2008 International Symposium on Computer Science and Computational Technology最新文献

筛选
英文 中文
Seamless LBS Based on the Integration of WSN and GPS 基于WSN和GPS集成的无缝LBS
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.147
D. Zou, Z. Deng, Lianming Xu, Weizheng Ren
{"title":"Seamless LBS Based on the Integration of WSN and GPS","authors":"D. Zou, Z. Deng, Lianming Xu, Weizheng Ren","doi":"10.1109/ISCSCT.2008.147","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.147","url":null,"abstract":"For the goal of seamless indoor and outdoor location based services(LBS), a integrated navigation algorithm with both satellite location and WSN is put forward in this paper. This paper also design semi- physical simulation platform based on software receiver structure, which integrate GPS receiver and WSN nodes. Pseudorange observation data of global positioning system (GPS) and distance observation data of WSN are utilized to carry out positioning. Simulation results show that comparing with traditional GPS location algorithm, adaptation range is increased and positioning with less than four satellites is realized using the algorithm; and comparing with WSN location algorithm, the algorithm has a higher precision.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122133345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Using Data Recovery Models for Multi-shift Scheduling in Wireless Sensor Networks 基于数据恢复模型的无线传感器网络多班调度
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.173
Xu Xu, Y. Hu, W. Liu, Jingping Bi
{"title":"Using Data Recovery Models for Multi-shift Scheduling in Wireless Sensor Networks","authors":"Xu Xu, Y. Hu, W. Liu, Jingping Bi","doi":"10.1109/ISCSCT.2008.173","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.173","url":null,"abstract":"Energy efficiency is a key problem in wireless sensor networks. Keeping only a portion of nodes active and putting the others into sleep mode can conserve energy. In order to maintain satisfactory data quality, we recover the would-be sensed data for sleeping nodes. In this paper, we exploit spatial correlation among densely deployed nodes and use such correlation for data recovery. Loss in data quality caused by data recovery is the criterion for our proposed polynomial-time active nodes selection algorithm. Considering the possible energy consumption unbalance, we further develop a multi-shift scheduling scheme. The multi-shift scheduling is formulated as a constrained mini-max optimization problem. We validate these algorithms using a real-world data set and observe very satisfactory results.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129770270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accelerating Fractal Image Encoding Based on Gray Value Moment Features of Normalized Block 基于归一化分块灰度值矩特征的加速分形图像编码
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.344
Gao-ping Li
{"title":"Accelerating Fractal Image Encoding Based on Gray Value Moment Features of Normalized Block","authors":"Gao-ping Li","doi":"10.1109/ISCSCT.2008.344","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.344","url":null,"abstract":"Fractal image encoding with full search typically requires a very long runtime, which is essentially spent on searching for the best-matched block to an input range block in a large domain pool. This paper thus proposed an effective method to improve the drawback, which is mainly based on gray value moment features of normalized block and related inequality is presented by the authors. During the search process, the gray value moment features is first utilized to confine efficiently the search space to the vicinity of the initial-matched block (i.e., the domain block having the closest gray value moment features to the input range block being encoded), aiming at reducing the searching scope of similarity matching to accelerate the encoding process. Simulation results show that the proposed scheme not only reduce the searching scope of best-matched to accelerate the encoding process, but also can obtain good quality of the reconstructed images as compared to the baseline algorithm with full search.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130617209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Paradox Stems from the Security Model or the Security Proof? 悖论源于安全模型还是安全证明?
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.54
Q. Pu, Jianmin Ding
{"title":"Paradox Stems from the Security Model or the Security Proof?","authors":"Q. Pu, Jianmin Ding","doi":"10.1109/ISCSCT.2008.54","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.54","url":null,"abstract":"Recently, Abdalla and Pointcheval proposed an efficient three-party password-authenticated key exchange protocoland provided a proof of security in the Bellare, Pointcheval, and Rogaway (BPR2000) model. Despite the claim of provable security, the protocol was subsequently shown insecure in them presence of an active adversary by Kim-Kwang et al. But they declaimed the flaws stemmed from the weakness of the security model. We defuse it by demonstrating that the attack can be captured in the BPR2000 model. Furthermore, we argue that the paradox is due to the flaws in the proof of security.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130793254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A LDAP Directory Server Model of Workflow Management Systems 工作流管理系统的LDAP目录服务器模型
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.286
Zhiyi Wang, Zeng Wang, Yifan Yang
{"title":"A LDAP Directory Server Model of Workflow Management Systems","authors":"Zhiyi Wang, Zeng Wang, Yifan Yang","doi":"10.1109/ISCSCT.2008.286","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.286","url":null,"abstract":"The paper proposes an organization model hosted in the LDAP directory server. And it expands the scope of model utilization, gives the technical method which is capable of dealing with the heterogeneity, distribution of the organization model, and the transparency of the model to its users. Then the role-based access control (RBAC) technology has been used in the model to implement the control of resource access in the workflow management system according to the rules in the organization model. At last, this paper proposes an idea of designing an organization model information platform in workflow management systems and a prototype system. With simulation results and analysis show that the organization model has good compatibility, extendibility and high operating efficiency. Thanks to the role-based strategy, the model facilitated the management authority and suits the independence in the workflow management system for the use of organization model.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132372250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy Conceptual Information Modeling in UML Data Model UML数据模型中的模糊概念信息建模
