage 直流电压驱动Chua电路中混沌吸引子的压缩与扩展
2010 Third International Symposium on Information Science and Engineering Pub Date : 2010-12-24 DOI: 10.1109/ISISE.2010.105
Weiqing Liu, Yin Guo, Min Lu, Chaofei Liu
{"title":"Chaos Attractor Compressing and Expanding in Chua Circuit Driven by Direct Current Voltage","authors":"Weiqing Liu, Yin Guo, Min Lu, Chaofei Liu","doi":"10.1109/ISISE.2010.105","DOIUrl":"https://doi.org/10.1109/ISISE.2010.105","url":null,"abstract":"The dynamics of Chua circuit driven by the direct current voltage is explored experimentally. The increasing direct current voltage (DCV) breaks the centro-symmetry in the Chua circuit, so that the attractor basin of one of the coexisting attractors shrinks with that of the other one expanding. Finally, only the expanding attractor exists with the shrinking one disappear for a critical DCV intensity. Its regimeis presented for the symmetry break caused by the DCV.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133974715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Method of Online Writeprint Identification Based on Principal Component Analysis 基于主成分分析的在线书写指纹识别方法
2010 Third International Symposium on Information Science and Engineering Pub Date : 2010-12-24 DOI: 10.1109/ISISE.2010.12
Sanya Liu, Zhi Liu, Jianwen Sun, Lin Liu
{"title":"A Method of Online Writeprint Identification Based on Principal Component Analysis","authors":"Sanya Liu, Zhi Liu, Jianwen Sun, Lin Liu","doi":"10.1109/ISISE.2010.12","DOIUrl":"https://doi.org/10.1109/ISISE.2010.12","url":null,"abstract":"With the rapid development of Internet communication technologies, misuse of online messages for illegal purpose has become increasingly serious. The anonymous nature of online messages makes identity tracing a critical problem. We proposed a model of online write print identification based on principal component analysis for identifying authorship of online-message. The model use principal component analysis algorithm to achieve dimensionality reduction of feature-text matrix, the performance of identification model before and after using principal component analysis were compared by conducting the experiment on online reviews, and then the relationship of feature dimension and identification accuracy was analyzed. The experimental results based on consumers' reviews of online businesses showed that the model has good performance and efficiency while maintaining the high identification accuracy.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130965686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信