{"title":"MIP-Guided Blood Vessel Segmentation Using SEM Statistical Mixture Model","authors":"Shi-feng Zhao, Mingquan Zhou, Feng Xu","doi":"10.1109/ISISE.2010.82","DOIUrl":"https://doi.org/10.1109/ISISE.2010.82","url":null,"abstract":"Blood vessel segmentation is an essential step of the diagnoses of various brain diseases. In this paper, we propose a novel method for segmentation of cerebral blood vessels from magnetic resonance angiography (MRA) images based on Gaussian Mixture Model and the SEM algorithm. First the MIP algorithm is applied to decrease the quantity of mixing elements. Then the Gaussian Mixture Model is put forward to fit the stochastic distribution of the brain vessels and other tissue. Finally, the SEM algorithm is adopted to estimate the parameters of Gaussian Mixture Model. The feasibility and validity of the model is verified by the experiment. With the model, small branches of the brain vessel can be segmented, the speed of the convergent is improved and local minima are avoided and the accuracy of segmentation is improved by the random assortment iteration. Our method is tested on head MRA datasets, it is demonstrated to be efficient.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130626706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved PSO-BP Network Model","authors":"Jinxia Ren, Shuai Yang","doi":"10.1109/ISISE.2010.101","DOIUrl":"https://doi.org/10.1109/ISISE.2010.101","url":null,"abstract":"An improved network model to adjust weights of BP network based on particle swarm optimization(PSO) was proposed. The fuzzy control was used to assign the different weight to PSO and BP algorithm during different periods. PSO algorithm plays a main role in the previous evolution period, and BP algorithm plays a vital roal in later period. The model can overcome the slow convergence and easily getting into the local extremum of basic BP algorithm, and can also improve the learning ability and generalization ability with a higher precision. The simulation results show that the improved PSOBP network model has higher accuracy and quicker response than the traditional model.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127965079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of MTS Method Based on Vague Set","authors":"Kuipeng Chao","doi":"10.1109/ISISE.2010.64","DOIUrl":"https://doi.org/10.1109/ISISE.2010.64","url":null,"abstract":"MTS is a pattern recognition method and it can only achieve a single category of identification. But Multi-class pattern recognition problem are most common in the process of pattern recognition. As decision-maker's cognition of things is vague and uncertain and vague set is an effective way to deal with uncertainty problem, so the author tries to combine vague set with MTS to construct Multi-class pattern recognition model and give a specific steps of algorithm.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131656324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Correlation Analyses among Ionosphere Disturbance, Ground Electric Field Variation and Thunderstorm Activity","authors":"Wu Xiaoyong, Qiu Jianxia, Li Jinzhu, Chen Yanyu","doi":"10.1109/ISISE.2010.11","DOIUrl":"https://doi.org/10.1109/ISISE.2010.11","url":null,"abstract":"Based on the work of statistical analysis software SPSS, through curve estimation, linear correlation, partial correlation and stepwise regression, we make a correlation analysis among ionosphere disturbance, ground electric variation and thunderstorm activity. We also look into the influence from ionosphere and ground electric field on thunderstorm activity instantly, ionosphere disturbance has extremely significant influence on thunderstorm current. The correlation between ground electric field and thunderstorm activity is negative. On the other hand, in multi-factor interplay analyses, thunderstorm activity is largely affected by ionosphere disturbance within 3 hours. Between electric field and thunderstorm current, the partial correlation is negative which increases from significant to extremely-significant in the time span from the 4th hour to the 7th hour.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133182040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Static Constraint RBAC Model","authors":"Xuexiong Yan, Qingxian Wang, Qiang Wei, Junhu Zhu","doi":"10.1109/ISISE.2010.65","DOIUrl":"https://doi.org/10.1109/ISISE.2010.65","url":null,"abstract":"Multiple-session SoD problem is addressed in the static constraint RBAC model. An improved formal static constraint RBAC model is proposed and it will check the change of the UA relation to decide whether the union of the user's role set will satisfy the MER constraint during an administrative session. If it will not satisfy the constraint, some necessary withdrawing will be performed. The improved model conserves the advantage of the MER mechanism and handles multiple-session SoD problem efficiently.