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.353
Zongmin Ma
{"title":"Fuzzy Conceptual Information Modeling in UML Data Model","authors":"Zongmin Ma","doi":"10.1109/ISCSCT.2008.353","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.353","url":null,"abstract":"Conceptual data models, being the tool of design databases, have been proposed. Information in real world application is often vague or ambiguous. Currently, less research has been done in modeling imprecision and uncertainty in conceptual data model. The UML (Unified Modeling Language), being a set of OO modeling notations and a standard of the Object Management Group (OMG), can be applied for many areas of software engineering, knowledge engineering, and data modeling. In this paper, different levels of fuzziness are introduced into the class of the UML.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127981007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An Improved Algorithm of Human Skin Detection in Video Image Based on Linear Combination of 2-order Markov and Wiener Predictor 基于二阶马尔可夫和维纳预测器线性组合的视频图像人体皮肤检测改进算法
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.208
Liu Yun, Wang Chuan-xu
{"title":"An Improved Algorithm of Human Skin Detection in Video Image Based on Linear Combination of 2-order Markov and Wiener Predictor","authors":"Liu Yun, Wang Chuan-xu","doi":"10.1109/ISCSCT.2008.208","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.208","url":null,"abstract":"Human skin color distribution is relatively compact in a color space. That skin pixels in each frame are closed together as a ¿dot cloud¿ is hypothesized, the shape evolution of ¿dot cloud¿ in the color space from frame to frame is parameterized as translation, scaling and rotation. The linear combination of forecasts, which is consisted of 2-order Markov predictor and Wiener one step predictor, is proposed instead of single predictor to predict these parameters for the next frame which is to be segmented, and human skin biological feature is then adopted to remove camouflage noise. Extensive tests prove that this algorithm is quite sensitive to human color, and more accurate for human skin segmentation with Bayes classifier.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123384239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on Neural Network of Circuit Failure Diagnosis System 电路故障诊断系统的神经网络研究
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.150
Chenghui Yang, Jianjun Meng, Wenzhe Qi
{"title":"Study on Neural Network of Circuit Failure Diagnosis System","authors":"Chenghui Yang, Jianjun Meng, Wenzhe Qi","doi":"10.1109/ISCSCT.2008.150","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.150","url":null,"abstract":"Combining the failure practical example, neural network analysis is used for diagnosis. Using the neural network in MATLAB to simulate the circuit fault system, this is using two different kinds of training functions. For the better analysis of failure diagnosis problems, firstly, using MATLAB software to simulate failure problems such as the emergence of regular power, short circuit and broken circuit. Through the training functions traingdm training function and trainglm training function, then, we get the conclusion that which function is better for the diagnoses of circuit failure, and the importance of the simulation of the circuit failure system.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126474007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Face Recognition Based on Local Feature Analysis 基于局部特征分析的人脸识别
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.65
Zhiming Qian, Peng Su, Dan Xu
{"title":"Face Recognition Based on Local Feature Analysis","authors":"Zhiming Qian, Peng Su, Dan Xu","doi":"10.1109/ISCSCT.2008.65","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.65","url":null,"abstract":"This paper presents a new face recognition method based on the analysis of local features. Firstly, we can get the images of magnitude by means of analyzing face images with the Gabor wavelets. Secondly, the magnitude images are divided into blocks, then principle components analysis (PCA) could be directly used to all the blocks to construct the feature space. Finally, all the blocks of images are projected to the feature space and get the face feature vectors. By counting and analyzing the feature vector, we get the recognition results. The experimental results show that this method uses the advantages of Gabor wavelets and local feature analysis (LFA), has a good recognition capability.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126588608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sale Decision-Making Model of United Operation between Hydropower and Thermal Power Considering Uncertain Factors 考虑不确定因素的水电火电联运销售决策模型
2008 International Symposium on Computer Science and Computational Technology Pub Date : 2008-12-20 DOI: 10.1109/ISCSCT.2008.377
Guan Yong, Tan Zhong-fu, Wang Mian-bin, L. Xiao-jun
{"title":"Sale Decision-Making Model of United Operation between Hydropower and Thermal Power Considering Uncertain Factors","authors":"Guan Yong, Tan Zhong-fu, Wang Mian-bin, L. Xiao-jun","doi":"10.1109/ISCSCT.2008.377","DOIUrl":"https://doi.org/10.1109/ISCSCT.2008.377","url":null,"abstract":"This electronic document is a \"live\" template. The paper studies the balance between benefits and risks, when such a generator sales electricity in many trade markets. Firstly, the uncertain risk faced by this generator selling electricity in spot market, contract market and option market will be measured with conditional value at risk (CVaR) theory. Secondly, the mean-CVaR sale portfolio optimal model is constructed with considering the risk and expectation benefits of this generator based on investment portfolio theory. At last, calculation results show that the proposed model can truly reflect the essential characters of the market risk faced by this generator and guarantee it to obtain expected profits at the minimum CVaR risk lever, and the option market can effectively reduce sale risk.","PeriodicalId":228533,"journal":{"name":"2008 International Symposium on Computer Science and Computational Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115215104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信