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130903815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model Design of Information Security Monitoring System of Nanchang Bonded Logistics Park","authors":"Shaojun Zhong, Zhijuan Deng","doi":"10.1109/ISISE.2010.124","DOIUrl":"https://doi.org/10.1109/ISISE.2010.124","url":null,"abstract":"Since the network security arises more and more attention, many network systems, particularly the large ones, have adopted the appropriate security management preventions, which have increased the difficulty of intrusions to network/system by network/system software or hardware security breaches. For the large computer network system of Nanchang Bonded Logistics Park, the paper tries to integrally consider the features of normal state and intrusion, uses the composite intrusion detection bases to establish a simple but effective security monitoring system based on self-adapting statistical method in order to detect and report the network attacks.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124373189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Mining of Association Rules Based on Privacy-Preserved Method","authors":"Hua-jin Wang, Chun-an Hu, Jian-sheng Liu","doi":"10.1109/ISISE.2010.125","DOIUrl":"https://doi.org/10.1109/ISISE.2010.125","url":null,"abstract":"With the rapid development of social information, the application of distributed database system is increasing. Distributed data mining will play an important role in data mining. As one of the well-known distributed association rules mining algorithm, the FDM algorithm is very fast and efficient, however, the cost of this algorithm is very great because it is designed under the condition of non-shared resource. Moreover, the important information at every site is exposed to other sites, which is not accord to the nowadays trend of attaching importance to privacy preserving increasingly. In this paper, we propose an improved algorithm based on the FDM algorithm. In the process, it computes the total support count with the privacy-preserved method, meanwhile ensures the source of every local large item-set and local support count is covered, so it reduces the time spent on communication and preserves the privacy of the data distributed at each site. The experimental evaluations show that the proposed algorithm is efficient and rather suitable for the practical application field.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123476708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Neural Network PID Controller for Cement Rotary Kiln Temperature Based on FPGA","authors":"Yaohua Guo, Junshuang Ma, Minglin Yao","doi":"10.1109/ISISE.2010.74","DOIUrl":"https://doi.org/10.1109/ISISE.2010.74","url":null,"abstract":"In this paper, we discuss a method of using BP neural network to adjust PID parameters online for controlling the cement kiln temperature. First, according to the principle of the rotary kiln temperature, the BP_PID controller is designed in theory, and the neural network trainings and simulations in MATLAB are taken. Secondly, by using the top-down method in VHDL language, the modules of BP_PID controller which is the BP neural network forward transmission module, the error back propagation module, and the weigh and threshold adjustment module and so on are all implemented on FPGA chip. Eventually the simulations of program in Quartus are given in this paper. The simulation results show that this design is reasonable, the hardware implementation is correct, so it can create the conditions for a wide range of applications of hardware intelligent algorithm in the field of industrial.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127289136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Application of IP Core in SoC Technology","authors":"Xuemin Pang, D. Yu, Jianbing Li, Yuhua Guo","doi":"10.1109/ISISE.2010.94","DOIUrl":"https://doi.org/10.1109/ISISE.2010.94","url":null,"abstract":"The design of system on chip is the popular research domain in IC design currently. The key problem in this paper is the design and application of IP core in SoC technology. The SoC technology and the characteristics of IP core are also introduced. The design principles of IP core reusability, IP core design and verification flow are put forward systematically. The integrated application and selection of IP core are summarized in detail.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114793635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Word Similarity Algorithm Based on Semantic","authors":"Dongsen Si, Cao Boyan, Zeng-zhi Li, Gao Qiang","doi":"10.1109/ISISE.2010.33","DOIUrl":"https://doi.org/10.1109/ISISE.2010.33","url":null,"abstract":"Presents a Word Similarity Algorithm based on Thesaurus, Made two changes to the structure of Thesaurus to accurately reflect the semantic distance, the algorithm took into account the Thesaurus classification for different parts of speech, the Thesaurus density, the relationship between words and so on. Experiments show that this method can significantly improve the quality of similarity calculation.","PeriodicalId":206833,"journal":{"name":"2010 Third International Symposium on Information Science and Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128157433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}